Technology ❯Cybersecurity ❯Data Protection
Credit Monitoring Fraud Prevention Phishing Cyber Attacks Fraudulent Activities Stolen Credentials Personal Information Online Safety Phishing Techniques Phishing Scams Customer Data Social Engineering Spyware Client Security Incident Response Online Security Practices Consumer Rights Password Security
The company attributes the exposure to a compromised third‑party tool, offering two years of credit and identity protections.