Welcome!

News Feed Item

IdentityForce Announces Social Media Identity Monitoring Suite

IdentityForce, Inc., a pioneer of identity protection solutions and services, today announced the general availability of a new set of identity theft protection capabilities focused on monitoring and alerting members to threats associated with their social media accounts. Wrapped under the technology umbrella of IdentityForce’s Social Media Identity Monitoring (SMIM) suite, these new capabilities cover four major social media identity theft triggers: suspicious activity, hacked accounts, imposter accounts, and scams.

“Social media plays a critical role in many of our daily lives – but it’s clear there are also serious privacy risks,” said Larry Kim, Founder of WordStream and COO of MobileMonkey. “It’s easy to understand how identity thieves scrape personal information off these social networks to even hack into email accounts, or to battle it out on the Dark Web buying and selling personal information. I applaud IdentityForce in understanding the massive influence social media has on the lives of their members and their families, and in turn their commitment to develop a suite of capabilities that will remove the worry and harm and let us all get back to having positive social interactions.”

IdentityForce’s SMIM suite monitors Facebook, Twitter, YouTube, Google+, and Instagram accounts for threatening social network activity and posts that could be perceived as violent, are using profanity, or could even be categorized as cyberbullying or discriminatory. Members can monitor their own social media accounts, those of their children, and other family members. In just seconds, IdentityForce members can activate SMIM’s key features to take control of their digital identity:

  • Suspicious Activity Monitoring | DoSomething.org reports that nearly 43% of kids have been bullied online, with one in four children indicating that it happened more than once. To help protect all members, including children, IdentityForce’s SMIM suite provides robust monitoring and alerting to social media activity that displays content associated with profanity, drugs, violence, discrimination, or sexually explicit language, enabling a rapid response.
  • Hacked Account Monitoring | According to a 2016 Harris Poll survey, nearly two in three U.S. adults with personal social media profiles believe they’ve been hacked. Now, with IdentityForce SMIM, members can proactively respond to potential account hackings, an unexpected locked account, or risky setting changes.
  • Impersonation or Imposter Account Monitoring | According to DARKReading, Facebook reported that for 2015 up to 2% of its monthly average users — 31 million accounts — are false, and Twitter estimates 5%. IdentityForce SMIM equips members with capabilities for monitoring social networks that appear to be impersonating their identity.
  • Scam Monitoring | With 81 percent of millennials checking Twitter at least once a day (Pew Research Center) and 68 percent of U.S. adults on Facebook (Pew Research Center), the ubiquity of social networks has created the perfect breeding ground for spam, malware, or phishing scams. IdentityForce’s members will know in near real-time if there are scams beings posted to their accounts so that they can quickly delete the information and ensure their network is not infected any further.

“Social media networks have become a hunting ground for fraudsters, who cobble together pieces of an identity based on the personal information shared through these sites,” said Steven Bearak, CEO of IdentityForce. “Our product managers surveyed our members and social media identity monitoring continuously surfaced as an increasing priority, especially for those with families. By launching our Social Media Identity Monitoring Suite, we are adding yet another critical layer of protection to ensure our members’ personal information stays safe.”

About IdentityForce

For nearly 40 years, IdentityForce, Inc. has provided best-in-class, highly scalable, award-winning identity theft, privacy and credit protection solutions to consumers, businesses, and government agencies. With IdentityForce, members benefit from the most robust and award-winning identity protection, going as deep as Dark Web monitoring to keep personal information safe. A pioneer of identity protection, IdentityForce’s innovation and customer-centric approach has made the company a trusted partner for both organizations and individuals. IdentityForce also provides custom-tailored programs to organizations enabling them to build closer relationships and additional revenue streams. In 2015, the U.S. government awarded IdentityForce elite Tier One status as an approved provider of identity protection services for data breaches affecting over 21.5 million people. Follow IdentityForce on Twitter, become a fan on Facebook, engage with us on LinkedIn, and join us on Google+. Learn more at www.identityforce.com.

