Show All Answers
When you are notified by your medical provider their network has been compromised and your information could be at risk, there are a few things you can do:
Even when your medical provider's form letter tell you "there is no indication of misuse" you may want to follow the first 3 steps.
To support individuals impacted by romance imposter scams, Cybercrime Support Network offers a free, confidential Peer Support Program for romance scan survivors. The counselor-led sessions provide a safe virtual environment for individuals to work through the loss, embarrassment, and isolation that can accompany romance scams Learn more about this free program at this link.
You have discovered that you are a victim of identity theft. Where do you go to begin to unravel the mess that a thief has made in your name can be a confusing, time consuming, frustrating, and complex process. The Federal Trade Commission (FTC) provides information you can use to recover from identity theft. On the FTC’s site, click "Get Started" to create your personal recovery plan.
Watch this video if you aren’t sure what identity theft is or how it occurs.
Follow the links in this article to get the resources and support you need to recover and protect yourself from cybercrime and online fraud incidents
Data breaches are rampant and many people don’t appreciate the scale or frequency with which they occur. This website has aggregated data to help victims learn of account compromises. Enter your email address to learn if your account has been a part of any publicly reported breaches.
In addition to using Multi-factor authentication, changing your passwords regularly and after any known breaches is a best practice.
Identity theft can be stressful, but there are steps you can take to minimize the long-term impact on your finances. Watch this video from Bank of America and get the know-how you need to recover from being a victim of identity theft >>
Just like driving a car, sooner or later you may have an accident no matter how secure you are. Download this article to help figure out if you have been hacked and, if so, what to do.