support

Here to Support Your Digital Security Needs

Our support team is dedicated to your digital safety. We offer prompt assistance for all your technical queries, ensuring a smooth and secure experience for every user, regardless of expertise.

Your Security, Our Priority

Welcome to Dteckt Support: Your Partner in Digital Safety

Need help or have questions about Dteckt? Our Support team is here for you. We offer comprehensive assistance for all our cybersecurity services, ensuring you get the most out of our solutions.

Have questions?

Frequently asked questions and answers

Find answers to commonly asked questions about cybersecurity and Dteckt's services.

Is Dteckt Easy to Use?

Absolutely! Dteckt is designed with user-friendliness in mind. Our platform is easy to navigate, and we provide clear instructions and helpful resources.

What Plans does Dteckt offer?

Dteckt offers various plans to suit your needs at affordable prices, with increasing features at each tier. You can explore our plans on our pricing page. Explore our Standard, Plus, and Premium plans to learn more.

Do I need Dteckt?

Anyone who uses the internet can benefit from Dteckt's protection. With cyber threats constantly evolving, Dteckt offers peace of mind by proactively safeguarding your digital life.

What does Dteckt offer?

Dteckt provides a range of features to keep you protected, including:

  1. Identity Monitoring: We scan the dark web and other sources for breaches that may expose your personal information.
  2. Credit Monitoring: Stay informed about changes to your credit report and potential fraud attempts.
  3. Social Media Monitoring (on Premium plans): Monitor your social media for suspicious activity.
  4. Password Manager: Securely store and manage all your passwords in one encrypted vault.
  5. Lost Wallet Protection (on Plus and Premium plans): Get assistance if your wallet or ID is lost or stolen.
  6. Up to $1 Million ID Theft Insurance (on Premium plans): Receive financial protection in case of identity theft.
  7. Child Protection Features (on Family plans): Monitor your child's online activity and ensure their safety.
  8. And much more…

What is Dteckt?

Dteckt is a comprehensive online security platform that safeguards your identity, privacy, and digital persona.

How can I get started?

  1. Sign Up / Sign In
  2. Choose your Dteckt Plan
  3. Start Monitoring Companies
  4. Connect your financial institutions on the Money Manager app
  5. Add your Monitor Attributes for Person Monitoring

What is an Identity Risk Score?

The Identity Risk Score is the digital risk posed to your identity via online services and Dteckt enabled security controls. It's a quick and easy way for you to see your security posture across all avenues of security including company monitoring, persona monitoring, financial monitoring, credentials leaked, endpoint and network security, and more. The higher the grade, the better you are doing!

Still have questions?

Contact our support team for further assistance.

Contact us

Get in Touch with Our Experts

For any assistance or inquiries, our Dteckt team is ready to help. Contact us for quick, knowledgeable support to address all your cybersecurity concerns.

Feedback and Suggestions

Share Your Feedback

Your opinions and ideas are important to us at Dteckt. Share your feedback to help us refine our cybersecurity services and better serve your needs.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
newsletter

Stay Informed with Dteckt's Newsletter

Join our newsletter to stay informed about our latest features and releases.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

By subscribing, you agree to our Terms and Conditions.

Resource Center

Explore Our Knowledge Base

Whether you're looking to deepen your understanding of cybersecurity or need step-by-step instructions on using Dteckt's features, our resources are designed to empower you with knowledge.

explore
Cybersecurity
Apr 1, 2024

Compromised Password

After using the same password for multiple online accounts, Anonymous discovers her email has been hacked. The attackers use the stolen information to access other accounts, changing passwords and personal details, leaving Anonymous feeling powerless and violated.

by
Matt DeVico
Cybersecurity
Mar 25, 2024

Targeted Phishing

Anonymous receives an email seemingly from her bank, congratulating her on a new scholarship program. Clicking the link in the email takes her to a fake login page, unknowingly handing over her bank credentials to scammers. Her savings are drained within hours, leaving her financially vulnerable and distrustful of online interactions.

by
Matt DeVico
Cybersecurity
Mar 18, 2024

Social Media Slander

Anonymous wakes up to find his social media flooded with hateful messages and accusations. An anonymous user has created fake profiles, impersonating him to spread rumors and damage his reputation, hindering his career opportunities and causing emotional distress.

by
Matt DeVico
Cybersecurity

Smart Home Security

David relies on smart home devices for convenience. However, a security vulnerability in his smart speaker allows hackers to gain access. They use the microphone and camera to spy on his family and even exploit vulnerabilities in other connected devices, potentially exposing personal information and compromising their safety.

by
Matt DeVico
Cybersecurity

Online Shopping

John falls victim to a social media scam. What looks like an enticing advertisement for a "miracle weight loss product" with glowing fake reviews leads him to a fraudulent website. He enters his personal and financial information to purchase the product, which never arrives, and his data is likely sold to other criminals on the dark web.

by
Matt DeVico
Cybersecurity

Digital Identity and Medical Mix-up

Tina experiences a frustrating ordeal when she attempts to renew her driver's license. Due to a data breach at a previous doctor's office, her stolen information is used to generate a fake medical record, causing delays, and requiring extensive verification procedures. This highlights the impact of data breaches on personal lives and administrative processes.

by
Matt DeVico
Cybersecurity

Catfishing

Lisa engages in online dating, connecting with someone who seems perfect. Over months, they build an emotional connection, with Lisa sharing personal details and even sending money to support the "relationship." However, upon investigation, she discovers she has been catfished, with all the information used to manipulate and exploit her.

by
Matt DeVico
Cybersecurity

Cyberbullying

Ethan faces constant cyberbullying from a group of online acquaintances. Through anonymous messages and social media posts, they subject him to humiliation and threats, causing emotional trauma and impacting his well-being.

by
Matt DeVico
Cybersecurity

Data Breach

After receiving a notification, Maria discovers her personal information was compromised in a data breach at a major retailer. Worried about potential identity theft and financial fraud, she faces the hassle of monitoring accounts and changing passwords, feeling vulnerable and insecure.

by
Matt DeVico
Cybersecurity

Public Wi-Fi

Anonymous uses the free Wi-Fi without realizing the network is unsecured. Hackers intercept her unencrypted data, including login credentials and academic documents, potentially compromising her privacy and academic performance.

by
Matt DeVico
Cybersecurity

Tax Time

Anonymous receives a call from someone claiming to be from the IRS. The caller threatens her with legal action if she doesn't immediately pay a fabricated tax debt. Fearing legal trouble, She sends a payment, only to discover later it was a scam, highlighting the prevalence of social engineering tactics used to target individuals and businesses.

by
Matt DeVico