Quest Diagnostics Breach Exposes Health Data of Thousands of Customers


New Jersey-based Quest Diagnostics, a medical laboratory company, announced a data breach Dec. 14, 2016 that has affected 34,000 people.

Hackers stole personal and medical information of customers, including names, birthdays, lab results and phone numbers.

The attackers accessed the data in November through an improperly secured mobile app that allows patients to share and store electronic health records.

Read the notice from Quest here.

For personal protection against hackers and keyloggers for you and your family, get TurnKey ID Solutions today.


Wendy’s is latest victim of credit card breach


Fast-food chain Wendy’s is investigating a possible breach of credit card information.

A spokesperson said the chain began receiving reports in early January from its payment contacts about a potential breach. He also said the company has hired a security firm to investigate.

Wendy’s has about 6,500 restaurants in the United States and 28 other countries and territories.

Read the full report from KrebsOnSecurity.

To prevent your identity from being compromised, get TurnKey ID Solutions today.


IRS: More work remains in battle against identity theft

IRS National Taxpayer Advocate

Update: The 14-day trial offer mentioned in the bottom of this post is no longer available.

The Internal Revenue Service reported that it made several steps to expand its identity theft detection/prevention efforts and fraud refund efforts in 2015, and publicly posted about how stopping these crimes is one of its priorities.

A few takeaways from the IRS’ report:

→ From 2011 through October 2014, the IRS stopped 19 million suspicious returns and protected more than $63 billion in fraudulent refunds.

→ Beginning in January 2015, the IRS began limiting the number of direct deposit refunds to a single financial account or pre-paid debit card to three.

→ In fiscal year 2014, the IRS initiated 1,063 identity theft related investigations. Criminal Investigation enforcement efforts resulted in 748 sentencings as compared to 438 in FY 2013, an increase of 75 percent, and the incarceration rate rose 7.1 percent to 87.7 percent. The courts imposed significant jail time with the average months to serve in FY 2014 at 43 months as compared to 38 months in FY 2013 — the longest sentencing being 27 years.

But even the IRS admits that the battle is far from over.

“While the IRS has made considerable progress in this area, more work remains. Fighting identity theft is an ongoing battle as identity thieves continue to create new ways of stealing personal information and using it for their gain. Identity theft cases are among the most complex handled by the IRS. The IRS is continually reviewing processes and policies to minimize the incidence of identity theft and to help those who find themselves victimized.”

This admission, and even the numbers given above, reinforce the need for everyone to get full protection now. Learn more about how TurnKey ID Solutions offers a complete solution and sign-up now for your 14-day FREE trial.


LifeLock Ordered to Pay Millions Due to Deceptive Advertising, ‘Troubling Charges’



Identity protection company LifeLock will pay $100 million to settle contempt charges from the Federal Trade Commission for violating a 2010 order that required Lifelock to secure customers’ personal information and to not engage in deceptive advertising, according to a press release from the FTC posted on Thursday.

“This settlement demonstrates the Commission’s commitment to enforcing the orders it has in place against companies, including orders requiring reasonable security for consumer data,” said FTC Chairwoman Edith Ramirez. “The fact that consumers paid LifeLock for help in protecting their sensitive personal information makes the charges in this case particularly troubling.”

The FTC charged LifeLock with violating four parts of a 2010 order. It accused the company of the following:

1. LifeLock failed to establish and maintain an information security program to protect users’ sensitive personal information, including their Social Security Numbers and credit and bank account numbers
2. LifeLock falsely advertised that it protected customers with the same high-level safeguards used by financial institutions
3. LifeLock falsely advertised that it would send alerts as soon as it received any indication that a customer might be a victim
4. LifeLock failed to follow record-keeping requirements

Read the full release and check out our Stories section to see how TurnKey ID Solutions has proven its reliability, effectiveness, and trustability to its customers.

