Consumer Advocacy
What you need to know
Identity Theft Protection
  • These services can't prevent your identity from being stolen.
  • More frequent scanning is better for consumers.
  • Look for services that help you recover from ID identity theft.
  • Get 3-bureau monitoring if possible.
Our Approach

How we analyzed the best Identity Theft Protection Companies

Monitoring
It’s important for identity theft protection services to continually scan the dark web for threats and check every day for any changes in credit history.
Restoration
We prefer companies that help customers fix issues they encounter if their identities are at risk or stolen.
Features
Many companies offer identity theft plans with lackluster features. We made sure our picks had a well-rounded features list.
116 People found this helpful.
We receive compensation from these partners, which impacts the order they appear on the page. That said, the analyses and opinions on our site are our own and we believe in editorial integrity.

Our Top Picks: Identity Theft Protection Reviews

In the digital age, everyone is at risk for identity theft. Even though we can help prevent it, there’s no assurance that our identity will not be stolen. It could happen to anyone at any time. You could say it’s a new and improved form of mugging.

That’s why people rely on identity theft protection services, yet the “protection” part is a misnomer. There’s no way to protect people before a data breach happens or if somebody opens a credit line in your name without your knowledge. However, subscribing to an identity theft protection service can make a huge difference. Good identity theft protection services monitor your information daily, alert you as soon as possible to anything out of the ordinary and assist you in resolving any issues if your identity is stolen.

Aura review

Aura ID Theft Protection Features:

  • Real-time 3-bureau credit monitoring
  • 24/7 fraud alerts for suspicious activity
  • AI-driven risk detection technology
  • Extensive identity restoration support
  • Up to $5 million in insurance coverage for eligible losses
  • Comprehensive family plans that include child protection
  • Credit lock for enhanced security
  • Bank fraud and financial transaction monitoring
  • Monthly credit score reports

Plans & Pricing:

Aura provides flexible pricing options, starting at $9 per month for individuals and $20 per month for family plans. Each plan comes with extensive features, offering comprehensive identity theft protection and credit monitoring at competitive rates.

ReliaShield review

Best Value in Identity Theft Protection

ReliaShield positions itself as the most affordable identity theft protection on the market today. Currently, ReliaShield’s basic Essential plan costs $7.99 per month. The company offers two other tiers, Prime and Elite, which cost $14.99 and  $21.99 respectively. The more you pay, the more features you plan offers, but across the board, the company's plans are fairly robust.

Repairing the damage caused by identity theft is a time-consuming and tedious process—something many consumers would not want to handle by themselves. Most importantly, ReliaShield offers 24/7/365 restoration and recovery services so customers don't have to manage the burden all alone.  

Choice of Three Plans

ReliaShield customers can select from several plans to find one that meets their needs for protection and their budget. 

Essential

Prime

Elite

 

Screenshot of https://reliashield.com/ 11/8/2019

Some of their plans’ features are:

  • Personal information monitoring
  • Data breach updates
  • Court records monitoring
  • Dark web monitoring
  • Social media monitoring
  • Bank account application alert

Another thing we liked about this company is that their master agreement, privacy policy, and insurance policy were considerably detailed and clear. For consumers who want to ask questions and really research before a buy, this is a plus.

LifeLock review

 

LifeLock Identity Theft Protection Review

LifeLock Identity Theft Protection provides comprehensive services designed to safeguard your personal information and help prevent identity fraud. Known for their extensive monitoring and alert systems, LifeLock aims to protect your identity and offer peace of mind with their responsive support and insurance coverage for restoration expenses.

LifeLock Features:

  • 24/7 identity and credit monitoring
  • Fraud alerts and notifications for suspicious activity
  • Dark web monitoring to detect compromised information
  • Up to $1 million in insurance for stolen funds and expense reimbursement
  • Identity restoration specialists available to assist with recovery
  • Credit lock and unlock features for added security
  • Financial account and transaction monitoring
  • Annual credit reports and score tracking

Plans & Pricing:

LifeLock offers various pricing tiers to suit different needs, starting at basic plans for essential protection and scaling up to comprehensive coverage with premium features. Each plan includes identity monitoring and restoration support, with higher tiers offering more extensive credit monitoring and financial protection.

Discover review

 

 

Zander Insurance review

 

 

 

Our Research

More insight into our methodology


We took a close look at the identity theft protection services industry, and quickly realized a couple of things.

  1. Identity theft protection services can’t actually protect consumers against identity theft. What these companies really do is monitor, alert, and assist in the recovery.
  2. Their true value comes when alerts are timely and the company providing the service assists the consumer with the restoration. For this to work, the more places the company monitors, and the more features it has, the better.

