Frequently asked questions

Keystroke Encryption Software Questions

Can I use keystroke encryption on multiple computers?

Your EndpointLock software will work on as many devices as your license allows.

What versions of Windows operating systems does EndpointLock Keystroke Encryption work on?

EndpointLock is compatible with Windows 7, 8, 10

Is EndpointLock Keystroke Encryption compatible with Mac OS Sierra?

Yes, the current version of EndpointLock® for Mac is fully compatible with macOS 10.12.x (Sierra). If an update for EndpointLock® is available for your system, you will receive a notification from the EndpointLock® application upon restarting it.

What is keystroke encyrption?

EndpointLock keystroke encryption is a software program that encrypts your keystrokes between the keyboard and your desktop applications and Internet browsers, so that keyloggers cannot steal your personal or financial information. EndpointLock works with all major browsers to block keyloggers from grabbing information going to internet applications. EndpointLock also protects desktop applications like MS Office, bookkeeping software such as QuickBooks and TurboTax, Skype and other messaging programs, and Windows “login” screens.

What is a keylogger?

A keylogger is a piece of software that records every keystroke you make on a keyboard. Malicious (“malware”) keyloggers are designed to avoid detection from anti-virus programs and invade your computer without your knowledge or consent when you install a program, get an email, visit a website or otherwise use your computer online. Once installed, the keylogger records all your key strokes, and then sends your personal and confidential information back to the cyber criminal.

What’s the difference between EndpointLock and anti-virus?

Anti-virus looks can only identify known or catalogued viruses. EndpointLock keystroke encryption protects you from uncatalogued keylogging malware (also known as zero-day). In addition, EndpointLock keytakes a unique approach to protect your confidential information. When you type on your keyboard, EndpointLock encrypts all keystrokes at the point of origin (your keyboard), then carries those encrypted keystrokes to any browser or desktop application via its own proprietary path, bypassing the place where keyloggers reside. This way, existing and new keyloggers can’t get their hands on your keystrokes. In addition to anti-keylogging, EndpointLock prevents screen-scraping malware from taking screen shots while you are in any application, and warns you of clickjacking attacks. The EndpointLock anti-subversion feature detects untrusted drivers and kernel level compromises, and displays a warning containing the location of any suspect driver.

General Plan Questions

What is ID Theft?

Identity theft occurs when someone uses your name or personal information without your knowledge to commit fraud or theft. This includes opening a credit card account, taking out a loan and / or making a major purchase fraudulently. once your identity is compromised, thieves can useit repeatedly, using each new account as a reference for the next one.

What is the Summary of Benefits?

Please see Summary of Benefits provided in your Customer Portal. This document, summarizing the benefits available to the insureds, should be included with your marketing material.

When should I contact the ID Theft Customer Service Number?

The ID Theft Customer Service number should be recommended for use when an insured believes that they have been victim of identity theft.

What types of expenses are covered in the event of an Identity Theft Crime?

The Identity Theft policy includes up to $1,000,000 of which $25,000 will cover most out-of-pocket expenses incurred in reclaiming one's identity. Epenses like lost wages, loan applications or filing fees, legal and notary fees and more. There is no deductible.

What steps should the customer take if they suspect an identity theft crime?

The customer should call the ID Theft Customer Service Center (1-XXX-XXX-XXXX) for step-by-steo instructions for filing a claim and to answer any other questions or concerns.