- Getting Started With BlackCloak
- BlackCloak Services
- Home Blurring Set Up
- Understanding the BlackCloak App
- How to Access The Sliding Menu in the BlackCloak Mobile Application
- Updating Your Device's Operating System Through the BlackCloak Mobile App
- Adding Assets to the BlackCloak Mobile Application
- Helper Tool Warning - Mac OSX
- Common Reasons Why Your Device May Be Red or Orange
- How to Turn Orange Lights to Green in Your BlackCloak App
- Logging into BlackCloak (Desktop)
- Logging into BlackCloak (Mobile)
- Understanding the Colors in the App
- How to Add Assets in the BlackCloak Mobile App
- BlackCloak Mobile App
- Credit Freeze and Fraud Alert Links: ChexSystems Freeze and IRS Identity Protection PIN
- Mobile Application Dashboard
- Mobile App Dashboard - Homes Tile
- Mobile App Dashboard - Privacy Tile
- Mobile App Dashboard - Peace of Mind Tile
- Mobile App Dashboard - Devices Tile
- Concierge on the Mobile Application
- Activity on the Mobile Application
- Trusted Apps on the Mobile Application
- Accessing Your Profile on the Mobile App
- Checking Your BlackCloak Mobile App's Permission Settings
- BlackCloak Desktop Application
- VPN Set Up
- Product Announcements
- FAQs
- QR Code Scanner
- Client Guides
- Privacy and Security Basics
- Mobile Hardening Guides
- Understanding Data Breaches: What It Means When Your Data is Compromised
- How to Respond to Different Types of Exposed Personal Information in a Data Breach
- AI Models: Privacy, Security Risks, and Pros & Cons
- An Overview of Scareware
- An Overview of Deepfakes
- Best Practices for Responding to Cyberstalking
- How to Handle Cyberbullying
- Careful Use of Public Wi-Fi
- An Overview of the Internet of Things and Security
- Best Practices for Remote Work Security
- Using Remote Access Software Safely
- How to Encrypt a Flash Drive on Windows and Mac
- Steps to Take After Receiving a Data Breach Notification Letter
- Security Consideration Around AirTags
- Considerations When Choosing an Email Provider
- How to Create Email Filters
- Physical Two Factor Authentication Methods
- An Overview on Data Brokers
- WhatsApp Hardening Guide
- Snapchat Hardening Guide
- Instagram Hardening Guide
- TikTok Hardening Guide
- LinkedIn Hardening Guide
- Twitter Hardening Guide
- Facebook Hardening Guide
- Enabling a Passcode On Your Mobile Device
- ChatGPT Privacy and Security Considerations
- Securing Your Email Account
- Keep Your Browser(s) Updated
- Updating/Upgrading Mobile Devices or Computers
- Helping Children Stay Safe Online
- Social Engineering Red Flags
- Virtual Private Network (VPN) Overview
- Brave Browser Settings iOS/Mac OS/Windows
- How to Securely Wipe Devices
- ChromeBook Security Hardening Guide
- Apple Watch Security and Privacy Recommendations
- Zoom Conference Security
- Mail Fraud, Mail Theft and USPS Informed Delivery
- How to Check the Extensions on Your Browser
- AI and "Vishing:" An Overview and Preventative Measures
- What to Do When You Are Impacted By a Data Breach
- Best Practices for Keeping Children Safe Online
- Resources for Children and Parents for Staying Safe Online
- An Overview of SIM Hijacking
- Parental Controls for Popular Video Games/Discord
- An Overview of Home Title Theft
- Online Account Management
- BlackCloak Update for macOS Devices
- Wireless Carrier Security
- How to Deactivate a Twitch Account
- How to Delete Your WhatsApp Account
- How to Delete Your Snapchat Account
- How to Deactivate a TikTok Account
- How to Delete a YouTube Channel
- How to Deactivate Your LinkedIn Account
- How to Deactivate Your Facebook Account
- How to Deactivate and Delete Your Instagram Account
- How to Deactivate Your Reddit Account
- How to Deactivate Your Twitter Account
- Managing Amazon Alexa and Google Home Recordings
- Home Network Security
- Opt-Out/Data Removal
- How To Prevent Spam Calls
- Removing Information from Google
- A List of Uncooperative Data Brokers
- Adjusting Privacy Settings for Your Mobile Accounts
- Data Broker Removal - Sites
- Removing Photos from Zillow
- Wiping and Reloading a Mac Computer
- 5 Year Electronic Opt-Out Prescreen
- What is the Do Not Call Registry?
