Coronavirus Scams are on the Rise

Coronavirus Scams are on the Rise

COVID-19 is a breeding ground for scams. The Federal Trade Commission (FTC) has alerted consumers that scammers are taking advantage of the panic and fear surrounding the global pandemic. “They’re setting up websites to sell bogus products, and using fake emails, texts, and social media posts as a ruse to take your money and get your personal information,” remarked Colleen Tressler, Consumer Education Specialist, FTC. There are also malicious apps being developed, one of which is an Android tracker app that supposedly allows users to keep an eye on the spread of the virus, but locks victims’ phone and demands money to unlock it.

 

Phishing scams may come across as emails and/or posts promoting coronavirus awareness. These messages will often offer prevention tips on how to stay well, what the symptoms of the virus may include and what to do in case you or a family member feel ill. Some are creating fake “cases” of COVID-19 in your neighborhood so you feel more inclined to help out. “They also may be asking you to donate to victims, offering advice on unproven treatments, or contain malicious email attachments.” Don’t fall for it.

 

Here are some tips to help you keep the scammers at bay:

– Do not click on any links from sources you do not know. Doing so could download a virus on your equipment.

– Be on the lookout for phishing emails that appear to be from the Centers for Disease Control and Prevention (CDC). The CDC will not email you. The World Health Organization (WHO) will not email you either.

– Ignore offers for vaccinations. Many ads exist touting prevention, treatment, and cure claims. They are not legitimate.

– Do not donate cash, purchase gift cards, or wire money without investigating the request in full. See the FTC’s article “How to Donate Wisely and Avoid Charity Scams” for more information.

– The Securities and Exchange Commission (SEC) is warning about false “investment opportunities.” Be aware of online promotions, including on social media, claiming that the products or services of publicly-traded companies can prevent, detect, or cure coronavirus and that the stock of these companies will dramatically increase in value as a result.

 

Be smart. Be vigilant. Be strong. Please don’t hesitate to reach out if you need help. We are available 24/7/365 for you and your family members at 1.888.966.GUARD (4827) and [email protected].

Tips to Lower Your Fraud Risk this Tax Season

Tips to Lower Your Fraud Risk this Tax Season

It’s tax season! For some, preparing and filing taxes is an hour or two-long process; for others, it’s a week or more. By year-end, the majority of us know if we will owe or if we are due to receive a refund … it’s just a matter of how much … and we are happy that everything is completed once tax season is over. Things don’t typically go awry, but tax-related fraud does happen. Knowing how to lower your risk and knowing what to do if it does occur to you, will help prevent the lasting damages to your wallet and credit score.

 

Let’s say for this example that you will be receiving a refund. Imagine looking forward to getting that money so you can pay off those holiday bills or plan that special vacation you’ve been day-dreaming of (or perhaps both if you’re lucky). After preparing your taxes, you happily press “send.” But then WHAM! … your return is rejected by the Internal Revenue Service (IRS) because they already received one for you. How could that happen and what do you do if it does?

 

Tax identity theft is when someone uses a stolen Social Security number (SSN) to file a tax return. You may be wondering, “Why would someone want to do this if I will actually owe taxes?” Even if you aren’t expecting a refund, you are still at risk. Thieves can enter fake income using your SSN in order to trick the IRS into giving a refund but, instead of that money going to you, it is actually wired to the criminal’s account. Even though the IRS has made significant efforts to help stop fraud cases in their tracks in recent years, it still happens.

 

Is tax fraud preventable? No. Are there steps you can take to help reduce your risk? Yes.

 

– Time is of the essence. Prepare and file your return as quickly as possible before someone else does it for you.

 

– Protect your personal identifying information (PII) by: 1) shredding documents that you do not need for tax preparation; 2) keeping your SSN card in a safe deposit box; 3) taking any outgoing mail to your local post office (do not put any mail with PII in your own mailbox – even though federal mail theft is a felony, it still happens); 4) getting your mail as soon as possible after it is delivered; 5) not responding to a phone call asking for or requesting that you confirm any PII (the IRS and legitimate companies will not initiate contact with you for this information unless you have reached out to them first); 6) not opening email attachments or clicking on any links that are not familiar to you; and 7) keeping your personal devices on lockdown unless you are using them (utilize firewalls and keep your anti-virus protection software up-to-date).