©2017 IdentityForce, Inc. All other trademarks or trade names are properties of their respective owners. All rights reserved.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
As you move to the cloud, your network should be efficient, secure, and easy to manage. An enterprise adopting a hybrid or public cloud needs systems and tools that provide: Agility: ability to deliver applications and services faster, even in complex hybrid environments Easier manageability: enable reliable connectivity with complete oversight as the data center network evolves Greater efficiency: eliminate wasted effort while reducing errors and optimize asset utilization Security: imple...
Mobile device usage has increased exponentially during the past several years, as consumers rely on handhelds for everything from news and weather to banking and purchases. What can we expect in the next few years? The way in which we interact with our devices will fundamentally change, as businesses leverage Artificial Intelligence. We already see this taking shape as businesses leverage AI for cost savings and customer responsiveness. This trend will continue, as AI is used for more sophistica...
In his Opening Keynote at 21st Cloud Expo, John Considine, General Manager of IBM Cloud Infrastructure, led attendees through the exciting evolution of the cloud. He looked at this major disruption from the perspective of technology, business models, and what this means for enterprises of all sizes. John Considine is General Manager of Cloud Infrastructure Services at IBM. In that role he is responsible for leading IBM’s public cloud infrastructure including strategy, development, and offering m...
Digital transformation is about embracing digital technologies into a company's culture to better connect with its customers, automate processes, create better tools, enter new markets, etc. Such a transformation requires continuous orchestration across teams and an environment based on open collaboration and daily experiments. In his session at 21st Cloud Expo, Alex Casalboni, Technical (Cloud) Evangelist at Cloud Academy, explored and discussed the most urgent unsolved challenges to achieve f...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and B...
Recently, REAN Cloud built a digital concierge for a North Carolina hospital that had observed that most patient call button questions were repetitive. In addition, the paper-based process used to measure patient health metrics was laborious, not in real-time and sometimes error-prone. In their session at 21st Cloud Expo, Sean Finnerty, Executive Director, Practice Lead, Health Care & Life Science at REAN Cloud, and Dr. S.P.T. Krishnan, Principal Architect at REAN Cloud, discussed how they built...
The past few years have brought a sea change in the way applications are architected, developed, and consumed—increasing both the complexity of testing and the business impact of software failures. How can software testing professionals keep pace with modern application delivery, given the trends that impact both architectures (cloud, microservices, and APIs) and processes (DevOps, agile, and continuous delivery)? This is where continuous testing comes in. D
The “Digital Era” is forcing us to engage with new methods to build, operate and maintain applications. This transformation also implies an evolution to more and more intelligent applications to better engage with the customers, while creating significant market differentiators. In both cases, the cloud has become a key enabler to embrace this digital revolution. So, moving to the cloud is no longer the question; the new questions are HOW and WHEN. To make this equation even more complex, most ...
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across business networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost as well as advance trade. Are you curious about how Blockchain is built for business? In her session at 21st Cloud Expo, René Bostic, Technical VP of the IBM Cloud Unit in North America, discussed the b...
SYS-CON Events announced today that Synametrics Technologies will exhibit at SYS-CON's 22nd International Cloud Expo®, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. Synametrics Technologies is a privately held company based in Plainsboro, New Jersey that has been providing solutions for the developer community since 1997. Based on the success of its initial product offerings such as WinSQL, Xeams, SynaMan and Syncrify, Synametrics continues to create and hone in...
With tough new regulations coming to Europe on data privacy in May 2018, Calligo will explain why in reality the effect is global and transforms how you consider critical data. EU GDPR fundamentally rewrites the rules for cloud, Big Data and IoT. In his session at 21st Cloud Expo, Adam Ryan, Vice President and General Manager EMEA at Calligo, examined the regulations and provided insight on how it affects technology, challenges the established rules and will usher in new levels of diligence arou...
Nordstrom is transforming the way that they do business and the cloud is the key to enabling speed and hyper personalized customer experiences. In his session at 21st Cloud Expo, Ken Schow, VP of Engineering at Nordstrom, discussed some of the key learnings and common pitfalls of large enterprises moving to the cloud. This includes strategies around choosing a cloud provider(s), architecture, and lessons learned. In addition, he covered some of the best practices for structured team migration an...
The 22nd International Cloud Expo | 1st DXWorld Expo has announced that its Call for Papers is open. Cloud Expo | DXWorld Expo, to be held June 5-7, 2018, at the Javits Center in New York, NY, brings together Cloud Computing, Digital Transformation, Big Data, Internet of Things, DevOps, Machine Learning and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding busin...
No hype cycles or predictions of a gazillion things here. IoT is here. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, an Associate Partner of Analytics, IoT & Cybersecurity at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He also discussed the evaluation of communication standards and IoT messaging protocols, data...
Companies are harnessing data in ways we once associated with science fiction. Analysts have access to a plethora of visualization and reporting tools, but considering the vast amount of data businesses collect and limitations of CPUs, end users are forced to design their structures and systems with limitations. Until now. As the cloud toolkit to analyze data has evolved, GPUs have stepped in to massively parallel SQL, visualization and machine learning.