Knowledge Center
Authoritative Insights on Digital Protection
Expert guidance for safeguarding your family, assets, and organization from evolving digital threats.
101 articles
Getting Started with Hush
Getting started with Hush is simple. From your invitation and profile setup to two-factor authentication and onboarding confirmation, this guide walks you through every step of your Hush membership activation.
How to Register Your Number on the National Do Not Call Registry
The National Do Not Call Registry is a free FTC tool that reduces unwanted telemarketing calls to your phone number. Registration takes fewer than five minutes and is one of the simplest steps toward meaningful phone privacy.
How We Handle Duplicate Links and Protect Your Information
How we manage and protect your online profile data At Hush, we prioritize removing your personal information from online...
Google De-Indexing: What Hush Covers
Google de-indexing: what Hush covers At Hush, our priority is protecting your privacy and reducing the public visibility...
Identity Theft Insurance, Monitoring & Restoration Services Provided
Coverage overview Up to $5,000,000 in identity theft insurance and restoration services. Currently available to U.S.-bas...
Why are my vulnerabilities taking longer than expected to be removed?
We understand how frustrating it can be to see vulnerabilities remain visible after a removal request has been submitted...
What countries does Hush currently support?
Hush officially provides full service and support to members in the following countries: United States. Canada. United K...
How Hush Uses Privacy Authorization to Remove Your Personal Data
To remove your personal data quickly and securely, several platforms require written privacy authorization. Hush uses a ...
What should I do if an item doesn't belong to me?
Occasionally, you may notice an item in your Vulnerabilities or Total Digital Footprint tabs that does not belong to you...
Quick Links to Control Your Social Privacy
Each social platform offers its own set of privacy controls, allowing you to tailor how your information is shared and p...
Social Media Security Best Practices
Protecting your digital presence is essential. The guidance below outlines straightforward, high-impact steps to keep yo...
Secure Mail Forward Service
Protecting your privacy extends beyond your digital footprint — your physical mail is equally important. A secure mail f...