 

– If you think your PII has already been compromised, consider putting a free fraud alert on your credit file. There are two options: 1) an initial fraud alert, which is free and will last 90 days or 2) an extended fraud alert, which can be $10 or more but can last up to seven years.

 

– Be aware of the latest scams. Read our blogs on the topic: New Year Scam 2020 Style and Scams, Scams and More Darn Scams

 

– Actively monitor your accounts. You can access your tax account history (and see if someone has already filed for you) at https://www.irs.gov/.

 

– Get a trustworthy tax preparer. There are people who pose as tax preparers as well as online filing services that may promise you a bigger refund and/or may make questionable deductions for you in order to increase their fee. If you are seeking professional help, make sure it is from a certified tax professional or certified public accountant.

 

If your tax return is rejected due to being a ‘duplicate,’ an Identity Theft Affidavit (IRS Form 14039) should be filed as soon as possible to let the IRS know that someone else is using your identity. Contact Guard Well’s Member Services at 1.888.966.GUARD (4827) immediately if needed. A team member is always available 24/7/365. You can also email us at [email protected]. Happy filing!

 

 

Cybersecurity Trends in Store for 2020

Cybersecurity Trends in Store for 2020

Did you know that the first documented ransomware attack was more than 30 years ago in 1989? That was around the time when a mobile phone was called a bag phone because it sat in a big black bag in your passenger seat … and that curly cord was wound so tight it hardly let it extend to your ear. If you were lucky, you could store about 30 numbers in it. But back then, that was pretty amazing storage. Then flip phones started to make our lives easier in later years. It was pretty simple but the fact that it could actually fit in your pocket made it truly mobile. There was rarely a thought that anyone was listening in on your conversations or tracking your locations (which they probably were but the average person didn’t think doing so was devious). Boy, have times changed.

 

Attacks involving ransomware, which were originally designed to target individuals, are occurring every 14 seconds now. Shocking isn’t it. After you read this sentence, focus on how long it takes you to breathe … inhale and exhale. Your full circle breathing process is likely anywhere from six to eight seconds, which is how long hackers are trying to increase the speed of ransomware attacks by this time next year.

 

Dave Wallen discussed some of the expected 2020 cybersecurity trends in a blog last week for Security Boulevard so we all can be “better prepared against the ever-evolving nature of cyber threats.” He wrote, “With today’s pervasive use of the internet, a modern surge in cyberattacks and the benefit of hindsight, it’s easy to see how ignoring security decades ago was a massive flaw.” It’s not just the speed of the attacks that is alarming, it is the variety of them that are going to keep things interesting for 2020.

 

So what are some of the trends we will be seeing in 2020?

 

Fear will drive spending. Gartner forecasts that worldwide spending on cybersecurity is going to reach $133.7 billion in 2022. The General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) have pushed businesses and government agencies to a more sophisticated cybersecurity infrastructure than ever. Wallen noted that 76% of organizations plan to increase their cybersecurity budgets this year.

 

The cybersecurity labor market will continue to experience labor shortages. There are many reasons for this skills gap. Not only are there more cybercriminals, but there are also more places for scammers to hide with our ever-expanding reliance on technology. Also, there still needs to be a balance of expanding skills in a very specific area with teaching broad skills that can be useful across many sectors. Think of those with titles such as chief information officer (CIO) and chief information security officer (CISO) – they are currently undervalued.

 

Cloud security will require a more pragmatic approach. The assumption that our data is secure on ‘the cloud’ in applications such as Microsoft and Google will be a thing of the past. In 2019, we saw massive attacks against Office 365 and G Suite that can bypass two-factor authentification making shared accounts exceptionally vulnerable.

 

Mobile devices will become even a greater target. As the number of mobile users increases, so will the amount of business data stored in them. Wallen wrote, “It’s a compelling reason why mobiles are seen as the primary cyberattack vector in 2020.”

 

Election security will be off the charts. With over 70 elections globally planned in 2020, there will be an intense focus on the spreading of disinformation.

 

5G, the fifth-generation wireless technology, will cause an increase in loT-based (Internet of Things) attacks. There will need to be a higher level of security which many current vendors are not able to provide yet. Hackers will take advantage of this gap to “sneak in malware and steal large volumes of your SaaS data at breakneck speed.”

