Y Protecting Yourself - Well-Being Protection

Why Choose Us?

Fast & Accurate

Get your account within minutes after registration.

Refundable

By joining the site, you have a choice if you want to refund the donation you have given within the day of registration.

Helping Victims

Register and donate 50% of the payments to Harassment Victims Community Foundation(HVCF).

User-friendly Experience

Add friends to your Safety Network so they can make sure you never go missing. Connect to other apps and devices for smarter, faster help in an emergency.

RISKS


Pet Scams

Pet scams take place when you see a pet advertised online, are asked to pay a deposit or full price of the pet, only to find that the pet you have purchased does not exist, and you have been defrauded....

Read more

Delivery Scams

Restrictions introduced during the COVID-19 pandemic have resulted in a massive increase in online purchases and in turn, home deliveries, a trend which is here to stay owing to the convenience and choice it brings....

Read more

Investment Scams

Investment scams involve criminals contacting people randomly to persuade them to put their money into investment schemes or products that are either non-existent, or do exist but are worthless. Traditionally, sales pitches...

Read more

TV Licensing Scams

TV Licensing is one of the organisations that scammers frequently try to impersonate. Fraudulent TV Licensing communications are increasingly sent via online means....

Read more

Pyramid Schemes

A pyramid scheme is a type of scam that promises the victim a fast and substantial return on an investment of money which is paid to the person ‘above’ them in the pyramid. The victim is also required to recruit a number

Read more

Misinformation and Fake news

The internet is an invaluable tool for finding useful, authoritative information on anything from news and current affairs to DIY, health to history, celebrities to Coronavirus. However, it is also littered with misleading.

Read more

Blackmail Emails

There has been a sharp increase in the incidence of emails threatening to expose the recipient to everybody in their contacts list, for viewing pornographic online content unless a fee is paid. The emails claim that the sender.

Read more

Online Abuse

Social media has made it very easy for us to communicate quickly and easily with family, friends and acquaintances, as well as sharing experiences and letting others know of our opinions and beliefs. These opinions and beliefs.

Read more

Hate Content

Whilst the internet enables us to communicate quickly, easily and with a wide group of people at the same time, it also makes it easier to spread hateful opinions and material, seemingly with relative anonymity and little.

Read more

Property Fraud

Property fraud occurs when fraudsters sell or mortgage your property without your consent. Property is usually the most valuable asset you own and can be sold and mortgaged to raise money. It is therefore an attractive.

Read more

Motor Insurance Fraud (Ghost broking)

Motor insurance fraud, also known as ‘ghost broking’, occurs when organised crime groups or individuals pose as genuine insurance brokers in order to commit fraud. They deceive you into buying cheap motor vehicle insurance.

Read more

Video Game Gambling

Video gaming for your children can be enjoyable and safe, as long as games are age-appropriate, regulated and supervised by you, and playing times limited. However, there has been a massive surge in illegal websites enticing.

Read more

Recovery Room Scams

Victims of investment scams are increasingly vulnerable to other investment scams, follow-up scams and recovery room fraud. The perpetrators of these scams are in possession of your details and even when they have been stopped.

Read more

Online Radicalisation

Radicalisation by extremist groups or individuals can be perpetrated via a number of means: face-to-face by peers, in organised groups in the community and, increasingly, online. Their targets are individuals or groups of people.

Read more

Revenge Porn

Revenge porn, sometimes known as 'intimate image abuse', is the practice of uploading online explicit images – specifically photos and videos – of ex-partners (or even current partners) without their consent.

Read more

Pension Fraud

Pensions are important and often very significant assets that people rely on so that they may live comfortably in later life. However, like with any valuable asset they can be the target for illegitimate activities, scams or.

Read more

Tax Scams

Fraudulent phishing emails claiming to be issued by HMRC and demanding payment or notifying you of a refund, have been in existence for some years. They are still as, if not more, popular with scammers.

Read more

Webcam Blackmail

Webcam blackmail usually involves people being lured into taking off some or all of their clothes in front of their webcam, only to be told that you have been recorded and that the video will be posted online and/or shown to the.

Read more

Telephone Banking Fraud

Telephone banking fraud is a scam which is becoming increasingly commonplace. The fraudsters do not actually scam their victims online, but use the telephone to do so.

Read more

Payday Loans

Payday loans let you borrow relatively small amounts of money for a short period – from a few days up to a month, until you get paid the following month. Available from internet sites and high street shops, payday loans can be.

Read more

Cyber Stalking

Stalking and harassment have always existed, but since the growth of the internet, it has become easier for those who carry it out to do so either as an extension of their existing activities, or purely online. This persistent.

Read more

Money Muling

As criminals seek more sophisticated ways of concealing the proceeds of their illegal activity, the practice of money muling is becoming increasingly commonplace. A money mule is a person who transfers stolen money between.

