Identity monitoring that keeps
your personal info secure

24/7 monitoring of your email addresses, bank accounts and more.**

Windows® | macOS® | Android™ | iOS®

How does McAfee protect your identity?

Early detection

Get notified up to 10 months sooner than similar services.

Easy setup

Get protected quickly with a guided
identity experience.

Extensive monitoring

Keep tabs on a wide range of your personal info.

Pick a plan that’s just right for you

How our identity monitoring service works

1

Getting set up

Enroll in identity monitoring. We’ll monitor the most critical details of your life online.

2

Proactive, guided protection

Get quick and guided help to secure your identity, should your personal info be found online.

3

Secure your identity

Get tips to quickly and effectively secure your identity today, while making it harder to steal your info tomorrow.

We’ve got your back

Guided, personalized online protection that makes being safe simple, wherever you are.

Simple steps to better protection

Protection Score checks the health of your online protection and provides simple instructions to improve your security. Knowing how safe you are is the first step toward a safer life online—what’s your Protection Score?

Proactive, guided protection

The steps you take before and after a data breach are crucial to keeping the risk of identity theft low. We’ll help guide you to the best choices for prevention and keep you in the know in case action is needed.

Get alerted 10 months sooner

If we detect that your data was stolen, you’ll be alerted up to an average of 10 months before our competitors, so you can take action before your data is used illegally.

Wherever, whenever you connect

With an active internet connection, it doesn’t matter if you’re on smartphone, laptop or tablet, at home or on-the-go. Get the same alerts and experience anywhere, so you can check, click, solve, and carry on.

FAQs

These answers might help.

What is identity theft?

Identity theft refers to the unauthorized use of an individual’s personally identifiable information (PII), such as name, social security number, bank information, and other sensitive information that can compromise a person’s privacy, security, and financial assets.

How do I protect myself from identity theft?

You can protect yourself against identity theft by securing your personal information — online and offline. Make sure to engage in best practices such as using strong passwords, protecting your devices with updated security software, monitoring your bank transactions, securing your personal documents, and minimizing the amount of information you share online. ​

For proactive protection, McAfee® can actively monitor your sensitive information and give step-by-step guidance when you need it the most.

What should I do if I'm the victim of identity theft?

Begin by analyzing the situation and reviewing the compromised information. Then, notify the relevant authorities, such as your bank, coverage agency, a local police station, or a national cybercrime complaint center. While the relevant authorities are helping you with the case, check and secure your financial accounts, devices, and proof of identity. ​

What is the most common form of identity theft?

The most common form of identity theft is financial identity theft, which refers to any type of theft when someone uses another individual’s information for financial gain. Some examples are New Account Fraud, Account Takeover Fraud, Business Identity Theft, and Tax-Related Identity Theft.

Advice from our security experts – just for you

Cybersecurity and mobile applications

Cybersecurity and mobile applications

In the era of smartphones and digital connectivity, mobile applications have become an integral part of our daily lives. From banking to social networking, we entrust mobile apps with sensitive information, making cybersecurity a critical consideration. In this blog,...

read more
The vulnerabilities in wireless mobile data exchange.

The vulnerabilities in wireless mobile data exchange.

The proliferation of wireless mobile data exchange has revolutionized the way we connect, communicate, and access information. However, this convenience comes with its own set of vulnerabilities, exposing users to potential security risks. In this blog, we will delve...

read more
Ethical considerations in cybersecurity practices

Ethical considerations in cybersecurity practices

In the ever-evolving realm of cybersecurity, where the battle between defenders and attackers is relentless, ethical considerations play a pivotal role in shaping the landscape. As organizations strive to protect sensitive information and individuals seek to safeguard...

read more