Monitoring

It was important for us that the companies we picked had 24/7 dark web surveillance and they checked credit history at least daily. We looked for companies that claimed they had a strong alert system in place and made sure they had the reputation of doing so.


Restoration

Being a victim of identity theft is painful. It can take a long time to recover from it—and you never really know when the damage has been stopped. If your information finds itself in the digital space, there’s a strong chance you’ll always have that dark cloud hanging over your head for a long time. This is the reason we prefer companies that assist consumers with the restoration of their identity, preferably ones that take care of it for the consumer.


Features

With identity theft protection services, less is definitely not more. Basic features identity theft protection service plans should include are dark web surveillance, personal information surveillance, and credit monitoring. However, the more places scanned or investigated, the better. Companies that had a robust features list made our cut.

Helpful information about Identity Theft Protection

Dwight Schrute, a beloved character from The Office, couldn’t have said it better, “Identity theft is not a joke, Jim! Millions of families suffer every year!”  According to the 2019 Identity Fraud Study from Javelin Strategy and Research, in 2018 alone 14.4 million consumers were victims of identity theft. And even though the number of victims decreased from the reported number in 2017, the financial consequences were more costly for the 2018 victims.

For better or worse, that’s the world we live in. Before the age of the internet, identity theft could happen whenever social security cards or licenses were stolen, but now we have to worry about our information in the digital world too.

That’s why we need to take steps to protect ourselves and our loved ones the best we can. Though we can’t control every little thing, or big things like a data breach or stolen records, we can do our best to be alert and control our information.

And for us to better protect ourselves, we need to know the…

Common Identity Theft Strategies

Though we are in the internet age, many of the old identity theft tricks are still thriving. For example, stealing documents remains a tried-and-true method. Best advice: keep your social security card somewhere safe, not in your wallet. If you can, don’t take all your credit cards with you if you are not using them. And shred or otherwise destroy all papers you want to discard that have your personal information on them.

Also, the classic phone scam is alive and well, but they’ve become more sophisticated. Technology has helped thieves to “spoof” phone numbers, which means they can manipulate the number shown on your caller ID. The best way to combat this is to not give away personal identifiable information, PII for short, and report the incident to the FTC.

Phishing

There are many newer ways that identity thieves steal your information through digital means. Phishing is one of the most common. The bad guys send you emails to encourage you to click on links contained in them. Those links often take you to web forms that ask for your PII, maybe to “verify your account.” Once you enter your PII and send off the web form, your information is in the hands of the scammers.

Here are two email examples one of our coworkers received to her personal email just this month:

As you can see, there are some tell-tale signs that these emails are fake. For example:

  • The email subject line is sketchy.
  • The email address it comes from is not from Netflix.
  • The greeting doesn’t include the name of the person.
  • There’s an invitation to click a link and update billing information.

However, not all email scams are so poorly done. Email scams have been evolving since their “Nigerian prince” email scam days. Former FBI Agent R.L. Walters, an expert on identity theft we consulted, agrees that they are just getting craftier and more convincing.

"That's how they make a lot of people fall for [email scams],” he said. “They make them look legitimate."

When an email looks official and asks for PII, one has to be even more careful. For the tech-savvy among us, Walters suggests looking at the metadata of the email to check for the originator of the message. “If you look through the metadata, you can tell if it's a legitimate email or a phishing email,” he said.

Formjacking

Other popular digital scams are online shopping scams and formjacking. If you are paying an online merchant, make sure that the website you are putting your credit card information into is secure. A secure website’s address will begin with https://. It will also have an image of a lock or say “secure,” depending on the browser you are using. When you click on the lock, it tells you if the certificate of the website is valid. If the merchant doesn’t match these criteria, stay away.

But what happens when you buy from a reputable company and their website gets hacked? Unfortunately, it has happened. Formjacking is the digital version of credit card skimming. Criminals can skim the information you input in the billing section of the website. Unfortunately, we are all at risk.

"It's important for consumers to do what they can not to unnecessarily expose their information. For instance, the standard advice about not giving out your Social Security [number] or not leaving your personal information lying around the household where others might see it, these are some common sense things that people can do to protect their information,” said Susan Grant, Director of Consumer Protection and Privacy at the Consumer Federation of America.

How Identity Theft Can Affect You

As we have learned, we are all at risk. As such, we were curious and created an anonymous survey for the people in our company. We thought it would be interesting to see how often a group of educated, professional people had been victimized by identity theft. We found 35.8% of our coworkers have had their identities stolen. The most common ways this happened were from having their ID cards and documents stolen and having their data swiped in massive data breaches.