Read more

Preventing Identity Theft

Advance fee fraud is when fraudsters target victims to make advance or upfront payments for goods, services and/or financial gains that do not materialise.

Read more

GENERAL PROTECTION


Two-Factor Authentication

Two-factor authentication – often abbreviated to 2FA – is when a second step is added to the process of logging into your online accounts which require confidentiality, as an additional security layer. These include your...

Read more

Safe Internet Use

The internet has revolutionised the way we live our lives – enabling us to read the news, enjoy entertainment, carry out research, book our holidays, buy and sell, shop, network, learn, bank and carry out many other everyday.

Read more

Virtual Private Networks (VPNs)

Virtual Private Networks all perform the same basic service: providing end-to-end encryption for any data sent through them. This encryption does not stop your data from being intercepted … but merely means that the person...

Read more

Victim Support

Being a victim of any cybercrime – be it fraud or personal identity theft to online abuse, stalking or paedophilia – can be a difficult and frightening thing to deal with, especially as the identity of the perpetrator is...

Read more

Digital Legacies

When people die, they leave their physical assets and money to beneficiaries who could be family members, friends or acquaintances or favourite charities. This is arranged beforehand by making a will or – if there is no will...

Read more

Accepting Terms and Conditions

When using the internet, you are frequently required to accept Terms & Conditions before proceeding with shopping, banking, downloading and other tasks....

Read more

Privacy

Maintaining privacy whilst online is essential in avoiding identity theft and fraud. Apart from these risks, however, there is personal information about you which you undoubtedly do not want to reveal to certain other people....

Read more

Passwords

Your passwords are the most common way to prove your identity when using websites, email accounts and your computer itself (via User Accounts). The use of strong passwords is therefore essential in order to protect your security...

Read more

KEEPING ACTIVITIES SAFE


Two-Factor Authentication

Two-factor authentication – often abbreviated to 2FA – is when a second step is added to the process of logging into your online accounts which require confidentiality, as an additional security layer. These include your...

Read more

Trades Recommendation Websites

A number of websites have been launched in recent years which the public can use to find tradespeople and check their credentials. Tradespeople or companies have profiles on the sites describing their services and often featuring...

Read more

Adult Content

There are a number of precautions you should observe when visiting websites featuring adult content. Firstly, the popularity of such sites means they have become a favoured way of criminals to spread malware, which can have a...

Read more

Smart TVs

Smart TVs (also known as Connected TVs) integrate television with the internet. When connected to the internet, they enable you to search and find videos, movies, photos and other content on the web by interacting via your remote...

Read more

eCards

eCards (electronic or online greeting cards) have become very popular over the past few years. They provide a convenient, inexpensive and fun way to send greetings to friends and family – or if you run a business – your...

Read more

Safe Property Rental

Fraud involving rental properties has always existed, but the fact that the majority of rentals are now advertised online has increased opportunities for fraudsters, and hence the amount of rental fraud that takes place. Such...

Read more

Searching the internet

With ever increasing amounts of material on the internet, virtually any information you need can be found using search engines such as Google and Yahoo! In addition to the benefits that search brings, however, there are some...

Read more

Online Gambling

Online gambling has seen a massive increase in popularity in recent years, and gamblers from the UK have a huge choice of sites to choose from. Some offer only specific types of gambling (such as bingo, poker or betting), whilst...

Read more

Holiday & Travel Booking

When using the internet to research or book your holiday or other travel arrangements, the world is literally at your fingertips. However, there are risks associated with doing so – some specific to holiday and travel booking...

Read more

Job Searching

Job searching online has become by far the most popular method of finding employment. Searching for the type of job you want is fast and easy, and you can see new jobs as soon as employers and agencies post them. However, like...

Read more

Computer Use in Public Places

Using computers, smartphones or tablets in public places is now as commonplace as using them at home or in the office. Whether using your own device – or computers found in internet cafés and libraries – there can be a...

Read more

Online Gambling

Many computer games are played online against other players over the internet, whether on a console, computer, mobile device or via social networking sites. Most play using an assumed identity, so you are generally already...

Read more

Webmail

Webmail, such as Hotmail, Yahoo! Mail or gmail – or that supplied by some internet service providers – makes it easy to email using different computers, smartphones and tablets. However, there are risks associated with using...

Read more

Downloading & File Sharing

Downloading content over the internet is a great way to enjoy music, video, games and other entertainment. Downloading is also a very convenient way to obtain information in the form of Word documents, PDFs, photos and other...

Read more

Call Recording Services

A number of websites have sprung up offering call recording services, whereby calls you make to an organisation can be recorded and stored, so that you can prove what was said in the conversation in the event of disputes. You...

Read more

Avoid Ratting - Remote Access Trojans

You use your computer or mobile device for many everyday private or confidential tasks, which is why it is essential to take precautions to protect it from viruses and spyware. One type of spyware becoming increasingly common is...

Read more