MySudo Blog

MySudo Virtual Cards Are Here—Making the Safest Way to Live Online Now Even Safer

Every time you go online, you leave a trail of personal information that data brokers and criminals can scoop up like candy.  Every purchase, every new account or subscription, every web search, every social media post puts you at risk of having your money stolen or your life invaded.  —You see a string of mysterious […]

How to Use a Sudo for Situations Like Moving into a New Home

Meet Patrick. He’s selling his home. This is a short-term life situation for Patrick and he’s hoping he’ll be settled in his new home very soon.  When Patrick begins the sales process, he uses his personal Gmail address and his personal mobile phone number as part of his profile for a range of services: house […]

How Sudo Digital Identities Protect Your Personal Identity

When an application, like a dating site, requests personal information from its users, it is in a good position to obtain (or supply to a data broker) a broad spectrum of personally identifiable information (PII) about a user. This PII can divulge highly sensitive information about a user, such as home location, medical details, personal finances, employment […]

How Sudos Can Give You a Second Chance at Digital Privacy

Think about this: given the extent of the global data privacy crisis, your personal phone number and email address are probably already compromised beyond repair. It’s an interesting thought, isn’t it?  To get the idea, you’ve only got to look at how you use your personal information online, and what happens to your data once […]

Why Compartmentalizing Your Private Data Is Simple With MySudo

Imagine for a moment, you were caught up in one of the 7,098 data breaches reported in 2019 (the highest number on record) or one of the breaches yet to be discovered. Let’s say it’s a shopping site. Perhaps you don’t have to imagine. Perhaps you lived it. If you’re like most of the 4.5 billion internet users, you’ll have […]

Concerned Why We Ask for Your Credit Card When Setting Up MySudo Virtual Cards? Read this.

When you create a MySudo virtual card, we will ask you for a funding source for that card. Right now, we only accept a credit card as a funding source (we are planning additional funding source options to release to you soon).  So, you might ask: Why does a digital privacy company want me to enter […]

We Need to Verify Your Identity for MySudo Virtual Cards—Here’s Why

You’re probably wondering why a company that’s setting new standards in digital privacy asks for your personal information when setting up a MySudo virtual card. It’s a fair question, and one we’re happy to answer. We ask you to enter your accurate and up-to-date legal identity information (name, residential address, and date of birth)* for […]

How to Set Up a MySudo Virtual Card in 5 Simple Steps

Ready to shop safely online with the new MySudo virtual cards? Here we walk you through the five simple steps for setting up a card and getting started.  Before we begin, are you on a MySudo paid plan? Only users on a paid plan can use MySudo virtual cards. If you are on SudoFree plan or a Free trial, […]

What Is Whale Phishing?

Whale phishing is a targeted attack on a high-value target or executive to gain sensitive information. Protection against a whale attack includes the combined efforts of IT departments, the C-suite, and individual discrepancy.

What Is “Vishing” or Phone Phishing?

Phone phishing is how scammers try to obtain personal or financial information via call or text. Vishing attacks might utilize a number of tactics, including phone number spoofing. Protect yourself and others by reporting spoofed numbers.

Dating Can Be Tricky – Make It Easier By Using MySudo
What Is Spear Phishing?

“Spear phishing” is a type of phishing that involves gathering information about a person or company in order to carry out a personalized attack with a better chance at success.

Data Privacy Day

Support data privacy day with us at Anonyome Labs and use a Sudo.

Holiday Shopping With MySudo
Have I Been Hacked? How to Tell If You Have A Compromised Account and What to Do About It

Whether it’s a social media account or bank account, it seems that almost everyone gets hacked at some point or another. This article will explain the basics of an increasingly common issue: hacking. It will define the term in the appropriate context, explain how unauthorized users gain access to others’ devices and accounts, and go over some of the most common signs that your resources are likely to have been compromised. It will conclude with a discussion of important things readers should do if they suspect or know that their account was hacked.

What Is the Google Docs Phishing Scam?

The Google Doc phishing scam reached nearly one million people by mimicking the popular Google Docs app. Phishing scams rely on the trust of the user to gain information.