$5M Identity Theft Insurance ·Now included with Hush. Learn more

Knowledge Center

Authoritative Insights on Digital Protection

Expert guidance for safeguarding your family, assets, and organization from evolving digital threats.

101 articles

Administrator & Onboarding

Getting Started with Hush

Getting started with Hush is simple. From your invitation and profile setup to two-factor authentication and onboarding confirmation, this guide walks you through every step of your Hush membership activation.

Read Article
Privacy & Protection Guides

How to Register Your Number on the National Do Not Call Registry

The National Do Not Call Registry is a free FTC tool that reduces unwanted telemarketing calls to your phone number. Registration takes fewer than five minutes and is one of the simplest steps toward meaningful phone privacy.

Read Article
Removals & Remediation

How We Handle Duplicate Links and Protect Your Information

How we manage and protect your online profile data At Hush, we prioritize removing your personal information from online...

Read Article
Removals & Remediation

Google De-Indexing: What Hush Covers

Google de-indexing: what Hush covers At Hush, our priority is protecting your privacy and reducing the public visibility...

Read Article
General FAQs

Identity Theft Insurance, Monitoring & Restoration Services Provided

Coverage overview Up to $5,000,000 in identity theft insurance and restoration services. Currently available to U.S.-bas...

Read Article
Removals & Remediation

Why are my vulnerabilities taking longer than expected to be removed?

We understand how frustrating it can be to see vulnerabilities remain visible after a removal request has been submitted...

Read Article
General FAQs

What countries does Hush currently support?

Hush officially provides full service and support to members in the following countries: United States. Canada. United K...

Read Article
Removals & Remediation

How Hush Uses Privacy Authorization to Remove Your Personal Data

To remove your personal data quickly and securely, several platforms require written privacy authorization. Hush uses a ...

Read Article
Vulnerability Types

What should I do if an item doesn't belong to me?

Occasionally, you may notice an item in your Vulnerabilities or Total Digital Footprint tabs that does not belong to you...

Read Article
Social Media & LinkedIn Privacy

Quick Links to Control Your Social Privacy

Each social platform offers its own set of privacy controls, allowing you to tailor how your information is shared and p...

Read Article
Social Media & LinkedIn Privacy

Social Media Security Best Practices

Protecting your digital presence is essential. The guidance below outlines straightforward, high-impact steps to keep yo...

Read Article
Privacy & Protection Guides

Secure Mail Forward Service

Protecting your privacy extends beyond your digital footprint — your physical mail is equally important. A secure mail f...

Read Article