Working for you and your family
IDShield, powered by Kroll, is built on decades of experience in helping people secure their personal information. This powerful service monitors identities from multiple angles – keeping a watchful eye for theft and fraud and alerting you to changes we detect.
With IDShield, you receive 24/7 monitoring of the information you provide: your credit information, your records that are publicly available, and your personal data that may have found its way to the internet. You also have unlimited access to Kroll’s Licensed Investigators when you need help with problems or questions such as:
- Handling issues with a lost wallet
- Preparing needed documentation to fight identity theft, including tax fraud
- Contacting appropriate agencies to report or resolve fraud
- Interpreting a credit report
- Identifying a scam or scheme
- Understanding how minors are particularly at risk
Kroll’s Licensed Investigators have worked countless hours consulting with members, helping them to restore identities and resolve problems related to identity theft. Our team brings prior experience in fields such as banking, collections, insurance, background investigations, and credit reporting. Many hold advanced credentials in fraud detection, cyber security, and privacy rights and maintain specialized credentials such as CFE, CITRAM, and CIPP/US. These backgrounds uniquely prepare Kroll’s fraud specialists to translate experience and best practices into action and help people resolve a wide range of identity theft cases. To date, our team has successfully restored over 10,000 identities.
Our partnership has safeguarded more than 1,000,000 people. Our commitment to deliver high-quality assistance to every person we serve is reflected in Kroll’s A+ Rating at the Better Business Bureau and our Customer Satisfaction Score (NPS) of 100.
Kroll & IDShield
End-to-end cyber security services provided by unrivaled experts.Cyber Risk
Remediate and Restore
Call center and breach notification services across myriad industries and geographies.Remediate and Restore
Investigate and Respond
Identify vulnerabilities, intrusions and data ex-filtrations and provide recommended solutions.Investigate and Respond
Prepare and Prevent
Internal and external assessments to evaluate clients' systems, applications, and facilities.Prepare and Prevent