Author Archives: Heidi Daitch

About Heidi Daitch

Heidi is a busy working mom who juggles many of the same responsibilities and challenges at home and at work - a long list of things to do and not enough time to do everything. With so little time, Heidi tries hard to find simple, but effective strategies to save time for what’s really important – spending time with her family.

3 Essential Identity Theft Protection Tips for the New Year

A new year always feels like a fresh start. Maybe this is the year you’re finally going to stress less, eat better and be active. Or maybe you just have one goal, like keeping on top of work projects or …Read More […]

Posted in Data Breach & Technology, Identity & Privacy | Leave a comment

Cell Phone Identity Theft and Kids Safety

Is Dora a Spy? How to Boost Cell Phone Identity Theft Safety for Kids With everything from games and educational content to charming videos, apps for kids tend to be lively and colorful. Unfortunately, they also have a bad habit …Read More […]

Posted in Identity & Privacy | Leave a comment

Do We Still Need to Care About Data Breaches?

Another day, another data breach. When it comes to information security, data breach risk may seem so commonplace that it’s easy to become desensitized to it. With so many alarm bells sounding, how do you know what might affect you …Read More […]

Posted in Data Breach & Technology | Leave a comment

Holiday Shopping Safety

A few weeks ago, we told you about how to stay safe while doing your online holiday shopping. So, hopefully, you’re sitting on your couch with a hot cocoa and quickly crossing items off of your holiday list. However, what …Read More […]

Posted in Data Breach & Technology, Identity & Privacy | Leave a comment

Identity Theft Protection Services: How They Work

Working in the identity theft protection industry, I’m often challenged by people who think that they can manage their identity on their own. You can, but here’s what you should know about identity theft and why you should consider identity …Read More […]

Posted in Credit Fraud & Monitoring, Identity & Privacy | Leave a comment