{"id":4926,"date":"2020-06-04T17:24:31","date_gmt":"2020-06-04T17:24:31","guid":{"rendered":"https:\/\/myinfobag.com\/?p=4926"},"modified":"2020-06-04T17:24:33","modified_gmt":"2020-06-04T17:24:33","slug":"how-to-protect-yourself-from-identity-theft","status":"publish","type":"post","link":"https:\/\/myinfobag.com\/?p=4926","title":{"rendered":"How to Protect Yourself from Identity Theft"},"content":{"rendered":"\n<p>Millions of Americans fall victim to identity theft each year. Identity theft occurs when someone illegally acquires your Personally Identifiable Information (PII), which is later used to commit fraud. Identity theft can happen in numerous ways. However, most fraudsters use the internet to commit identity theft frauds.<\/p>\n\n\n\n<p>Fraudsters can access your digital PII by planting malware on your personal computer. An individual\u2019s digital PII (Personally Identifiable Information) contains a lot of sensitive information. This information includes your bank account numbers and driver\u2019s license. These are unique pieces of information that are used to identify you. Once fraudsters gain access to your Personally Identifiable Information, they might present themselves as you. They may make claims for financial benefits in which you are entitled. For example, if a fraudster acquires your social security number, it is possible that he\/she could apply for a tax refund or file employment forms in your name.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Types of Online Identity Theft<\/strong><\/h2>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Phishing<\/strong><\/h4>\n\n\n\n<p>Phishing is a cybercrime that is used by fraudsters in order to acquire personal information from people. In phishing, the victim receives e-mails from the fraudsters, who deceive themselves as a trusted organization. In most cases, the victim receives an e-mail, which appears to be from a financial institution. The victim is then manipulated into clicking on the links that these e-mails provide. The victim ultimately ends up sharing his\/her sensitive personal information. Thus acquired information is later exploited for financial scams later on.<\/p>\n\n\n\n<p>To protect yourself from phishing, ignore unsolicited spam e-mails. If you want to access the website of a financial institution, ensure the safety of the website before logging in. Always type in the URL of the website in the address bar of your browser, rather than clicking on unknown e-mails. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Pharming<\/strong><\/h4>\n\n\n\n<p>Pharming is another type of cyber-attack aimed at stealing your personal information. However, in this case, your web browser is infected by a virus. Even if you type in the URL of a trusted website, the browser redirects you to a scam website. This website might appear legitimate. Fraudsters can easily compile the personal information that you type in this website. Unsecured websites can easily take away your personal information. Secure websites carry the prefix \u201chttps\u201d in their URL. Websites whose prefixes are \u201cHTTP\u201d are not secure.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Malware<\/strong><\/h4>\n\n\n\n<p>A malware attack is another method used by fraudsters and cybercriminals to steal personal information of an individual. The user may be tricked into downloading malware, which is often disguised as genuine software. This software can attack your personal computer and ultimately expose your personal information to fraudsters. It is always recommended to buy genuine versions of the software. If you are downloading the software online, make sure that you are downloading it from a trusted website.<\/p>\n\n\n\n<p>While discarding or selling your old device, make sure that the device is formatted so that you do not reveal your personal information. Always keep your software up-to-date. Setting up a firewall and installing antivirus software is also highly recommended. If children are using any internet-connected device, make sure that the information that they share is monitored by adults.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Millions of Americans fall victim to identity theft each year. Identity theft occurs when someone illegally acquires your Personally Identifiable Information (PII), which is later used to commit fraud. Identity theft can happen in numerous ways. However, most fraudsters use the internet to commit identity theft frauds. Fraudsters can access your digital PII by planting [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":4931,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5828],"tags":[6111,6113,6112,6114,5056],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Protect Yourself from Identity Theft | MyInfoBag<\/title>\n<meta name=\"description\" content=\"Millions of Americans fall victim to identity theft each year. Identity theft occurs when someone illegally acquires your Personally Identifiable...