- ID Theft Protection & Monitoring
- Why Credit Freezes and Fraud Alerts Are More Than Enough
- How to Handle Identity Theft Involving Minors
- How to Request Free Credit Reports
- What to Know About Social Security Numbers and FAFSA
- What To Do If You Are a Victim of Identity Theft (or suspect you could be)
- Why and When should you place an extended (7 yr) fraud alert with the Credit Reporting Agencies?
- Placing Credit Freezes with Smaller CRAs
- Victim of Tax Fraud or Concerned You Could Be? What Should You Do?
- SSN Has Been Compromised or You Suspect It's Been Compromised? What Should You Do?
- What To Do If You're a Victim of Unemployment Fraud
- Identity Theft Protection and Credit Monitoring Overview
- Credit Freeze and Fraud Alerts
- IDnotify Enrollment Steps
- When and How to Report Fraud to the FTC
- How to Report Identity Theft to the FTC
- Financial Privacy
- Personal Security
- Password Management
- Dual Factor
- Travel
- Client Guide Topic Requests
- Privacy and Security Basics
- Concierge Assistance
- Cybersecurity Alerts
- 2024
- November #1 - Apple Addresses Security Flaws With Updates
- September #3 - macOS Update, MC2 Data Leak
- September #2 - iOS 18 Released and a Warning on Brushing Scams
- September #1 - Warning About Latest Sextortion Phishing Scam
- August #2 - Google Issues New Security Patch For Chrome
- August #1 - National Public Data Breach
- May #2 - Apple and Google Release Security Updates
- May #1 - Google Releases Security Patch For Chrome
- April #1 Apple Spyware, Chirp Smart Lock Flaw, Roku Account Compromises, and LastPass Phishing Attacks.
- March #1 American Express, Fidelity Suffer Breaches; Dual Factor Codes Leaked
- January #2 - Apple Releases Security Patches, Billions Potentially Affected by Data Breach
- January #1 - Google Deploys Security Patch for Chrome
- 2023
- December #3 - Google Patches 8th Zero Day Vulnerability of 2023
- December #2 - Xfinity Discloses Data Breach Affecting 35M
- December #1 - Apple Releases Security Updates to Patch Vulnerabilities
- November #1 - Google Deploys Chrome Security Update to Patch Zero-Day Vulnerability
- October #1 - Apple Patches Latest Zero Day Vulnerability
- September #3 - Apple Issues Updates to Patch Three Zero Day Vulnerabilities
- September #2 - Google Releases Chrome Patch For Severe Zero Day Vulnerability
- September #1 - Apple Issues Patches For Zero Day Vulnerabilities
- August #1 - LinkedIn Hacks Result in Account Takeover
- July #2 - Apple Deploys Latest 2023 Security Updates
- July #1 - Apple Issues New Rapid Security Response Update
- June #2 - Apple Releases Slate of Security Updates for iPhones, iPads, Macs and Apple Watches
- June #1 - Google Patch and FBI Deepfake Warning
- April 2023 #2 - Google Releases New Chrome Patch
- April 2023 #1 - Apple Releases New Security Patches for iPhones, iPads, Macs
- March 2023 #4 - Apple Releases Device Security Patches
- March 2023 #3 - Ferrari Data Breach
- March 2023 # 2 - SVB Scams to Keep an Eye On
- March 2023 #1 - AT&T Data Breach
- February 2023 #2 - Apple Updates and California Medical Group Data Breaches
- February 2023 #1 - Swatting
- January 2023 - T-Mobile Breach
- 2022
- December 2022 #3 - LastPass Discloses Data Breach
- December 2022 #2 - Apple Releases Security Patches
- December 2022 #1 - Google Releases 9th Security Patch of 2022
- November 2022 #2 - Google Security Patch and Twitter Data Leak
- November 2022 #1- Google Chrome Security Patch
- October 2022 #1 - Apple Releases Security Patches for iPhones, iPads
- September 2022 #3 - Apple Releases Security Updates for iPhones, iPads
- September 2022 #2 - Google Releases Emergency Chrome Patch
- September 2022 #1 - Samsung Discloses Data Breach
- August 2022 #3 - LastPass Data Breach
