Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

January 20, 2022

After the Lifelock scam was uncovered, few companies offer "only" ID Theft insurance anymore. Instead, it's a smorgasbord of supposed services and defenses to help you with the ID Theft problem. Here's what you might get for your money:

Insurance

Turns out you can make a lot of money by charging people for insurance . Who knew?
(Image used under: Fair Use doctrine)

Insurance plans are a risk equation that you'll almost always lose (or else the companies wouldn't stay in business). That's not to say that all insurance is a scam, but you need to weigh your actual risk versus the benefits. Do you really know what the conditions are for making a claim? Will you actually be able to collect? How much? Under what circumstances? According to a Forbes.com article:

The balance of the usual $5,000 to $15,000 coverage is available for legal fees to undo judgments and criminal records racked up by thieves in your name. But Federal Trade Commission statistics show that just 16% of ID theft victims suffer such problems, and only 40% report out-of-pocket costs greater than $1,000.

Even assuming your risk was as high as the fear-mongering suggests, you need to read and understand the terms of the plan before you have any assurance you're getting what you paid for. Tthe original version of LieLock's insurance plan which offered a "1 Million Dollar guarantee" (OMG!) was impossible to collect on based on their stated terms, but that didn't stop millions of people from signing up.

Dark or Deep Web Scanning

What up my fellow theives! You don't happen to be talking about any of my customers do you?
(Image used under: Fair Use doctrine)

These terms refer to the parts of the Internet that aren't reachable by search engines. Private chat channels, forums and boards that are hidden from view, and so on. It's a real thing, but not nearly as nefarious as these companies make them out to be. Sure, there's a lot of illegal and nasty stuff out there, but if was that easy to find and "monitor", why wouldn't the authorities be doing something about it?

Granted, I've not worked for these companies and don't have first-hand knowledge of what they do and don't do, but their claims sound as ludicrous as if they had said "we have undercover people in crime rings who'll make sure that they pass over your address when choosing which houses to rob. Best of all, the only way for them to monitor your information, accounts, etc. is to have all the information and access themselves putting you at even more risk of breaches or unscrupulous employees.

Other Fluff and Nonsense

I tested one such company out and it was really uncomfortable to give them access to my social and other sensitive information, but you can bet I wasn't giving them my banking login details no matter what "protection" services they were supposedly adding.

And did you know that Lifelock is still listing "Lost Wallet Protection" as one of their "services"? I looked around their site and even their terms and conditions and couldn't find specifics, but if it's like what they used to offer, they would keep a list of company phone numbers for the various cards you keep in your wallet to make it easier for you to make all the calls and do all the real work if you lost your wallet.

Likewise, all these supposed benefits are loosely defined on average. Using psychologically proven words that give feelings of comfort like "guaranteed", "covered", "protected", "help", and so on, but very little information about what they actually DO, what they don't do, and how it all works. Almost as if it was more about making you feel good than actually helping.

Exercise

Exercise by Nick Youngson - Alpha Stock Images
(Image used under: Creative Commons 3.0 [SRC])

If you have been doing these lessons in order, this will look familiar from the ID Theft Monitoring lesson, but let's do it again. To really evaluate what you're paying versus what you get:

  1. Log into your service and take a look around. Make some notes about what they're actually providing to you.
  2. Rate each from 1 to 10 on two factors: 1) how well do you understand the feature, and 2) how valuable/important is it to you.
  3. In particular pay attention to terms surrounding any insurance plan. You really should make the effort to read their actual terms and exclusions. There's no shame if you lack the interest/motivation/skill/energy to do it… they're counting on it. Just keep in mind that it's insurance is devilishly hard to collect on and unless you know the terms as well or better than they do, your chances of collecting are probably depressingly low.
  4. Look through your email for messages from your monitoring service. Write down the number of emails received and, out of those, how many had important and worthwhile information.

Just like with Monitoring, hold on to your notes. Don't make any decisions on your paid services until we get to the Credit Report Freeze section!

Have a Comment or Question?

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]