{"id":123811,"date":"2022-03-16T05:44:53","date_gmt":"2022-03-16T12:44:53","guid":{"rendered":"\/blogs\/?p=123811"},"modified":"2022-08-18T16:13:32","modified_gmt":"2022-08-18T23:13:32","slug":"identity-protection-service-the-best-solution-to-a-growing-problem","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/","title":{"rendered":"Identity Protection Service: The Best Solution to a Growing Problem"},"content":{"rendered":"<p><span data-contrast=\"none\">I\u2019m about to tell you an extraordinary fact about cybercrime. Some of the most significant data breaches in internet history weren\u2019t after bank account numbers, cryptocurrency, or even credit card numbers. They were, in fact, after YOU. That\u2019s right, the most valuable data on the internet is the data that comprises your <\/span>identity. Let\u2019s take a look at what that data is, how it gets leveraged by cybercriminals, and how you can get the online identity monitoring you deserve.<\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Identity exposure in the news\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">1 billion is a big number. In the case of a recent <\/span><a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2021\/06\/16\/cvs-accidentally-leaks-1-billion-website-records-including-covid-19-vaccine-searches\/?sh=1ca8bd4d2c4f&amp;utm_campaign=wp_the_cybersecurity_202&amp;utm_medium=email&amp;utm_source=newsletter&amp;wpisrc=nl_cybersecurity202\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">CVS database leak,<\/span><\/a><span data-contrast=\"none\"> that\u2019s how many user records were accidentally released online, including details like email addresses and even searches about Covid vaccines. This is just one of the dozens of breaches that have occurred recently and will continue to happen as personally, identifiable information becomes more valuable to cybercriminals. Just as remarkable as the huge volume of user data being exposed online is the speed with which compromised data is used by hackers online. Cybersecurity researchers recently <\/span><a href=\"https:\/\/www.zdnet.com\/article\/this-is-how-fast-a-password-leaked-on-the-web-will-be-tested-out-by-hackers\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">discovered<\/span><\/a><span data-contrast=\"none\"> that cybercriminals access leaked or stolen credentials within 12 hours to exploit them as soon as possible. These circumstances beg the question, why has your personally<a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\"> identifiable information has become so valuable lately?\u00a0<\/a><\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Why your Personally Identifiable Information is worth so much to criminals online\u00a0\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">While the value of some information, like a credit card number, is obvious, you may think your name and date of birth aren\u2019t that big of a deal. After all, it wasn\u2019t so long ago that you could find all that information in a phone book. In fact, personally identifiable <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/take-it-personally-ten-tips-for-protecting-your-personally-identifiable-information-pii\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">information<\/span><\/a><span data-contrast=\"none\"> (PII), also known as data used to identify a specific individual, is what many <\/span><a href=\"https:\/\/allpointsprotects.com\/pii-what-is-it-and-why-its-important\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">data breaches<\/span><\/a><span data-contrast=\"none\"> are after.\u00a0\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Armed with just a mailing address, a phone number, and a date of birth, a cybercriminal can begin constructing a fake <\/span>identity<span data-contrast=\"none\"> to take out loans and disguise many kinds of criminal activities. With a social security number and a few personal details from a social media account, they could take over a bank account. When it comes to your PII, any information is as good as gold to cybercriminals.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Your PII may not be as safe as you think.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">If our PII were treated like actual gold and held in a safe location like Fort Knox, I wouldn\u2019t be writing this post. But in fact, it\u2019s the currency we use to obtain many services in our connected lives. Social media sites are massive repositories of PII, and their access to our most personal details and the ability to sell it to marketers is the reason the service remains free. Free email services are the same. Now consider all the other accounts we may have created to, say, try out a streaming service for free, or even old accounts we no longer use. From that perspective, you can see how much of your data is being used by companies, may not be very well protected, and is a tempting target for cybercriminals. Fortunately, there are many things you can do to <a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\">keep your <\/a><\/span>identity safer online.<\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Learn to spot a breach and to keep your identity safer<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">When it comes to protecting your PII, knowledge is power. Let\u2019s start by identifying if you\u2019ve been the target of a data breach. Here are a few tell-tale signs:\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">You receive a bill for a credit card account that, though in your name, is not yours. This probably means a thief opened the account in your name.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Unfamiliar purchases on your credit card, even tiny ones (crooks often start out with small purchases, and then escalate). Challenge even a $4 purchase.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">You receive a credit card or store card without having applied for one. If this happens, immediately contact the company.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Your credit report has suspicious information, like inquiries for credit that you didn\u2019t make.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Collectors are calling you to collect payments you owe, but you owe nothing.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Be stingy when it comes to PII\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Okay, now that you know the signs of a data breach, let\u2019s look at how you can take action to protect yourself. The <\/span>best way to avoid being the victim of identity theft is by limiting the amount of PII you provide. There are some easy ways to do this.<\/p>\n<h3 aria-level=\"4\"><b><span data-contrast=\"none\">1. Avoid giving out your social security number whenever possible<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Only a few types of organizations legitimately need your social security number. These include employers or when contracting with a business, group health insurance, financial and real estate transactions, applying for credit cards, car loans, and so forth.