- August 2022 #2 - Phishing Scams Target Instagram and PayPal Users
- August 2022 #1 - Apple Updates and Google Chrome Patch
- July 2022 #1 - Google Chrome Update and Marriott Breach
- June 2022 #2 - Elder Abuse Awareness Month
- June 2022 - Android Security Update
- May 2022 - Apple Device Patches
- April 2022 - Apple Security Update
- March 2022 -Microsoft, Google patch browser vulnerabilities
- February 2022 - SIM Swap
- January 2022 - Apple AirTag Privacy Concerns
- 2021
- December 2021 - Hikvision Vulnerability
- November 2021 #4 - Crypto Theft and GoDaddy Breach
- November 2021 #3 - FBI Potential Email System Compromise
- November 2021 #2 - Robinhood Data Breach
- November 2021 #1 Graff Jeweler Data Breach
- October 2021 #2 Apple iOS 15 Zero Day Security Update
- October 2021 #1 - Apple Zero Day and Catalina; Coinbase and Neiman Marcus Breaches; Chrome ZeroDay
- September 2021 - Apple Critical Security Patch
- August 2021 #2 - Extortion Scam Pegasus
- August 2021 #1 - T-Mobile Breach
- July 2021 - Apple iOS/macOS Zero Day
- June 2021 #3 - LinkedIn Breach
- June 2021 #2 - Audi Breach
- June 2021 #1 - Amazon Sidewalk
- May 2021 - Apple iOS/macOS Zero Day
- April 2021 - Ubiquiti and Facebook
- March 2021- Apple iOS Zero Day
- February 2021 #2 - Scareware
- February 2021 #1 - Google Chrome Zero Day
- January 2021 #2 - Apple and SonicWall
- January 2021 #1 - Ubiquiti Breach
- 2024
- Client Educational Webinars
- Privacy & Security Basics
- How Digital and Physical Security Intersect
- An Overview of Home Blurring
- Privacy Policies: Why You Shouldn't Skim
- A Guide On Securing Your Home Network
- An Overview of Dark Patterns
- A Look at Messaging Apps
- Using Unique Usernames
- Wi-Fi Best Practices
- Taking IoT Security Seriously
- Using Remote Access Software Safely
- What to Do When You Get a Data Breach Notification Letter
- Best Practices for Remote Work
- Why You Should Encrypt Flash Drives
- Captive Portals and VPNs: What to Know
- Strategies for Effective Security Questions
- A Guide on What You Shouldn't Share Online
- The Case for Setting Up Guest Wi-Fi Networks
- Mobile Biometric Verification Basics
- When to Update Your Device
- Removable Media Best Practices
- Why You Should Keep Your Devices Up-to-Date
- iOS Hardening Walkthrough
- ChatGPT: An Overview
- The Case for Limiting Mobile Provider Data Sharing
- Setting Up Google Authenticator and Authy
- Browser Extension Basics
- Dual Factor: Adding Additional Security
- Deep Web and Dark Web: What's the Difference?
- Amazon Privacy Settings to Enact Right Now
- BlackCloak, Privacy and You
- Browser Update Essentials
- How to Stay Safe on Black Friday and Cyber Monday
- Physical Security of Your Data Is Just As Important As Cybersecurity
- Protecting Your Children Online
- Why and When You Should Use a VPN
- What to Know About Website Security
- Video Game Privacy and Security 101
- An Overview of Browser Cookies
- Stay Cyber Smart While Traveling
- How to Stay Safe During the Holidays
- Cyber Threats
- Fighting Pharming Attacks
- A Warning About Friendly Text Messages
- Deciphering Deepfake Scams
- Battling Brute Force Attacks
- Fighting Back Against Account Takeovers
- Pretexting: Identifying Fake Scenarios
- Curbing Credential Stuffing Attacks
- Protecting Yourself From Home Title Theft
- The Dangers of Bringing Devices to Nation-States
- A Warning About Wrong Number Text Scams
- How to Handle Cyberstalking
- Spotting Fake FEMA Alerts
- Stopping 'Say Yes' Scams
- Stopping and Responding to Cyberbullying
- Tackling Tech Support Scams
- Stopping SIM Hijacking
- Ransomware: The Ever Growing Threat
- Why You Should Be Careful Using Public Wi-Fi
- How to Spot a Romance Scam
- The Dangers of USB
- Robocalls: An Automated Headache
