How We Work

Our Philosophy

At Home Security Heroes, we believe that our reputation is the most valuable form of currency. This means that, above all else, we strive to deliver honest, straightforward, and unbiased reviews of all identity theft protection services on the market.

Sometimes this means that we give products shockingly low scores and potentially burn our commercial relationships with them. We don’t particularly enjoy pointing out a product’s flaws, but it is our duty to our readers to do so.

In every review we endeavor to showcase all sides of a product, good and bad. So how do we do this? Through our extensive testing process. Read on to learn more!

Our Testing Process

First we need to get our hands on the product. Duh! So, we buy it with our own money.

We don’t accept gifted subscriptions of any of the products that we review because it may bias our review of it or simply convey the perception of bias.

So during this shopping phase,  we compare each service based on what they claim to provide, and choose what we think is the best value for each service. 

We usually end up paying for the highest tier family plan so that we can review every one of a product’s features.

Next up comes the information input phase, where one of our researchers (hi Kyle and Justin!) inputs all of their information into the product.

We try to ensure that at least two of our researchers test each product we review so that we can get more than one perspective. We have also been deliberate in choosing researchers with varying credit scores and financial backgrounds in order to give these identity theft protection softwares a variety of data to work through.

Additionally, we are careful to ensure that each researcher always inputs the exact same data into each product so that we can create truly apples to apples comparisons. After all, if a researcher inputs 5 email addresses into Aura’s dark web alerts system and only 3 into LifeLock’s, we won’t be able to structure a fair comparison between the two products.

After the information input phase comes the review phase. During this phase we are looking at everything from ease of use to how long it takes for dark web alerts to populate to overall accuracy.

Over 70 datapoints are fed into an internal spreadsheet we affectionately refer to as “The Beast” in order to begin generating a ranking.

When populating our personal information into these products, we intentionally seed them with information that SHOULD throw up an alert: these are known data breaches or past identity theft incidents that we would expect a service like this to catch.

If it finds this planted info: perfect! That means it’s monitoring everything well. If not, that presents a problem and indicates potential gaps in protection.

Of course, along with all the number crunching we also test each service’s threat resolution capabilities by calling them up ourselves, usually multiple times, and grade them on responsiveness, knowledge, 24/7/365 availability and location (US location is preferred).

Sometimes we might call a service five or more times just to get an aggregate measure of their response time. And occasionally, this has lead to some awkward conversations:

Company Rep: “Hi thank you for calling {company} how may I help you today?”

HSH Reviewer: “Hi there. Well, I just wanted to call to see how quickly you answered the phone. And you answered in less than one minute. Nice work!”

Company Rep: “That’s great, I’m very pleased to hear that. What else can I help you with today?”

HSH Reviewer: “Nothing much, really. I’ve already asked my list of 10+ security questions to another one of your reps, so I guess I’ll just hang up now. Have a great day!”.

Once we have gathered all the information necessary to write what we genuinely believe is the best review of that product on the market, we write, revise, and repeat until we have a best-in-class review.

But wait, it’s not over yet. Next up is the publishing process.

Remember all the blood sweat and tears that went into writing that best-in-class review? Now is the time when our editor comes in and rips it to pieces:

“Why didn’t you ask customer support this question?”

“Have you logged on to the service since they introduced that new feature last Friday? That’s missing from the review.”

“You put way too much emphasis on data broker opt-outs and not enough on credit monitoring in this review.”

After our lovingly crafted review has been sufficiently savaged and rebuilt, our head editor will finally (hopefully!) approve it and we’ll move to publishing.

One important note: Home Security Heroes is a work in progress, and some of the articles on the site are outdated. If you encounter an error of any sort, whether a typo or what you perceive as an error in editorial discernment, please let us know here.

A Note About Money (AKA Our Business Model)

Of course, we can’t have a conversation about publishing on the internet without talking about $$$. Home Security Heroes is our attempt to earn a living wage honestly and ethically, unlike those dirty identity thieves out there (yuck!).

This is how our model works:

  • You read one of our reviews, and hopefully it leads you to make an informed buying decision
  • You click one of our links, usually which offers a discount, to one of the products mentioned in the review
  • If you choose to buy that product, we will receive a commission

That’s the affiliate marketing model in a nutshell. We like it because it allows us to create an exceptional website without polluting it with ads. 

But, it’s not perfect. The obvious risk is that the affiliate model pollutes our editorial judgment, and we attempt to counter this by:

  • Being completely transparent about our business model from the beginning
  • Maintaining a separation between our commercial and editorial teams
  • Placing a premium on reader trust even when sometimes that comes at the expense of earning more money in the short-term

We hope that the approach we have taken in building this brand, which involves a far more rigorous testing process than competitors and requires us to put the full weight of our names and reputations behind it, engenders a high degree of trust in you, the reader. 

While we appreciate a sense of humor, identity theft is a serious issue and we take its prevention seriously.