{"id":134077,"date":"2022-06-25T18:13:39","date_gmt":"2022-06-26T01:13:39","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=134077"},"modified":"2022-06-21T11:40:47","modified_gmt":"2022-06-21T18:40:47","slug":"what-to-do-if-your-identity-has-been-stolen","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/","title":{"rendered":"What to Do If Your Identity Has Been Stolen"},"content":{"rendered":"<p>We live online these days, sharing everything from vacation pictures to what we eat for breakfast on the internet. The internet is also useful for daily activities, like buying groceries or paying bills.<\/p>\n<p>While it\u2019s convenient to connect with people and complete tasks online, cybercriminals are eager to use the internet to steal financial or personal data for their personal gain \u2014 otherwise known as identity theft. This is a criminal act and can affect your credit score in a negative way and cost money to fix. It can also affect employment opportunities since some employers conduct a credit check on top of drug testing and a criminal history check. Identity theft victims may even experience an impact to their mental health as they work to resolve their case.<\/p>\n<p>The good news is that being able to recognize the signs of identity theft means you can act quickly to intervene and minimize any effects in case it happens to you. You can also protect yourself by using preventive measures and engaging in smart online behavior. This article provides essential information about identity theft, giving you the tools you need to become an empowered internet user and live your best life online.<\/p>\n<h2><strong>5 steps to take if your identity has been stolen<\/strong><\/h2>\n<p>The internet is a great place to be, but identity thieves hope to catch you off-guard and seek access to your personal information for their benefit. This could include private details like your birth date, bank account information, Social Security number, home address, and more. With data like this, an individual can adopt your identity (or even create a fake identity using pieces of your personal profile) and apply for loans, credit cards, debit cards, and more.<\/p>\n<p>You don\u2019t have to be kept in the dark, though. There are several signs that your identity has been stolen, from a change in your credit score to receiving unfamiliar bills and debt collectors calling about unfamiliar new accounts. If you suspect that you\u2019ve been affected by identity fraud, you can act fast to minimize what happens. Here\u2019s what to do.<\/p>\n<h3><strong>File a police report<\/strong><\/h3>\n<p>Start by contacting law enforcement to file a report. Your local police department can issue a formal report, which you may need to get your bank or other financial institution to reverse fraudulent charges. An official report assures the bank that you have been affected by identity fraud and it\u2019s not a scam.<\/p>\n<p>Before going to the police, gather all the relevant information about what happened. This could include the dates and times of fraudulent activity and any account numbers affected. Bringing copies of your bank statements can be useful. Also, make note of any suspicious activity that could be related. For example, was your debit card recently lost or your email hacked? The police will want to know.<\/p>\n<h3><strong>Notify the company where the fraud occurred<\/strong><\/h3>\n<p>You should also notify any businesses linked to your identity theft case. Depending on the type of identity theft, this could include banks, credit card companies, medical offices, health insurers, e-commerce stores, and more. For example, if someone used your credit card to make purchases on Amazon, alert the retailer.<\/p>\n<p>Medical identity theft is another good example. In this case, a fraudster may assume your identity to gain access to health care services, such as medical checkups, prescription drugs, or pricey medical devices like wheelchairs. If someone uses your health insurance to get prescription drugs from a pharmacy, for instance, make sure to alert the pharmacy and your insurer.<\/p>\n<h3><strong>File a report with the Federal Trade Commission<\/strong><\/h3>\n<p>The Federal Trade Commission (FTC) is a government body that protects consumer interests. You can report identity theft via their portal, <a href=\"https:\/\/www.identitytheft.gov\/#\/\" target=\"_blank\" rel=\"noopener\">IdentityTheft.gov<\/a>. They\u2019ll then use the details you provide to create a free recovery plan you can use to address the effects of identity theft, like contacting the major credit bureaus or alerting the Internal Revenue Service (IRS) fraud department. You can report your case <a href=\"https:\/\/www.identitytheft.gov\/#\/assistant\" target=\"_blank\" rel=\"noopener\">online<\/a> or by calling 1-877-438-4338.<\/p>\n<h3><strong>Ask credit reporting agencies to issue a fraud alert<\/strong><\/h3>\n<p>A common consequence of identity theft is a dip in the victim\u2019s credit score. For example, a cybercriminal may take out new lines of credit in the victim\u2019s name, accrue credit card debt, and then not pay the balance. For this reason, contacting the credit monitoring bureaus is one of the most important steps to take in identity theft cases.<\/p>\n<p>There are three main agencies: TransUnion, Equifax, and Experian. You can get a free credit report from each agency every 12 months via <a href=\"https:\/\/www.annualcreditreport.com\/index.action\" target=\"_blank\" rel=\"noopener\">AnnualCreditReport.com<\/a>. Check the report and note all fraudulent activity or false information and flag it with the relevant bureau\u2019s fraud department. You should also initiate a fraud alert with each agency.<\/p>\n<p>A fraud alert requires any creditors to verify your identity before opening a new line of credit. This adds an extra layer of security. An initial fraud alert lasts for 90 days. Once this expires, you can prolong your protection via an extended fraud alert, which will remain valid for seven years. You can notify one of the big three bureaus to set it up. They are then required to notify the other two bureaus.