- What to Know About Questionable QR Codes
- Figuring Out Fleeceware
- How to Avoid a Man-in-the-Middle Attack
- What to Know When Facing Scareware
- "Vishing:" An Intro to Vocal Phishing Attacks
- Common Cyber Scams - Part I
- Common Cyber Scams - Part II
- Facing Off Against Phishing Emails
- Protecting Seniors From Scammers
- Protecting Virtual Meetings From BEC Attacks
- "Smishing:" An Intro to Spam Text Message Attacks
- Spotting Cyber Scam Red Flags
- Combating Card and E-Skimming
- Botnets: A Problem Bigger Than One Device
- Financial Privacy
- ID Management
- Passwords and Passkeys
- Social Media
- How to Harden Your Instagram Account
- How to Harden Your Facebook Account
- How to Harden Your TikTok Account
- How to Harden Your WhatsApp Account
- How to Harden Your Twitter/X Account
- How to Harden Your Snapchat Account
- How to Deactivate or Close Your LinkedIn Account
- How to Deactivate Your Twitter Account
- How to Delete and Deactivate Facebook and Instagram
- Social Media Hardening of Your Facebook Account
- Social Media Hardening of Your Instagram Account
- Why You Should Avoid Oversharing on Social Media
- Webinar Topic Requests
- Privacy & Security Basics
- Newsletters
- 2025
- 2024
- December 2024 - New Features in BlackCloak App
- November 2024 - BlackCloak Wins Top Infosec Innovator 2024 Award
- October 2024 - BlackCloak Closes Series B Funding Round
- September 2024 - BlackCloak Named Finalist of the Coveted Top InfoSec Innovator Awards for 2024
- August 2024 - BlackCloak Mobile Application Receives New Features
- July 2024 - FTC Highlights Tech Support Scam Rise
- June 2024 - Ticketmaster Data Breach, Wi-Fi Best Practices and More
- May 2024 - Questions About BlackCloak VPN, Traveling Safely
- April 2024 - Global Entry Reminder
- March 2024 - BlackCloak Partners with FinchCyber
- February 2024 - iOS 17.3 Adds New Security Features, Secure Your Email Account
- January 2024 - Scammers Conning Victims Out of Billions, A Look at 2024
- 2023
- December 2023 - Reminder to Update BlackCloak Desktop App
- November 2023 - How to Update Your OS Through the BlackCloak Mobile App
- October 2023 - BlackCloak Acknowledges National Cybersecurity Awareness Month
- September 2023 - BlackCloak Wins Excellence Award
- August 2023 - Stopping SIM Hijacking and Travel Tips
- July 2023 - BlackCloak Releases New Study
- June 2023 - What to Know About Ransomware and Romance Scams
- May 2023 - ChatGPT: An Overview
- April 2023 - Updated BlackCloak Mobile App Now Available
- March 2023 - BlackCloak Mobile App Preview
- February 2023 - Fleeceware and Questionable QR Codes
- January 2023 - Avoiding Man-in-the-Middle Attacks
- 2022
- December 2022 - Holiday Phishing Scams
- November 2022 - Deep Web and Dark Web Differences
- October 2022 - BlackCloak Releases New App Features
- September 2022 - A Call to Update Apple Devices
- August 2022 - Cyber Scam Red Flags and FCC 'Smishing' Warning
- July 2022 - Knowledge Base Available in App
- June 2022 - Facing Phishing Emails
- May 2022 - World Password Day
- April 2022 - BlackCloak Launches Knowledge Base
- March 2022 - A Note on Ukraine
- February 2022 - Apple AirTags
- January 2022 - Data Privacy Day
- 2021
- December 2021 - Data Brokers
- November 2021 - Website Security
- October 2021 - Virtual Payment Cards
- September 2021 - Password Managers
- August 2021 - Robocalls
- July 2021 - Traveling Security Practices
- June 2021 - VPNs
- May 2021 - Virtual Kidnapping Scams
- April 2021 - April Fool's Day Scams
- March 2021 - Tax Scams
- February 2021- BlackCloak App Overview
- January 2021 - App Changes/Data Privacy Day
- 2020
- December 2020 - Holiday Protection
- November 2020 - Election/Black Friday Protection
- October 2020 - National Cybersecurity Awareness Month