 

AI (Artificial Intelligence) will become even more two-faced. While the benefits of AI are countless and help to protect our security, defakes (fake videos) that can spread misinformation will become more prominent and new types of cyberattacks will result because of them.

 

Organizations will continue to see their biggest asset, their employees, become their biggest threat. As reported in Governing.com, “The problem is that now our most important information, whether it’s sales prospects or customer lists or source code … is spread across the organization and is highly portable on a thumb drive or e-mail … information is less ‘siloed.'” Their study shows that “63 percent of people admit that they took data from their last job and brought it to their current job.”

 

We will also continue to see more fake apps and shopping cart viruses, new account fraud, apps that share our data along with phishing scams (and whaling scams if you’re a high-ranking executive or banker). Identity theft will also be rampant through social media. Lastly, child identity theft will continue to rise. It is suggested that every child have a credit freeze on their file. If you would like more information about how to do so, please reach out to our Member Services team at [email protected] or call 1.888.966.4827. We are here to help 24/7/365.

New Year Scam 2020 Style

New Year Scam 2020 Style

It’s not just a new year … it’s a new decade. Not quite the ‘Age of Aquarius’ type of timestamp, but a new decade brings hope and positivity for our families and futures. It’s around this time in mid-January that many of us realize, “Hey, that exercise plan I agreed to do on January 1st at 12:06 am, that was just an example, not something I actually have to do on a daily or weekly basis and certainly not for the next ten years!” By the way, the same goes for those clean eating goals, too. If you can eat clean four or even five out of seven days, you’re likely in the bonus.

 

On average it takes about two months for a new behavior to become a habit (or if you are a supporter of the 21/90 rule, it may take a bit longer). Why is this a topic in our blog? Because how we write the year out today is going to have to break an old habit of abbreviating it, as many of us have done for the last nine years. The simple truth is that scammers are trying to forge our documents when we just write ’20’ instead of ‘2020.’

 

As reported by CNN’s Harmeet Kaur, “When the year 2020 is abbreviated on official forms and documents, those looking to exploit unsuspecting people can easily manipulate those numbers and leave people potentially vulnerable to fraud.” Auditors and police departments around the country have been notifying the public that when you write a date on a document, to not shorthand the year 2020 to just ’20.’ A document dated 1/4/20 can easily be changed to 1/4/2021 by adding two numbers at the end. Or, it could go the opposite way … a creditor could say you owed money from 2019 just by adding ’19’ after the ’20.’

 

Just putting forth a little effort in writing 2020 out in full, which will eventually become habit if done often enough, is a small step toward protecting you and your family from check or document fraud.

 

From the entire team at Guard Well, we wish you a wonderful, happy and prosperous 2020. If you suspect that fraud has happened to you, we are available 24/7/365 at 888.966.GUARD (4827) and [email protected].

 

Founder and CEO on iHeartRadio 700WLW Podcast

Founder and CEO on iHeartRadio 700WLW Podcast

On December 5, 2019, Guard Well Identity Theft Solutions Founder and CEO was interviewed by Rocky and Rachel on Cincinnati’s News Radio 700WLW. Topics discussed during the ten-minute segment (51:50 to 60:52) include the risk of living in a technologically advanced society, what a digital footprint is and how to reduce the risk of your data being collected and sold online.

 

“We all have a social security number. We are all at risk. If you haven’t already been victimized by identity theft or identity fraud, it’s going to happen. It’s a sad reality…” Guard Well’s Founder and CEO stated that there are 3.5 million Google searches every minute and 4.3 billion Facebook posts every day “…all of that information is being collected and sold.”

 

What can be done to help reduce this risk?

– Be careful about what information you put on social media. For example, remove your birthdate from your Facebook account.

– When you search online, do it privately. Don’t allow cookies if possible when looking at websites.

– Try not to share your location with Google Maps.

– Inactivate and delete any old email accounts.

– Search for your own name on Google and see what pops up. If your name is listed on People Search or People Finder, you can submit a request for them to pull your information down.

 

Additionally a service site called DeleteMe.Com was discussed that will facilitate users in deleting their presence on other sites and will provide information on privacy laws in multiple countries to better educate the users on their rights in relation to data privacy.