<\/p>\n<p>A credit freeze is another smart move, which you can do through each of the three major credit bureaus. You can either call them or start the process online. This prevents people from accessing your credit report. Lenders, creditors, retailers, landlords, and others may want to see your credit as proof of financial stability. For example, if someone tries to open a phone contract under your name, the retailer may check the credit report. If there is a credit freeze in place, they won\u2019t be able to view it and won\u2019t issue the contract. If you need to allow someone access to your credit report, you can temporarily lift the freeze.<\/p>\n<h3><strong>Change passwords to all of your accounts<\/strong><\/h3>\n<p>Identity theft is often linked with leaked or hacked passwords. Even if you aren\u2019t sure whether your passwords have been compromised, it\u2019s best to play it safe. Change passwords to any affected accounts. Make sure to use strong passwords with a mix of numbers, letters, and symbols. Further, if there\u2019s a chance to activate two-factor authentication on your accounts, this can provide added protection going forward.<\/p>\n<h2><strong>Is it possible to prevent identity theft?<\/strong><\/h2>\n<p>Ideally, you\u2019ll never become the victim of identity theft, but things can happen. Cybercriminals work hard, but you can stay one step ahead by taking a few preventative measures. These include:<\/p>\n<ul>\n<li><strong>Learn how to recognize common scams. <\/strong>ID theft comes in many forms, from email phishing scams to social media snooping, device hacking, and data breaches. Learn the signs of a scam. For example, <a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/phishing-email-examples-how-to-recognize-a-phishing-email\/?27phishing%27\" target=\"_blank\" rel=\"noopener\">phishing emails<\/a> are often poorly written and frequently follow certain formats, like claiming that an account of yours has been suspended.<\/li>\n<li><strong>Activate fraud alerts. <\/strong>Most financial institutions provide alerts about suspected fraudulent transactions, sending you a notification via phone call, text, or email if they notice suspicious activity on your account. The bank may also freeze an account automatically until any potentially unauthorized charges are clarified and confirmed by the account owner.<\/li>\n<li><strong>Protect your devices with strong passwords.<\/strong> Your devices, including your phone, tablet, and laptop, should all be password-protected. In case one of your tech tools is stolen, it will be harder for fraudsters to gain access to your personal data. Set strong passwords with a mix of letters, numbers, and symbols. Make sure they don\u2019t include information a person could figure out easily, like your home address or birthday.<\/li>\n<li><strong>Use different passwords for different accounts.<\/strong> Any online accounts you use, from your banking app to your email, should be password-protected. Follow the same rules for setting strong passwords, but don\u2019t duplicate passwords. If a hacker cracks the code for one account, they can easily guess their way into your other accounts. A password manager can help you stay on top of your passwords by encrypting them and storing them safely for easy tracking. <a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html\" target=\"_blank\" rel=\"noopener\">McAfee Identity Protection<\/a> includes a password manager that can secure your account credentials across devices.<\/li>\n<li><strong>Protect your documents. <\/strong>Protect hard copies of sensitive documents, like your Social Security card and birth certificate, by keeping them locked away. Also, dispose of documents with personal data by shredding them. This ensures that dumpster divers can\u2019t access your information. Documents to shred might include invoices, bank statements, medical records, canceled checks, and junk mail with your name, phone number, and address.<\/li>\n<li><strong>Don\u2019t overshare on social media. <\/strong>Social media is a great way to connect with friends and family, but it can also be a goldmine for identity thieves. Avoid sharing details like your kids\u2019 or pets\u2019 names, which are often used in passwords. Sensitive information, like a home address or birthday, can also be used to build a fake identity. You may want to set your social media accounts to private in addition to limiting what you share.<\/li>\n<li><strong>Review your credit report. <\/strong>You have the right to one free copy of your credit report every 12 months, which you can request via <a href=\"https:\/\/www.annualcreditreport.com\/index.action\" target=\"_blank\" rel=\"noopener\">AnnualCreditReport.com<\/a>. This provides you with a report from each of the three major credit bureaus. Review the report, verifying personal information, account details, and public records (like bankruptcies or liens) to ensure there isn\u2019t anything suspicious.<\/li>\n<li><strong>Follow the news. <\/strong>When major corporations are targeted by hackers, they\u2019re <a href=\"https:\/\/www.ncsl.org\/research\/telecommunications-and-information-technology\/security-breach-notification-laws.aspx\" target=\"_blank\" rel=\"noopener\">required to alert affected consumers<\/a>. These breaches are also often reported in the media. To take a more proactive approach, though, check out the <a href=\"https:\/\/www.mcafee.com\/blogs\/\">McAfee blog<\/a>, which reports on breaches. If a business you use has been affected, change your passwords.<\/li>\n<\/ul>\n<p>You can further protect yourself with antivirus software like McAfee\u2019s <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus.html\" target=\"_blank\" rel=\"noopener\">Total Protection plan<\/a>. This can help protect your devices against spyware and viruses. You can also enhance your network security with a <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/firewall.html\" target=\"_blank\" rel=\"noopener\">firewall<\/a> and <a href=\"https:\/\/www.mcafee.com\/en-us\/vpn.html\" target=\"_blank\" rel=\"noopener\">virtual private network<\/a> (VPN). A firewall controls traffic on your internet network based on predefined security parameters, while a VPN hides your IP address and other personal data.