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/myinfobag.com\/?p=4926\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Yourself from Identity Theft | MyInfoBag\" \/>\n<meta property=\"og:description\" content=\"Millions of Americans fall victim to identity theft each year. Identity theft occurs when someone illegally acquires your Personally Identifiable...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/myinfobag.com\/?p=4926\" \/>\n<meta property=\"og:site_name\" content=\"MyInfoBag\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-04T17:24:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-04T17:24:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/myinfobag.com\/wp-content\/uploads\/2020\/06\/hack-fraud-card-code.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"910\" \/>\n\t<meta property=\"og:image:height\" content=\"609\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/myinfobag.com\/#organization\",\"name\":\"MyInfoBag\",\"url\":\"https:\/\/myinfobag.com\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/myinfobag.com\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/myinfobag.com\/wp-content\/uploads\/2020\/03\/insta.jpg\",\"width\":110,\"height\":110,\"caption\":\"MyInfoBag\"},\"image\":{\"@id\":\"https:\/\/myinfobag.com\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/myinfobag.com\/#website\",\"url\":\"https:\/\/myinfobag.com\/\",\"name\":\"MyInfoBag\",\"description\":\"All Financial Information Under One Belt\",\"publisher\":{\"@id\":\"https:\/\/myinfobag.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/myinfobag.com\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/myinfobag.com\/?p=4926#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/myinfobag.com\/wp-content\/uploads\/2020\/06\/hack-fraud-card-code.jpg\",\"width\":910,\"height\":609,\"caption\":\"Know about How To Protect Yourself from Identity Theft\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/myinfobag.com\/?p=4926#webpage\",\"url\":\"https:\/\/myinfobag.com\/?p=4926\",\"name\":\"How to Protect Yourself from Identity Theft | MyInfoBag\",\"isPartOf\":{\"@id\":\"https:\/\/myinfobag.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/myinfobag.com\/?p=4926#primaryimage\"},\"datePublished\":\"2020-06-04T17:24:31+00:00\",\"dateModified\":\"2020-06-04T17:24:33+00:00\",\"description\":\"Millions of Americans fall victim to identity theft each year. Identity theft occurs when someone illegally acquires your Personally Identifiable...\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/myinfobag.com\/?p=4926\"]}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/myinfobag.com\/?p=4926#article\",\"isPartOf\":{\"@id\":\"https:\/\/myinfobag.com\/?p=4926#webpage\"},\"author\":{\"@id\":\"https:\/\/myinfobag.com\/#\/schema\/person\/c0d93a9ec13bdeb12e55eb1e783ec74b\"},\"headline\":\"How to Protect Yourself from Identity Theft\",\"datePublished\":\"2020-06-04T17:24:31+00:00\",\"dateModified\":\"2020-06-04T17:24:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/myinfobag.com\/?p=4926#webpage\"},\"publisher\":{\"@id\":\"https:\/\/myinfobag.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/myinfobag.com\/?p=4926#primaryimage\"},\"keywords\":\"Identity Theft,Malware,Online Security,Pharming,phishing\",\"articleSection\":\"Technology\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/myinfobag.com\/?p=4926#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/myinfobag.com\/#\/schema\/person\/c0d93a9ec13bdeb12e55eb1e783ec74b\",\"name\":\"MyInfoBag\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/myinfobag.com\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/864d6778168b7ecad326a6f127d73c00?s=96&d=mm&r=g\",\"caption\":\"MyInfoBag\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/myinfobag.com\/index.php?rest_route=\/wp\/v2\/posts\/4926"}],"collection":[{"href":"https:\/\/myinfobag.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/myinfobag.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/myinfobag.com\/index.php?rest_route=\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/myinfobag.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4926"}],"version-history":[{"count":10,"href":"https:\/\/myinfobag.com\/index.php?rest_route=\/wp\/v2\/posts\/4926\/revisions"}],"predecessor-version":[{"id":5240,"href":"https:\/\/myinfobag.com\/index.php?rest_route=\/wp\/v2\/posts\/4926\/revisions\/5240"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/myinfobag.com\/index.php?rest_route=\/wp\/v2\/media\/4931"}],"wp:attachment":[{"href":"https:\/\/myinfobag.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/myinfobag.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/myinfobag.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}