What You Need to Know: “All-Clear” Emails

Question from a customer: I signed up for TurnKey ID Solutions but have not yet logged into the Members Area to complete step two of the set-up and installation process in order to begin the protection/monitoring and restoration services. But, I received an email today with this message: “While carefully monitoring your identity, we have discovered no suspicious activity in the last 30 days.” How can I be “all clear” when I have not yet set-up my personal profile?

Answer: That’s a great question. Once you sign-up to be a member through TurnKey ID Solutions, you are automatically put into the first level of monitoring. All this level requires is your name, address, phone number and email address (what you gave when you signed up) for us to begin scouring millions of databases and going back seven years to see if your identity has been compromised.

The next level of protection comes when you login the Members Area and enter your personal information. There, you can answer questions that identify you in order for ID Preserve to be on the lookout for more specific identity issues, such as someone signing up for a credit card in your name, etc.

This system is what makes us different from all others — it begins monitoring as soon as you sign up, without you having to provide your Social Security Number or indicating that you want to start using the product. It does all the work for you!

Even when you go deeper and provide more personal information in the Personal Information Center, we only ask identifying questions, such as, are X-X-X-X the last four digits of your SSN; or is [month] your month of birth, etc. This is one of our most attractive features! As a customer, you DO NOT have to provide much personal information, such as your full SSN, in order to be extensively monitored for identity theft risks. How much information you provide is completely up to you.

To start being automatically monitored for identity theft risks, sign up today for TurnKey ID Solutions.

TurnKey ID Solutions is the first-of-its-kind, patent-protected total identity protection solution available. It provides complete prevention; protection and monitoring; and restoration services.

Report Names Most, Least Vulnerable States for Identity Theft

The District of Columbia, Florida and Nevada are the most vulnerable to data breaches, while South Dakota, Hawaii and Maine are the least vulnerable, according to a new report from WalletHub.

WalletHub’s analysis compared the 50 U.S. states and the District of Columbia using nine key metrics, including examining identity theft complaints and cybercrime-related dollar losses per capita.

Among the findings:

Most Identity Theft Complaints per Capita

District of Columbia

Most Credit-Card Fraud Complaints per Capita

New York
District of Columbia

Most Bank Fraud Complaints per Capita

District of Columbia

In the map below, the bluer the state, the less vulnerable it is, and the lighter the state, the more vulnerable it is.

Source: WalletHub

In 2015, a total of 690 breaches with access to more than 176 million records have occurred, according to the Identity Theft Resource Center’s most recent data breach report. Some of the largest and most-publicized hacks involved Anthem, CVS and the U.S. Office of Personnel, proving that even the government is not immune to hackers.

Identity thieves are relentless and attacks are happening every few seconds worldwide. With ever-evolving technology and sophisticated methods, thieves have the tools to do major harm to you, your finances and your reputation. Only TurnKey ID Solutions PREVENTS identity theft, PROTECTS you in current time, and RESTORES your losses and your name should any kind of attack occur.

For complete prevention; protection and monitoring; and restoration services, choose TurnKey ID Solutions to keep you and your family secure and protected.

‘Tis the Season for Identity Theft: What You Can Do

It’s the beginning of December, and with a boom in online shopping through the month of December, it’s a prime time for identity thieves to steal the information that you’re spreading around the Web.

As a TurnKey ID Solutions member, you’re protected by the only-one-of-its-kind, patent-protected “total” identity theft protection solution available. We provide you with complete prevention; protection and monitoring; and restoration services. You and your family can finally have the peace of mind you deserve.

Here are some general practices just to keep in mind.

1. Only use websites that are secure. One way to tell is to be sure a web address begins with “https”
2. Avoid using public Wi-Fi when making purchases online
3. Only purchase using websites that are trusted
4. Beware of emails that contain links
5. Ignore unsolicited phone calls/sales calls
6. Review your account statements carefully, especially this month

To get peace of mind during this shopping season, sign up for TurnKey ID Solutions today.