 

To listen to the full podcast, visit https://www.iheart.com/podcast/eddie-rocky-20799661/episode/rocky-and-rachel-12519-53509284/?fbclid=IwAR2zfrqzsSc8c08pB3-YOiBR6WH3k3jszEVWPJytlzSlnyvJ3qVihPD7j6c

How to Detect a Fraudulent eCommerce Site

How to Detect a Fraudulent eCommerce Site

The Washington Post just reported that U.S. consumers are expected to shell out a record $9.4 billion today on Cyber Monday, a 19% increase from last year. While Walmart, Target, Best Buy and Amazon are many holiday shopping ‘go-to’ websites, there are many others that you may visit, especially when looking for that perfect personalized gift. Unfortunately, fake eCommerce websites and scams during the holiday season are on the rise.

 

How do you decipher a legitimate website from a fake one? Yes, it is confusing … and that is by design. It’s not easy. There are some detailed things to watch out for:

 

– Scammers’ tactics include manipulation and will urge you to purchase. If you’re trying to make a purchase online and are offered help with the checkout process, do not give any personal identifying information (PII) in a chat room. If you are asked to do so, exit immediately.

 

– Hover over hyperlinks to make sure they’re going to a legitimate website. If there isn’t a padlock symbol and an ‘https’ in the address bar, exit immediately.

 

– A legitimate retailer will have full contact details, including address, email and phone number, on the website. If any of those are missing, exit immediately.

 

– Check out the website’s customer reviews. While many are legit, if you read beyond the star rating and check the reviewer’s history (especially if it is a very positive post), you may find that the reviewer uses the same phrases for other products and companies. Red flag! Also, if their reviews are not specific about the product, they have reviewed the same product before or they do not give useful feedback, recognize that they may not be legitimate and … guess what? … exit immediately. There are online tools such as Fakespot that can help you determine a customer’s review reliability.

 

– Don’t use a debit card for online purchases. Credit card companies won’t insure your purchase if you use a debit card. Dedicate one credit card for all online purchases and check the statement often. If you see any unusual activity, dispute the transaction immediately.

 

If you suspect identity theft or fraud, please contact us day or night at 888.966.GUARD (4827) or email [email protected]. We’ve got your back and are always open for you.

Scams, Scams and More Darn Scams

Scams, Scams and More Darn Scams

Did you know that there are at least 48 different types of identity theft and the number of scams involved in each is growing daily? Romance scams, residence scams, utility scams, employment scams, telephone scams, email scams, charity scams, Apple care scams, AirBNB scams, PayPal scams, census scams, ticket scams, government scams, medical scams, insurance scams, real estate scams, investment scams, lottery and sweepstakes scams … there really isn’t one facet of our lives that isn’t ‘scam-able.’ As the weather turns colder, it kind of makes you want to curl up under an electric blanket and hibernate for a bit doesn’t it!

 

Although everyone with a social security number is at risk for identity theft, there are two groups that are targeted more often: children and seniors. The U.S. Department of Health & Human Services has studied why. They explain, “Children are targeted to establish a ‘clean slate.’ Seniors are targeted over the telephone and through phishing scams. Some studies suggest that people become more trusting as they age, which helps to explain why it’s more difficult for older adults to detect fraudsters.”

 

The next high-risk group that follows children and seniors are the military mostly due to deployment, which impacts their ability to respond to a threat in a timely manner. According to the Federal Trade Commission, military consumers are most affected by credit card and bank fraud. Another high-risk group is identity theft repeat victims. As reported in Consumer Affairs, “people who have previously been affected by identity theft are at a greater risk for future identity theft and fraud.” According to the Center for Victim Research, “7-10% of the U.S. population are victims of identity fraud each year and 21% of those experience multiple incidents of identity theft.”

 

Lastly, the deceased are targeted. Stealing a dead person’s identity, commonly known as “ghosting,” will often go unnoticed by surviving family for months or years. A report dating from 2012 stated that 2.5 million deceased American identities are stolen each year. Of those 2.5 million stolen identities, 800,000 were used to open lines of credit or get a mobile phone plan.

 

Fraudsters oftentimes repeat their favorite most lucrative scams, which are driven by major financial life moments, such as taxes and holiday shopping. Yes, it’s getting to be that time of year, and, guess what … the world’s largest online retailer, Amazon, is seeing a huge increase in fake Amazon.com order cancellation scams. If you receive an email about an order cancellation from Amazon, there’s a good chance it’s a scam. Click on links in the email and you could unintentionally download malware onto your device. Or you might be sent to a site that aims to collect your Amazon account information, like your username and password. If you receive such an email and recently placed an order, go to Amazon.com directly to check your order status.