\u00a0 <\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"4\"><b><span data-contrast=\"none\">2. Stay away from online quizzes<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Quizzes, social media games, and other kinds of interactive clickbait are often grifting pieces of your PII in a seemingly playful way. While you\u2019re not giving up your SSN, you may be giving up things like your birthday, your pet\u2019s name, your first car \u2026 things that people often use to compose their passwords or use as answers to common security questions on banking and financial sites.\u00a0\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"4\"><b><span data-contrast=\"none\">3. Watch out for phishing scams<\/span><\/b><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">A phishing email poses as a real email from known or trusted brands and financial institutions. These emails attempt to trick you into sharing important information like your logins, account numbers, credit card numbers, and so on under the guise of providing customer service. Here are some more ways to spot a <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/phishing-email-examples-how-to-recognize-a-phishing-email\/?hilite=%27phishing%27\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">phishing email.<\/span><\/a><span data-contrast=\"none\">\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"4\"><b><span data-contrast=\"none\">4. Free yourself from PII worries with a new kind of identity protection<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p>Clearly, we\u2019re in a new era when it comes to securing our identities online. In response, McAfee has created a new kind of identity monitoring.<\/p>\n<p>We knew from the outset Identity monitoring had to be proactive, holistic, and accessible. We also wanted it to follow the timeline for how cybercrime actually affects your identity.\u00a0 When it comes to PII, the breach is just the first step for cybercriminals. The 10 months following a breach is when cybercriminals will use your PII to commit fraudulent acts using your data.<\/p>\n<p>To address this, your identity monitoring looks after more personally identifiable information than other leading competitors. It will also alert you of stolen personal info an average of 10 months ahead of other monitoring services. And it\u2019s accessible anywhere via mobile app, browser, and the web.<\/p>\n<p>In practice, McAfee\u2019s identity monitoring protects all your online accounts by doing the following:<\/p>\n<ul>\n<li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Monitors your PII\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">If detected, alerts you\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Offers quick and guided help to neutralize the threat\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"none\">Provides educational content to help prevent future issues\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u00b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"none\">Offers insurance and agent-assisted remediation, available for select plans\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:420}\">\u00a0<\/span><\/li>\n<\/ul>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-1 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-1 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-1 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-1 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-1' class='gallery galleryid-123811 gallery-columns-3 gallery-size-medium'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/attachment\/1080x1080_image3_3\/'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_3-300x300.jpg\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_3-300x300.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_3-1024x1024.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_3-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_3-768x768.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_3-129x129.jpg 129w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_3-24x24.jpg 24w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_3-48x48.jpg 48w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_3-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_3.jpg 1080w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/attachment\/1080x1080_image3_2\/'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_2-300x300.jpg\" class=\"attachment-medium size-medium\" alt=\"identity protection\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_2-300x300.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_2-1024x1024.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_2-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_2-768x768.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_2-129x129.jpg 129w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_2-24x24.jpg 24w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_2-48x48.jpg 48w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_2-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_2.jpg 1080w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/attachment\/1080x1080_image3_1\/'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_1-300x300.jpg\" class=\"attachment-medium size-medium\" alt=\"identity protection\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_1-300x300.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_1-1024x1024.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_1-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_1-768x768.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_1-129x129.jpg 129w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_1-24x24.jpg 24w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_1-48x48.jpg 48w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/1080x1080_image3_1.jpg 1080w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t<\/dt><\/dl><br style=\"clear: both\" \/>\n\t\t<\/div>\n\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Enjoy your life online again with a holistic approach to security\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p>As we spend more of our lives online, we need an approach to security that reflects this new reality. Identity monitoring is part of it. <a href=\"https:\/\/www.mcafee.com\/en-us\/vpn\/mcafee-safe-connect.html?path=blogs\" target=\"_blank\" rel=\"noopener\">VPN<\/a> is part of it. Antivirus is part of it. They are all pieces of a puzzle that we solve with products like <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-total-protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\">McAfee Total Protection<\/a>. Our premier security service is comprehensive, affordable, and, with <a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\">identity monitoring<\/a>, an indispensable part of your life online.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I\u2019m about to tell you an extraordinary fact about cybercrime. Some of the most significant data breaches in internet history&#8230;<\/p>\n","protected":false},"author":674,"featured_media":128971,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[6339,10213,142,10216,10210],"coauthors":[3973],"class_list":["post-123811","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-privacy-identity-protection","tag-identity-protection","tag-identity-protection-service","tag-tag-identity-theft","tag-online-identity-protection","tag-personal-identifiable-information"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Identity Protection Service: The Best Solution to a Growing Problem | McAfee Blog<\/title>\n<meta name=\"description\" content=\"I\u2019m about to tell you an extraordinary fact about cybercrime. Some of the most significant data breaches in internet history weren\u2019t after bank account Some of the most significant data breaches in internet history weren\u2019t after bank account numbers, cryptocurrency, or even credit card numbers. They were, in fact, after your personal information. Let&#039;s take a look at what personal identifiable information data is, how it gets leveraged by cybercriminals, and how you can get the online identity protection you deserve.