- September 2020 - Email Domains
- August 2020 - Ransomware
- July 2020 - July 4th Scams
- June 2020 - Fleeceware Apps
- May 2020 - Social Media Security
- April 2020 - SIM Hijacking
- March 2020 - Ring Privacy Controls/Coronavirus Scams
- February 2020 - Facebook/Apple Updates
- January 2020 - Data Privacy Day/ID Theft Protection
- 2019
- Blog
- 2022
- Dallas-Based MSSP Blackswan Brings Digital Executive Protection to High-Net-Worth Clients and Corporate Accounts
- Healthcare Breaches Expose Sensitive Information; Twitter Users’ Data Leaked Online
- ‘Tis the Season! 3 Ways High-Net-Worth Families Can Protect Against Holiday Phishing Scams
- FBI issues warning over impersonation scam; New phishing campaign encourages targets to call malicious actors
- Hacker in the house: 4 ways cybercriminals are targeting advisors' personal networks
- Healthcare data breach affects millions; Google releases security patch for Chrome
- Impersonating Executives’ LinkedIn Profiles Presents a Significant Challenge for CISOs
- How to Delete Your Uber Account Following Another Significant Data Breach
- Verizon Experiences Data Breach; Sensitive Information Stolen From Healthcare Organizations
- Why Cybercriminals Target the Home Networks of Execs and High-Access Employees
- BlackCloak’s QR Code Scanner Keeps You Safe by Scanning for Malicious Content
- Phishing scam targets Capital One customers; Cybercriminals leak stolen school district data
- How Panacea Smart Solutions Helps Solve Customers’ Problems with Digital Executive Protection
- Microsoft issues warning over malware threat; New York-based healthcare organization discloses data breach
- Why High-Access Employees Need Digital Executive Protection
- New VPN Service Makes Digital Privacy Protection More Convenient
- Recent Cyber Attacks Confirm Personal Digital Lives are a Risk to Enterprise Security
- Nelnet breach affects 2.5M student loan accounts; Google releases emergency Chrome security update
- “Smishing:” When Phishing Moves from Email to Phone
- Streaming Media Platform Plex and Novant Health Experience Data Breaches
- Webinar Recap: What Small Businesses Get Wrong About Cybersecurity
- Concierge Digital Protection For Corporate Executives and High-Access Employees
- How to Protect Senior Citizens from Online Scams
- Twilio experiences data breach; Cybercriminals target crypto users’ login credentials and funds
- BlackCloak Brings Digital Executive Protection to Black Hat 2022
- The Challenge Digital Executive Protection Poses to Enterprise Security Teams
- Millions of records exposed in Twitter, Neopets data breaches
- Amid Layoffs and Recessionary Fears, Digital Executive Protection is More Critical Than Ever
- The Future of Executive Protection is Digital
- Despite Security Advances, Scammers Continue to Make Bank Via Wire Fraud
- Phishing Campaign Targets Twitter & Discord Users; Aon Discloses Data Breach
- Three Reasons Why CSOs Can Stake Their Claim to Digital Executive Protection
- Level Solutions Group Brings Digital Executive Protection to Data Center Industry
- Texas hospitals hit by data breach; Phishing scheme targets Facebook login credentials
- Healthcare data breach affects 2 million; Malware allows cybercriminals to steal payment card numbers
- Fireside Chat with ESG: End User Protection Meets Digital Executive Protection
- Should Chief Security Officers Bear Responsibility for Digital Executive Protection?
- How to Prevent and Respond to Social Media Impersonations
- General Motors Announces Data Breach; Zoom Releases Security Patch
- Protect Your Executives’ Cybersecurity Amidst Global Cyberwar
- RSA Conference 2022 Preview with ITSP Magazine
- Should Chief Security Officers Bare Responsibility for Digital Executive Protection?
