Browse by Topic

Hack Attack: Health insurer’s customer information stolen

Last week, hackers hit Anthem, the nation's second-largest health insurance company. As many as 80 million customers had their account information stolen. The pilfered data includes names, birth dates, medical IDs, Social Security numbers, street addresses, email addresses and employment information.

If you’re worried about your personal information ending up in the wrong hands, the FTC has a helpful reminder. A credit freeze, also known as a security freeze, lets you limit access to your credit report, which makes it more difficult for identity thieves to open new accounts in your name.

Blog Topics: 
Privacy & Identity

Hack Attack: Health insurer’s customer information stolen

Last week, hackers hit Anthem, the nation's second-largest health insurance company. As many as 80 million customers had their account information stolen. The pilfered data includes names, birth dates, medical IDs, Social Security numbers, street addresses, email addresses and employment information.

If you’re worried about your personal information ending up in the wrong hands, the FTC has a helpful reminder. A credit freeze, also known as a security freeze, lets you limit access to your credit report, which makes it more difficult for identity thieves to open new accounts in your name.

Blog Topics: 
Privacy & Identity

Hack Attack: Health insurer’s customer information stolen

Last week, hackers hit Anthem, the nation's second-largest health insurance company. As many as 80 million customers had their account information stolen. The pilfered data includes names, birth dates, medical IDs, Social Security numbers, street addresses, email addresses and employment information.

If you’re worried about your personal information ending up in the wrong hands, the FTC has a helpful reminder. A credit freeze, also known as a security freeze, lets you limit access to your credit report, which makes it more difficult for identity thieves to open new accounts in your name.

Blog Topics: 
Privacy & Identity

Technology tips for domestic violence and stalking victims

We love technology. So it’s disturbing when it’s used to threaten or harass people – especially domestic violence and stalking victims.  

Blog Topics: 
Privacy & Identity

Technology tips for domestic violence and stalking victims

We love technology. So it’s disturbing when it’s used to threaten or harass people – especially domestic violence and stalking victims.  

Blog Topics: 
Privacy & Identity

Technology tips for domestic violence and stalking victims

We love technology. So it’s disturbing when it’s used to threaten or harass people – especially domestic violence and stalking victims.  

Blog Topics: 
Privacy & Identity

Technology tips for domestic violence and stalking victims

We love technology. So it’s disturbing when it’s used to threaten or harass people – especially domestic violence and stalking victims.  

Blog Topics: 
Privacy & Identity

Technology tips for domestic violence and stalking victims

We love technology. So it’s disturbing when it’s used to threaten or harass people – especially domestic violence and stalking victims.  

Blog Topics: 
Privacy & Identity

Technology tips for domestic violence and stalking victims

We love technology. So it’s disturbing when it’s used to threaten or harass people – especially domestic violence and stalking victims.  

Blog Topics: 
Privacy & Identity

Technology tips for domestic violence and stalking victims

We love technology. So it’s disturbing when it’s used to threaten or harass people – especially domestic violence and stalking victims.  

Blog Topics: 
Privacy & Identity

Pages