 

Most of our blogs offer tips to help protect yourself and your family from identity theft. There is one tip in this blog: Remain aware of scams and that they can touch every facet of your life. By staying in-the-know, you can help every month be National Cybersecurity Awareness month … not just October.

 

If you suspect that you or a loved one has suffered identity theft, please reach out to us as soon as possible. Our Guard Well member services team is available around the clock, every day of the year. Email [email protected] or call 888.966.GUARD (4827) for help.

SIM Swap Attack – the New Hijack

SIM Swap Attack – the New Hijack

Imagine no texting, no service, and no data for a minute. Yikes! Halloween or not, the lack of being able to connect is a very scary thought and it can happen to any of us due to a tiny piece of plastic called a SIM card. There is a SIM (subscriber identity module) in every mobile device and it is what connects the user to a cellular network. Unfortunately, there is a wide-spread SIM swap hack that allows a thief to hijack your cell number.

 

Also known as a port out scam, simjacking, swim swapping, and SIM splitting … this latest scam can wreak havoc in all of your accounts associated with your mobile phone number. Everyone with a cell phone is at risk of this type of takeover. The PEW Research Center, a nonpartisan organization based in Washington D.C., reported this year that 96% of Americans have a cellular device and 92% of them go online daily. Considering that there are approximately 330 million Americans, that’s a pretty large target market from a hacking standpoint. No one is immune. A number of high profile attacks have occurred via Instagram and Twitter. The website wired.com reported that Twitter CEO Jack Dorsey’s own twitter account was hacked via this method this year.

 

What is a SIM Swap?

This type of scam is an account takeover fraud. It targets a weakness in two-factor authentication and two-step verification in which the second factor (step) is either a text message or a call placed to a mobile telephone. This is achieved by the fraudster impersonating the victim using personal details to appear authentic and claiming that they have lost their phone. The victim’s phone will then lose connection to the network and the fraudster will receive all the SMS and voice calls intended for the victim. This allows them to intercept any one-time passwords sent via text or telephone calls sent to the victim, and thus to circumvent any security features of accounts (such as bank accounts, social media accounts, etc.) that rely on text messages or telephone calls.

 

Damage from a SIM swap can have a snowball effect. Since the scammer would be armed with your login credentials, not only can they steal your money, take over your email and social media accounts, but they can lock you out of them all and open up a new cellular account in your name … or buy that new phone you’ve been eyeing for months but won’t have the joy of using yourself.

 

Is a SIM swap preventable?

No. It’s impossible to completely prevent someone from gaining access to your phone number through a SIM swap due to the fact that the scam requires no misstep on your part (such as clicking on a bogus link). All the scammer needs to do is convince your carrier that they are you and to transfer your phone number to their SIM. As described by Michael Grothaus with Fast Company, “There’s nothing inherently shady with doing a SIM card swap. If you lose your phone or your SIM card is damaged, for instance, you might go to a mobile carrier store or even call up customer service to have your number transferred to a new SIM.”

 

Even though you can’t prevent a swap from happening to you, there are ways to make it more difficult for a scammer. Grothaus suggests to use an authenticator app such as Authenticator by Google, Microsoft AuthenticatorLastPass Authenticator, and 1Password. A single authenticator app can handle all your authentication codes no matter how many different accounts you use.

 

Other courses of action you can do to help prevent a swap include:

– Limit the personal information you share online. Identity thieves will find information to answer the security questions you may have set up to verify your identity. For example, if one of your security questions is, “What is my high school mascot?” and you list your high school name on your Facebook account and that information is not on a private setting, it’s not difficult for a good sleuth to figure out your mascot’s name.

– Set up a PIN for your cellular account and do not share it with anyone.

– Do not reply to calls, emails and SMS messages that could be a phishing attempt to request your personal data. Make sure to read our blog “Accidentally Clicked on a Phishing Link – Now What” to get up-to-speed on phishing scams.

 

The Federal Trade Commission offers a few tips on what to do if you suspect that you’ve been swapped:

– First, contact your cellular service provider immediately to take control of your phone number. After you re-gain access to your phone number, change your account passwords.

– Check your banking, credit card and insurance statements for unauthorized charges or changes to your profile.

