Contact us
Please first check our FAQ in the next section below to see if it answers your question. If not, use the form to contact us.
Message our team and we will get back to within 24-48 hours. Include as much information as possible.
Frequently Asked Questions (FAQs)
Why choose us?
Proactive protection: Putting people first
- Notifying affected people of their data being breached before they are directly signed up with us.
- Why? People deserve to be protected. Data and identify theft is a terrible thing to happen to people, yet many don’t even know it’s happened to them until it’s far too late. Many companies don’t notify their customers in time, or at all because they don’t want to look bad. If they don’t want to be notified – that’s very unlikely, but they can simply unsubscribe from our alerts.
Active protection:
- Daily, weekly, and monthly scans of the dark web, data from information brokers, and other sources to see if there is information of yours that shouldn’t be out there (leaked, personal, etc).
- Regular removal of information on the dark web, from information brokers, and other sources as we find it.
- Alerts to your credit reporting agencies and other institutions to help secure your credit, accounts, and funds. If you are being asked for extra security steps to confirm your identity with them, this is often why. Stronger security is the best defense.
- Alerts to YOU if your data, accounts, or information has been breached or stolen… often before other companies will report it (if at all)
Reactive and post-breach solutions:
- Collaboration with credit reporting agencies and organisations to help secure your accounts
- Support resources on how to protect your accounts and data as well as how to help prevent it from happening again, or to lower your risk
- Services to remove data, protect information and recover your accounts
- Solutions for those who need extra support with tech to stay and be protected and level up their security without giving them all the burden
What is a data breach?
A data breach is where your personal information (which usually includes emails, passwords, ID, documents, accounts, and other private stuff) is stolen by hackers and posted on the dark web, shared with other criminals, and used to steal your money, take out loans in your name, steal your identity, steal your accounts, and cause all sorts of problems.
Hundreds of thousands of people all around the world are affected by data breaches and have their information and ID stolen every year, and many don’t even know about it.
Protect yourself and get alerts early – we can help you protect and defend yourself. Sign up for alerts and protection with us today.
How does active data removal work?
Every month, we use the information you provided about yourself to us to search through over 600 data broker sites that sell people’s private information around the world. If we find your data on any of these sites, we initiate the request for removal – if you have a paid data protection and removal plan. See our plans page for more.
What should I do if my accounts / data has been breached / stolen?
You need to visit our resource centre (blog) to learn what to do after a data breach and get guided steps to resolve exposures of your personal info.
Hackers rely on people reusing passwords, so it’s important to create strong, unique passwords for all your accounts.
Keep your passwords in a safe place that only you have access to; this could be the same place where you store important documents or a password manager.
What information and data is stolen in a data breach?
Not all breaches expose all the same info. It just depends on what hackers can access.
Typical data breaches expose email addresses and passwords to your accounts.
More serious and bigger breahes steal more sensitive information such as credit card numbers, PIN numbers, social security numbers, your ID, and more.
The stolen information can be used to access your accounts, impersonate you, steal your money, apply for loans in your name, sold to other criminals, and more.
The best protection is to follow the recommended protection steps in our resource center (blog) and sign up for active data removal, and data breach alerts. See our plans page for more.