<\/p>\n<h2><strong>Sign up for a protection plan today<\/strong><\/h2>\n<p>Don\u2019t let concerns about identity fraud keep you from enjoying all the conveniences and perks the internet offers. McAfee\u2019s <a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html\" target=\"_blank\" rel=\"noopener\">identity theft<\/a><a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html\" target=\"_blank\" rel=\"noopener\"> protection services<\/a> can help you stay connected while keeping you safe. Tailor your package to your household\u2019s needs to get the safeguards you want, like ID theft coverage, VPN, and 24\/7 monitoring. Our Total Protection plan also comes with $1 million in identity theft coverage to cover qualifying losses and hands-on support to help you reclaim your identity.<\/p>\n<p>With McAfee by your side, you can stay online confidently.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We live online these days, sharing everything from vacation pictures to what we eat for breakfast on the internet. The&#8230;<\/p>\n","protected":false},"author":674,"featured_media":134080,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[11428],"coauthors":[3973],"class_list":["post-134077","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-privacy-identity-protection","tag-how-to-know-if-your-identity-has-been-stolen"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What to Do If Your Identity Has Been Stolen | McAfee Blog<\/title>\n<meta name=\"description\" content=\"We live online these days, sharing everything from vacation pictures to what we eat for breakfast on the internet. The internet is also useful for daily\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to Do If Your Identity Has Been Stolen | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"We live online these days, sharing everything from vacation pictures to what we eat for breakfast on the internet. The internet is also useful for daily\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-26T01:13:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/01\/300x200_StolenIdentity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"What to Do If Your Identity Has Been Stolen\",\"datePublished\":\"2022-06-26T01:13:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/\"},\"wordCount\":1791,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/01\/300x200_StolenIdentity.jpg\",\"keywords\":[\"how to know if your identity has been stolen\"],\"articleSection\":[\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/\",\"name\":\"What to Do If Your Identity Has Been Stolen | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/01\/300x200_StolenIdentity.jpg\",\"datePublished\":\"2022-06-26T01:13:39+00:00\",\"description\":\"We live online these days, sharing everything from vacation pictures to what we eat for breakfast on the internet. The internet is also useful for daily\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/01\/300x200_StolenIdentity.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/01\/300x200_StolenIdentity.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy &amp; Identity Protection\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What to Do If Your Identity Has Been Stolen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What to Do If Your Identity Has Been Stolen | McAfee Blog","description":"We live online these days, sharing everything from vacation pictures to what we eat for breakfast on the internet. The internet is also useful for daily","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What to Do If Your Identity Has Been Stolen | McAfee Blog","og_description":"We live online these days, sharing everything from vacation pictures to what we eat for breakfast on the internet. The internet is also useful for daily","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2022-06-26T01:13:39+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/01\/300x200_StolenIdentity.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"What to Do If Your Identity Has Been Stolen","datePublished":"2022-06-26T01:13:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/"},"wordCount":1791,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/01\/300x200_StolenIdentity.jpg","keywords":["how to know if your identity has been stolen"],"articleSection":["Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/","name":"What to Do If Your Identity Has Been Stolen | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/01\/300x200_StolenIdentity.jpg","datePublished":"2022-06-26T01:13:39+00:00","description":"We live online these days, sharing everything from vacation pictures to what we eat for breakfast on the internet. The internet is also useful for daily","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/01\/300x200_StolenIdentity.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/01\/300x200_StolenIdentity.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-your-identity-has-been-stolen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Privacy &amp; Identity Protection","item":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/"},{"@type":"ListItem","position":3,"name":"What to Do If Your Identity Has Been Stolen"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/134077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=134077"}],"version-history":[{"count":0,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/134077\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/134080"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=134077"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=134077"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=134077"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=134077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}