- Texas Department of Insurance data breach affects millions; personal data of VPN users leaked on Telegram
- 4 Reasons Why CISOs Cannot Protect Executives’ Personal Digital Lives
- Protecting Children’s Privacy Online Without Disruption
- Phishing scheme targets verified Twitter users; Vulnerability leaves millions of routers & IoT devices at risk
- World Password Day 2022: Poor Password Practices Can be Costly
- Executive Social Media Monitoring’s Role in Digital Executive Protection
- Mortgage servicer data breach affects 2.5 million; Crypto wallet provider warns iOS users
- 99 percent of Executives Listed on More Than Three-Dozen Data Broker Websites
- Three Best Practices to Prevent Identity Fraud
- Mailchimp data breach targets crypto; GitLab updates security vulnerabilities
- Cyberattacks Target Families of Newfound Wealth
- Attackers Deploy SIM Hijacking to Breach Cryptocurrency Accounts
- CRM data breach leaks personal info tied to crypto accounts; Healthcare security breach affects 100K
- Preparing for Collateral Damage From the Russia-Ukraine Cyberwar
- How Family Office Leaders Can Protect Their Company & Their Clients From Business Email Compromise
- Mozilla Releases Security Patch for Firefox; AGs Warn T-Mobile Data Breach Victims
- New Registration Bomb Email Attack Distracts Victims of Financial Fraud
- Security Vulnerabilities Found in WordPress Plugin & Select Apple Devices
- The Resurgence of Man-in-the-Middle Attacks & How to Stop Them
- What You Need to Know About Criminals & Identity Thieves Misusing Apple AirTags for Nefarious Purposes
- Data Breaches Impact Morley Companies & Washington State Department of Licensing
- Safer Internet Day 2022: How to Deactivate or Delete Your Facebook and Instagram Accounts
- Breaking Down BlackCloak Part 4 — Concierge Client Service
- National Data Privacy Day 2022: Top 6 Safeguards to Reduce Risk of Data Breach, Identity Theft, & Financial Fraud
- Thursday Threat Update 1/27/22: Data Breaches Affect Moncler & OpenSubtitles
- Breaking Down BlackCloak Part 3 — We Help Protect Executives’ Homes
- Breaking Down BlackCloak Part 2 — We Help Protect Executives' Personal Devices
- Thursday Threat Update 1/13/22: Data Breaches Impact Broward Health & FlexBooker
- Breaking Down BlackCloak Part 1 — We Help Protect Your Executives' Privacy
- Five Emerging Privacy & Cybersecurity Risks to Executives & High-Profile Individuals
- Examining the Modern Attack Surface: Quantifying the Risks to Individuals and the Enterprise
- 2021
- Six Threats that Brought Digital Executive Protection into the Spotlight in 2021
- Hackers are Targeting e-Gift Cards - But It's What Else They Might Find in a Personal Inbox that Should Concern CISOs
- The Return of Travel: Why CISOs Must be Extra Vigilant
- Why Spam Emails Are a Threat
- Cybersecurity is Not a Device – Why You Need More than a Firewall to Protect Your Home Network
- How to Stop Robocalls & Hacks on Your Phone Number
- Board Members Cause Cybersecurity Gaps - Why CISOs Must Protect Their Online Privacy
- Home Cameras Protect the Home, Until They Don’t. Why Executives and Their Families are Exposed
- A Sticky Sweet Way to Catch Hackers in the Act
- Things to Look for in Your Personal Security Monitoring System
- Families of Executive Team Members are a Weak Link in Your Cybersecurity Armor
- How to Protect You and Your Family From Identity Theft in 2021
- What Is a VPN and When Do I Need One?
- Fraudsters Are Targeting Executives to Perpetrate Unemployment Fraud – Why Companies Need to Worry
- Why You Need a Guest Wi-Fi Network, and How to Set It Up
- Is Your Home Camera System Private?
- 3 Reasons Why Webcam Privacy Is a Must for 2021
- How to Check If Someone Filed Unemployment Under My Name
- How to Choose a Personal Managed IT Service Provider
- It’s Time to Extend Executive Protection to the Digital Realm
- Mesh Networks: Benefits and Impact on Security
- 2020
- Executive Cyber Hygiene – Why Manners at Work Aren’t Translating to the Home
- The Corporate Sneakernet: Protecting the Enterprise as Executives Circumnavigate Security Controls
- How Your CEO’s Personal Brand is a Cybersecurity Liability
- Online Threats Put Celebrities’ Digital Lives in the Crosshairs
- Cybersecurity & Privacy Practice Groups Have a Role in C-Suite Cybersecurity
- The Home is the New Battleground for Corporate Cybersecurity
- Protecting Email Accounts with Dual-Factor Authentication is a Must for Everyone
- How to Protect Your Phone Number from Being Stolen
- Thanks to Covid-19, Pharmaceutical Companies are a Target Again (or Still) for Hackers
- Understanding and Improving Cloud Security (Apple, Google, Dropbox, OneDrive, etc.)