We also asked our colleagues if they knew people who had been victims. A shocking 75.5% said yes, and 12.5% said they knew 6 or more people who had been victims of this crime. Though highly anecdotal, this little experiment combined with all our research shows us that identity theft is now a commonplace occurrence that affects people in different ways.

Take Jaroldi G., for example. Someone took out one of the seven social security cards you are allotted in your lifetime and is using her PII to work in the state of Louisiana. She discovered her identity was stolen because her previous workplace was using ADP system for payroll and tax documents. When she looked for her tax documents, she found an additional set of documents from a manufacturing company in Louisiana. It was a lucky coincidence that they both had to use the same payroll system.

After finding out, she followed the steps outlined on the Social Security website and called the company in Louisiana to alert them to the situation. When the man using her stolen identity was confronted, he left the company, never to return. For now, the perpetrator hasn’t stolen any money. In fact, he opened a credit line that he never used. After that, Jadoldi had to ask for a credit freeze. However, this doesn’t mean that the situation is less worrisome.

“I had to go to the Social Security Office four times in two months to investigate the issue,” said Jaroldi. “I have to go every year to verify the workplaces I have in my history.” She also had to go to the IRS and bring evidence about her situation, which has also become a worry since the person using the PII is not paying taxes.

“I was scared, and I looked for [the perpetrator] on the internet. The fact that someone is using my information is disconcerting”, she said.

Many people who’ve gone through what Jaroldi has would describe their experience as unnerving. “It is not just losing money. It can lead to stress or physical problems. There are many issues that can arise that have nothing to do with losing money [when your identity is stolen],” said Grant. The Identity Theft Resource Center creates a yearly report called Aftermath about effects that victims of this crime experienced like the ones mentioned by Mrs. Grant.

There are also cases where victims experience monetary losses. Around 2011 in the city of Los Angeles, Heidi R.’s bank account was cleaned out for all but $10. She immediately called the bank, and after going through her statements, discovered a pattern of unauthorized withdrawals.

The bank returned her money two months later. The person who was using her account information was found, but Heidi decided not to press charges since the process was too difficult. However, even though she learned and keeps her information safeguarded, that did not stop identity thieves from striking again. Unauthorized debits hit another account from another bank, even though she rarely used it and had never purchased anything online with it. This time, it took six months for her to be reimbursed by the bank.

“I was angry and frustrated,” said Heidi R. “I was desperate because I needed to pay my rent. I was not sure I could secure my roof for that month.”

Identity theft can hit anyone, even kids. This is why it’s so important to be on top of your financial records and be careful how we share our personal information.

Compounding the difficulty of keeping your personal information away from criminals is the fact that the social media industry relentless promotes the public sharing of details about us and our lives. For that reason, social media profiles and posts have become a great source of information that identity thieves use to hack into your financial accounts.

When discussing the information that’s shared in social media, Walters said, “[Information shared] makes it easier for criminals. Less is more as far as I'm concerned. You should never share any information of a private nature [on social media platforms]. I know people do, but I don't think is smart.”

When investigators do what they do best, they usually go to social media and learn a lot about the people they are looking into. On the other hand, criminals are doing the same. Information such as birthdays, addresses, addresses, email addresses, check-ins, parents’ names, and such should be kept off social media.

Resources for Victims

Identity theft is such a frequent occurrence that in recent years, resources designed to prevent it have become much more common than they were in decades past. For example, Google developed in partnership with the Net Safety Collaborative and National Association for Media Literacy Education a program called “Be Internet Awesome” to teach kids responsible communication, online security, how to spot fake news, among other skills.

Below are some resources for victims of identity theft:


FAQs about Identity Theft Protection


Why should I get identity theft protection if I can monitor my own credit?

Identity theft can affect more than your credit report. Thieves can use your information to take out loans that don’t require credit verifications or commit crimes under your name, for example. Consider identity theft protection if you want someone to monitor your personal data, alert you in the case of theft, and help you recover after the damage is done.

Will identity theft insurance cover funds stolen?

Probably not. Identity theft insurance might not cover monetary losses from the incident, however, it usually covers the costs of repairing your good name. For instance, if your wallet is stolen and you take time off from work to replace important documents or identification, your insurance policy may pay for lost wages and replacement fees.

How can having my identity stolen impact my credit?

If someone is able to open lines of credit in your name, they can damage your credit history and score. The first time there’s a missed payment, your credit records will be damaged, and it will take you many months (maybe years) to remove the negative marks.

Our Identity Theft Protection Review Summed Up

Company NameBest
Identity Guard® Identity Theft ProtectionReputation
LifeLock Identity Theft ProtectionFeatures
ReliaShield Identity Theft ProtectionValue
IDShieldfor Restoration
IdentityIQ Identity Theft ProtectionBreadth of Monitoring
We receive compensation from these partners