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity Protection Service: The Best Solution to a Growing Problem | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"I\u2019m about to tell you an extraordinary fact about cybercrime. Some of the most significant data breaches in internet history weren\u2019t after bank account Some of the most significant data breaches in internet history weren\u2019t after bank account numbers, cryptocurrency, or even credit card numbers. They were, in fact, after your personal information. Let&#039;s take a look at what personal identifiable information data is, how it gets leveraged by cybercriminals, and how you can get the online identity protection you deserve.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-16T12:44:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-18T23:13:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/300x200_IdentityProtectionService.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Identity Protection Service: The Best Solution to a Growing Problem\",\"datePublished\":\"2022-03-16T12:44:53+00:00\",\"dateModified\":\"2022-08-18T23:13:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/\"},\"wordCount\":1188,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/300x200_IdentityProtectionService.jpg\",\"keywords\":[\"identity protection\",\"Identity protection service\",\"identity theft\",\"Online identity protection\",\"Personal identifiable information\"],\"articleSection\":[\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/\",\"name\":\"Identity Protection Service: The Best Solution to a Growing Problem | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/300x200_IdentityProtectionService.jpg\",\"datePublished\":\"2022-03-16T12:44:53+00:00\",\"dateModified\":\"2022-08-18T23:13:32+00:00\",\"description\":\"I\u2019m about to tell you an extraordinary fact about cybercrime. Some of the most significant data breaches in internet history weren\u2019t after bank account Some of the most significant data breaches in internet history weren\u2019t after bank account numbers, cryptocurrency, or even credit card numbers. They were, in fact, after your personal information. Let's take a look at what personal identifiable information data is, how it gets leveraged by cybercriminals, and how you can get the online identity protection you deserve.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/300x200_IdentityProtectionService.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/300x200_IdentityProtectionService.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy &amp; Identity Protection\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Identity Protection Service: The Best Solution to a Growing Problem\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identity Protection Service: The Best Solution to a Growing Problem | McAfee Blog","description":"I\u2019m about to tell you an extraordinary fact about cybercrime. Some of the most significant data breaches in internet history weren\u2019t after bank account Some of the most significant data breaches in internet history weren\u2019t after bank account numbers, cryptocurrency, or even credit card numbers. They were, in fact, after your personal information. Let's take a look at what personal identifiable information data is, how it gets leveraged by cybercriminals, and how you can get the online identity protection you deserve.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Identity Protection Service: The Best Solution to a Growing Problem | McAfee Blog","og_description":"I\u2019m about to tell you an extraordinary fact about cybercrime. Some of the most significant data breaches in internet history weren\u2019t after bank account Some of the most significant data breaches in internet history weren\u2019t after bank account numbers, cryptocurrency, or even credit card numbers. They were, in fact, after your personal information. Let's take a look at what personal identifiable information data is, how it gets leveraged by cybercriminals, and how you can get the online identity protection you deserve.","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2022-03-16T12:44:53+00:00","article_modified_time":"2022-08-18T23:13:32+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/300x200_IdentityProtectionService.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Identity Protection Service: The Best Solution to a Growing Problem","datePublished":"2022-03-16T12:44:53+00:00","dateModified":"2022-08-18T23:13:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/"},"wordCount":1188,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/300x200_IdentityProtectionService.jpg","keywords":["identity protection","Identity protection service","identity theft","Online identity protection","Personal identifiable information"],"articleSection":["Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/","name":"Identity Protection Service: The Best Solution to a Growing Problem | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/300x200_IdentityProtectionService.jpg","datePublished":"2022-03-16T12:44:53+00:00","dateModified":"2022-08-18T23:13:32+00:00","description":"I\u2019m about to tell you an extraordinary fact about cybercrime. Some of the most significant data breaches in internet history weren\u2019t after bank account Some of the most significant data breaches in internet history weren\u2019t after bank account numbers, cryptocurrency, or even credit card numbers. They were, in fact, after your personal information. Let's take a look at what personal identifiable information data is, how it gets leveraged by cybercriminals, and how you can get the online identity protection you deserve.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/300x200_IdentityProtectionService.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/300x200_IdentityProtectionService.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/identity-protection-service-the-best-solution-to-a-growing-problem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Privacy &amp; Identity Protection","item":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/"},{"@type":"ListItem","position":3,"name":"Identity Protection Service: The Best Solution to a Growing Problem"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/123811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=123811"}],"version-history":[{"count":0,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/123811\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/128971"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=123811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=123811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=123811"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=123811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}