- Why & When to Use a Credit Freeze and/or Fraud Alert
- The Path of Least Resistance ‒ Pharmaceutical Executive Credentials Line the Dark Web as Criminals Look to Exploit Crisis
- Protect Your Social Media Accounts
- Hedge Funds and Cyber Security
- 5 Tips to Protect Yourself Against Identity Theft
- Decoding Privacy Policies
- 2019
- Cybersecurity Awareness Month
- Holiday Safety Tips
- Guest WiFi Networks
- Your Home May be Smart, but is it Secure?
- SIM Cards - A New Target for Cyber Criminals
- Understanding and Preventing Ransomware Attacks
- Child Identity Theft: What It Is and How to Prevent It
- Stealing your Money - What is Business E-mail Compromise
- 5 Effective Ways to Protect Yourself from Being Hacked
- Catching the Easy Prey - The Phishing Threat
- Protecting Your Smart TV From Hackers
- IRS Scams
- 2018
- 2022
- White Papers & Reports
- From the Desk of the CISO
- 2025
- 2024
- December 2024 - A Look Back at 2024
- November 2024 - Watching Out For eSIM Swaps
- October 2024 - Dealing With Deepfakes in The Corporate Setting
- September 2024 - How the NPD Breach May Affect Traditional Verification Measures
- August 2024 - The Dangers Posed by Data Brokers
- July 2024 - A Look At Recent Data Breaches Making Headlines
- June 2024 - How to Prevent Account Takeovers
- May 2024 - How BlackCloak Cuts Through the Noise for Our Clients
- April 2024 - Best Cybersecurity Practices for Traveling Securely
- March 2024 - A Look at the Best Choices for Messaging Apps
- February 2024 - Tackling Insider Threats in a Remote Work Environment
- January 2024 - Securing The Remote Workforce
- 2023
- December 2023 - A Look Ahead to 2024
- November 2023 - Looking Back at 2023
- August 2023 - macOS Malware Shows Apple Devices Aren’t Exempt From Threats
- July 2023 - Social Media Hygiene for Your Key Personnel
- June 2023 - New ODNI Report Reveals How U.S. Government Buys and Uses CAI
- May 2023 - How Two Cybercrime Groups Highlight the Need for Continued Security Measures
- April 2023 - Assessing Cloud-Based AI Chatbot Risks: A Guide for Fellow CISOs
- March 2023 - Examining Apple's New Support for Hardware Security Keys for Two Factor Authentication
- February 2023 - Why Meta and Twitter's Paid Verification Systems Matter
- January 2023 - Breaking Down Apple's New Security Features
- White Papers
- From the Desk of the CISO
- BlackCloak Social Media
- Glossary
- Print
- DarkLight
This document will serve as a guide for enhancing cell phone security at the account level for the 4 major wireless carriers: Verizon, AT&T, T-Mobile & Sprint. Across all for 4 major carriers, we recommend implementing these enhanced security measures:
➔ Setting a PIN at the account level.
- Adding a PIN or passcode to your account, adds an extra layer of security. In order to make changes to your account, this PIN is required. Some carriers set the PIN as the last 4 digits of the primary account holder’s SSN, so be sure to change this code to something unique. Consider updating the PIN periodically.
➔ Enabling Two-Factor Authentication (2FA) (if available by the carrier)
- To further protect your account beyond your username and password, setting up 2FA will require an additional authentication factor like an SMS text message sent to your phone, a code delivered to your email or a code generated via an authenticator app like Google Authenticator or Authy.
- If 2FA is unavailable, we recommend setting Security Questions and a PIN for your account.
➔ Using a strong password and update it periodically
- We recommend 14 characters or longer, using upper and lower case, and a mixture of numbers, letters and special characters.
➔ Keep your personal information and passwords private
- Don’t share account information, PIN or passwords.
The 4 major carriers implement slightly different safeguards for protecting customer accounts. Here are specific features available at Verizon & T-Mobile that we’ve found.
Verizon
➔ Number Locking
Enabling Number Lock for your Verizon phone numbers
Once you activate a lock on a phone number in the My Verizon app, that number can no longer be ported to another line/carrier or swapped to another SIM unless you remove the lock.
To enable Number Lock to protect your Verizon number from being ported without your permission you can go through the following steps in the My Verizon app (iOS, Android):
- Open the menu and tap Account. Sign in if requested to do so.
- Tap Account Settings.
- Tap Number Lock.
- Tap the switch on (green) for the number(s) you want to lock. The numbers you selected cannot be ported to another device or carrier while Number Lock is on. You will need to turn off Number Lock if you need to port out one of the numbers you locked.