– Call your identity theft resolution provider. A Guard Well Member Services team professional is always on hand for you 24 hours a day, seven days a week and every day of the year … yes, even Halloween. There are enough tricks flying around. Here’s to receiving a treat this year!

 

 

BBB’s Torch Awards for Marketplace Ethics

Join us in celebrating businesses and charities that go above and beyond to exemplify ethical behavior and create a trusted marketplace. We are a proud sponsor of the Better Business Bureau’s Torch Awards event, which will take place Friday, October 18th at the Sharonville Convention Center 11:30am – 1:30pm.

 

2019 Torch Award Winners include:

– Camp Joy

– The Basement Doctor of Cincinnati

– Ace Exterminating Co.

– Deviant Designs Tattoo Studio

– Impact 100, Inc.

 

We look forward to honoring these exceptional organizations. For more information and to reserve your seat, visit torchtickets.org or click HERE.

DoorDash Data Breach: How to Tell if You’ve Been Hacked

DoorDash Data Breach: How to Tell if You’ve Been Hacked

Remember when home-cooked meals happened six nights a week instead of just during the holidays? I don’t really do either. Delivery is indeed a major convenience though. From groceries and prescriptions to corporate lunches, family dinners and late night snacks, if you can order it on an app, such as Uber Eats, it can be on your doorstep in about an hour. Yes, delivery is a major convenience but, just like with everything in life, there are risks and your data can be compromised. Just ask the almost $5 million DoorDash users, merchants and workers who were recently hacked. Hits a little too close to home.

 

Consumer behavior, along with the concept of dinnertime itself, have both evolved in the past few years, making food delivery one of the the newest up and coming fads. The industry, referred to as third party logistics, is experiencing “unprecedented growth to the tune of $43 billion in deliveries (2018) and is forecasted to rise to $76 billion by 2022.” As reported in Barron’s, GrubHub this past spring was losing the food-delivery war with DoorDash stealing the show. “For the industry, DoorDash’s pace of share gain is the dominant trend,” reported KeyBanc analyst Andy Hargreaves, March, 2019. DoorDash just recently surpassed Uber Eats as the second-largest food-delivery service in the U.S. after GrubHub. We regularly use all three providers, but with a preference for DoorDash only because of the availability of restaurant choices.

 

What actually was hacked?

The latest report according to Business Insider, detailed that the breach occurred in May and affects some users who started using the DoorDash app before April 5, 2018…. “DoorDash said an unauthorized third party was able to access some users’ profile information, including names, email addresses, delivery addresses, order history and phone numbers.” The article continued to report that the last four digits of some consumers’ credit cards were also accessed, but not full card numbers or CVVs. “For some delivery workers and restaurants, the unauthorized third party accessed the last four digits of bank-account numbers.” DoorDash did announce that the “credit card and banking information is not sufficient to make fraudulent charges or withdrawals.” That gives us a little peace of mind. Maybe.

 

How do you know if you were hacked?

DoorDash reported to Business Insider that it had begun contacting people affected by the data breach and will continue to do so as they become known. The company did recommend that even those who hadn’t been contacted by DoorDash regarding the breach should still change their password immediately to be safe.

 

– If you signed up for DoorDash after April 5, 2018, your data is likely safe. If you can’t recall when you signed up, contact them to find out.

– Check your bank account(s) which are tied to your DoorDash account for fraudulent activity. Hackers count on people not reviewing every item on their credit card and bank statements.

– Contact your identity theft solutions provider immediately and especially if you notice anything “off” in your statement(s).

– Do you use the same password for multiple accounts? We recommend that your passwords are updated on a routine basis and that the same one isn’t used across multiple accounts.

 

Hackers will continue to hack. That is a definite certainty in this day and age. When we set up any type of home delivery, it is unnerving to not be able to trust that they will keep us safe as well as our food. Maybe we all should go back to those home-cooked meals … now, how do you turn the oven on again?

 

Need help? Our Member Services team is here for you 24/7/365. Call us at 888.966.GUARD (4827) or email [email protected].

 

References:

Fortune. Morris, Chris. “DoorDash Data Breach: What to Do If Your Account Was Compromised.” September 27, 2019.

Business Insider. Holmes, Aaron. “DoorDash Hack: How to Tell If You’re Affected.” September 26, 2019.