Mobile Device Protection Software Added to TurnKey ID Solutions

As part of our commitment to provide you with a total identity theft protection solution, we’re excited to announce that we can now protect your mobile devices (iPhones/iPads/Androids/tablets) with our keystroke encryption (anti-keylogging) TurnKey ID Solutions software. This new protection has six components:

  • Password Vault – Securely stores an unlimited number of passwords with associated websites.
  • Strong Password Generator – This useful feature creates strong passwords based on user-defined preferences, and then stores the strong passwords in the password vault for future usage.
  • Soft Token – One-Time-Password (OTP) Generator for the industry leading multi-factor authentication platform. Features “one touch” user enrollment.
  • Support for other OATH compliant Soft Tokens – Works with other OATH compliant authentication systems.
  • Encrypted Database – Store notes and other data in user defined fields in an encrypted database.
  • Secure Keypad – Custom keypad that provides secure input by encrypting keystrokes and preventing the mobile OS from logging the keystrokes.
  • Secure Browser – Custom secure browser.

Become a TurnKey ID Solutions user today to get this important security software on your mobile devices. Sign up HERE for our 14-day FREE trial.

5 Methods to Strengthen Your Digital Security

As of 2012, there have been 12.6 million documented cases of identify theft just in the U.S., an increase of more than one million since 2009. The San Diego-based Identity Theft Resource Center said it has about 600 hours of work to do in order to restore identities.

There are many ways to recognize identity theft, but the best solution to keep this from happening to begin with is to follow these steps.

First Method: Optimize Your Digital Profiles

Always choose passwords and PINs that no one would be able to guess.

Use words and numbers that are only familiar to you. If you can’t think of one, there are random password generator programs online that are virtually unbreakable.

Good habits to do if you want to strengthen your identity profile:

  • Use variations of your password, and don’t use the same password for all accounts.
  • Stop using easily guessed passwords such as your birth date, phone number, last 4 digits of your social, etc.
  • Do not store passwords on public computers, and make sure to logout if you’re ever on a public computer.

Second Method: Secure Your Personal Computer

There is software known as spyware, malware, and keyloggers that will stay on your computer and take sensitive information such as your login details and passwords without you even knowing. These types of software can capture and send your stolen information to the person who made the software.

Sometimes updating your firewall, or installing an antivirus program and anti-spyware program may help, but not always. If you want the most secure way to prevent these types of stealth software from stealing your information, get started with TurnKey ID Solutions for the best security.

Third Method: Phishing Scams From Emails

Spam are being sent to us every day; they may seem harmless but they ask you to verify things such as your password, account numbers or even your Social Security number.

Any engagement with these emails is highly recommended to be avoided, and they should be an immediate red flag for you. Either auto purge from these senders or contact your email service provider for help.

Things to avoid and what to do when receiving these types of suspicious emails:

  • If you receive an email with a link inside from a sender you’ve never talked to, do not click on any link in an email that looks suspicious. These links can direct you to send the sender personal information and worse, malware installations.
  • False lottery wins, requesting money, claims for Nigerian, avoid all these types of emails and auto purge.
  • Check the domain name of the sender’s email address. Usually phishers will use related email addresses that may look legitimate but are false. Avoid and purge. Example: [email protected] would read from a phisher as [email protected]

Fourth Method: Format Entire Computer Before Giving Or Selling Your Computer

Be sure to wipe out your entire computer drive and restore it to the factory settings before giving it away or selling it.

This will prevent all your information from being used from the next buyer or person that you give the computer to. If you’re not sure how to do this, your computer should have a manual that shows you how.

Fifth Method: Be Super Careful When Shopping Online

Always make sure there is a security symbol or some sort of trust badge on the site before shopping on it.

Usually, you will see a green lock icon next to the URL of the website address on your web browser. If you don’t see this, it is highly recommended not to purchase from that website. Do your research on the website before attempting to buy from it.

Did you find this article helpful? Click the Like button and share on social media! If you have more to add, comment below. We’d love to hear more security ideas to prevent identity theft.