You can also follow this procedure to set up Number Lock through the My Verizon website:
You can access this feature by logging into your My Verizon account and going to the designated Number Lock page.
Select On next to the mobile number(s) that you want to protect from being transferred.
Tap or click Save Changes. The numbers you selected cannot be ported to another device or carrier while Number Lock is on. You will need to turn off Number Lock before you can port out one of the numbers you locked.
To turn off Number Lock on a phone number that you want to port to another carrier or swap to a new SIM, account owners or account managers can use the app, the site, or can call Customer Service at *611.
T-Mobile
➔ Port Validation
- In addition to your account PIN, you can also set a 6-15 Digit passcode that will be added to your account to restrict port changes.
➔ Biometric Verification
- Allows you to verify your account by your T-Mobile ID when you call into Customer Care for assistance using the T-Mobile app and biometric credentials such as Face ID or fingerprint recognition, so you don't have to remember your PIN or Passcode.
➔ NOPORT
- NOPORT adds another layer of security on top of T-Mobile’s Port Validation but it’s not known if that’s a feature that every customer can enable, and if not, which customers can get it. If you’ve experienced fraud on your wireless account, you will likely be able to obtain this feature. When NOPORT is enabled on your account, T-Mobile requires a customer to visit a retail store and present a government-issued photo ID in order to have their number ported to a different carrier or get a new SIM card.
Now, we will outline the exact steps you should take to implement security features at each of the specific carriers.
Account Implementation
Verizon Web
➔ Set Up A PIN
- Login to your My Verizon Account
- Under Account select Account settings>Security Settings
- Enter the new account PIN under the Account PIN section, then re-type in designated box NOTE: Only the Account Owner can create an Account PIN.
- Click submit to confirm
➔ Set Up Two Factor Authentication
- Login to your My Verizon Account
- Under Account select Account settings>Security Settings
- Select two-factor authentication
- Click enable for the numbers you want to have two-factor authentication
- Save Changes
➔ Number Locking
- Login to your My Verizon Account
- Under Account select Account settings>Security Settings
- Select Number Lock
- Turn ON for each mobile device you want to lock.
- Save Changes
AT&T Web:
➔ Changing Passcode and Securing Account
- Navigate to Wireless account page
- Log into your account
- Enter in your two factor authentication code
- Click on your profile
- Make sure you update your security questions
- Set up a recovery phone number and email
- Click Manage Extra Security
- Click Edit Passcode
- Enter the last four digits of your Social Security number and mailing zip code, then click next
- Choose a phone number to receive the two factor code needed to edit your passcode
- Enter your new passcode, making sure it has at least four characters. This passcode will be needed to:
- Sign into all accounts
- Manage all accounts online or in stores
- Call customer support
➔ Set Up Dual Factor Authentication
- Two Factor Authentication on wireless accounts is enabled by default and cannot be turned off.
T-Mobile Web:
➔ Set Up a PIN (If you have not established a PIN for your account upon logging in you will be prompted to do so)
- Sign in to My T-Mobile account
- Choose a verification method, either SMS / Security questions
- Select Next > Follow prompts for signing with this method
- Navigate to Set Your PIN/Passcode > Enter desired PIN/Passcode > Next/Save
➔ Set Up Dual Factor Authentication
- Sign in to My T-Mobile account
- Profile > T-Mobile ID > Enable 2-Step Verification, preferably with an authenticator app
T-Mobile Customer Service
(call 611 from your T-Mobile phone or dial 1-800-937-8997 from any phone):
➔ Port Validation
- Request to add Port Validation and create a 6-15 digit code over the phone with the Customer Care representative
➔ Set Up Biometric Authentication
- There are some qualifications and additional steps to take to enable this feature here is the link with those details:
➔ Request NOPORT
- The Primary Account Holder must call T-Mobile Customer Service to enable this
Sprint Web:
➔ Set Up a PIN and Security Questions (Sprint requires all customers to create a PIN during their initial account setup)
- Sign in to Sprint.com
- Select My Sprint (or My Account) > Profile & Security (or Profile & Settings)
- Scroll down to Security Information
- Update PIN or security question/answer and save it
Need Assistance?
- Sign in to sprint.com
- Select My Sprint (or My Account) > Profile & Security (or Profile & Settings)
- Scroll down to Security Information
- Update PIN or security question/answer and save it
Contact the BlackCloak Concierge team and we'll answer any questions you have and assist you in any of the processes described above.