{"id":82848,"date":"2017-12-05T07:33:40","date_gmt":"2017-12-05T15:33:40","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=82848"},"modified":"2025-08-13T22:54:38","modified_gmt":"2025-08-14T05:54:38","slug":"10-pro-active-ways-to-dodge-the-traps-of-identity-thieves","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/","title":{"rendered":"10 Pro-Active Ways to Dodge the Traps of Identity Thieves"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-82869\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/11\/identity-theft11-300x200.jpg\" alt=\"\" width=\"320\" height=\"213\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft11-300x200.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft11-768x512.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft11-1024x683.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft11-750x500.jpg 750w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft11.jpg 1500w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/>According to the latest reports, digital thieves stole more than $16 billion from consumers in 2016 \u2014 that&#8217;s up\u00a0nearly $1 billion from 2015. According to <a href=\"https:\/\/www.javelinstrategy.com\/press-release\/identity-fraud-hits-record-high-154-million-us-victims-2016-16-percent-according-new\">Javelin Strategy &amp; Research<\/a>, some 15.4 million consumers were victims of identity theft or fraud last year.<\/p>\n<p>Those stats will take the jingle out of anyone&#8217;s holiday. So how can we fight back? By staying grounded in reality and making sure our identity and bank accounts remain off limits to cyber thieves.<\/p>\n<p style=\"text-align: center;\"><strong>~~~~<\/strong><\/p>\n<p>In 2005 following Hurricane Katrina, my identity was stolen and sold to a third-party distributing stolen social security numbers to hurricane victims who needed phones and purchasing power quickly. I found this out several months later after credit card statements to the tune of $3,000 started arriving in my name.<\/p>\n<p>The emotional toll that followed was brutal. While I went through all the propersteps of filing a police report, canceling my credit cards, putting alerts on and freezing my credit, and spending countless hours explaining the situation to unsympathetic bill collectors, the outstanding bogus bills<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-82870\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/11\/identity-theft-1-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft-1-300x300.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft-1-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft-1-768x768.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft-1-1024x1024.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft-1-500x500.jpg 500w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft-1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft-1-50x50.jpg 50w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft-1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft-1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft-1-128x128.jpg 128w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft-1.jpg 1500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>continued to surface for years. The authorities believe the leaked social security number was part of a more significant medical data breach similar to the recent\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/need-know-equifax-data-breach\/\">Equifax\u00a0breach<\/a>.<\/p>\n<p>Identity theft is brutal.<\/p>\n<p>Even though the breach wasn&#8217;t my fault, it still took me several years before I dared to make an online purchase. Over a decade later, I still get uneasy when I enter my credit card information. I eventually decided that rather than abandon online purchasing (which is becoming nearly impossible), I would do everything I could to stay a step ahead of the crooks.<\/p>\n<h2><strong>Pro-Active Ways to Dodge Identity Theft<\/strong><\/h2>\n<p>No one is 100 percent fraud-proof in our digital world where big corporations store so much of our personal information.When <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2017\/11\/29\/the-equifax-data-now-that-they-have-it-how-will-hackers-use-it\/#3fd0c3b1602c\">Equifax got hacked<\/a>, everyone sobered up. With 145 million people affected by the Equifax incident, most everyone will have to monitor their credit activity for years to come closely.<\/p>\n<p>Still, there are some things you can do to <em>reduce<\/em> the chances that you&#8217;ll be a target of identity theft or online fraud. Note: Anyone with a social security number can be a victim of identity theft \u2014 including your kids. These tips apply to your child&#8217;s identity as well.<\/p>\n<ol>\n<li><strong><span style=\"background-color: #ffffff;\">Just say &#8216;No!&#8217;\u00a0<\/span><\/strong>Be discerning when giving personal information online be it on social platforms, email signups, polls, surveys, and on apps. Just because a website is asking for your information doesn\u2019t mean it\u2019s necessary to provide it to them. Ask who wants the information and why. <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/family-safety\/are-you-click-bait\/\">Don&#8217;t be click bait.<\/a> And all those &#8220;fun&#8221; social media apps and games that show up in your feed and woo you into clicking to see your celebrity lookalike? Skip them! Many are designed to gather information needed to put your identity puzzle together for thieves. They lack safeguards and are never worth the click. Don&#8217;t post your date of birth, mother&#8217;s maiden name, pet&#8217;s name, or other personal information on social sites or even in your posts or content \u2014 many people just use an initial of a child when posting online. Determined thieves can use these bits and pieces of information to verify your identity and access to your electronic accounts.<\/li>\n<li><strong>Slow down.<\/strong>\u00a0Having a world of information at our fingertips has spoiled us. We want the information we want\u00a0<em>when we want it<\/em>. Crooks bank on the fact that we are moving fast and likely not taking the time to question a suspicious link. So slow down and think before you click and encourage your kids to do the same. The same applies to our internet searches. In a world where we Google everything, safety becomes critical. Using a tool like\u00a0<a href=\"https:\/\/mcafee.com\/mcafeewebadvisor\">McAfee WebAdvisor<\/a>\u00a0can help keep you safe by identifying malicious websites and warning the user before they click. Also, search engines siphon personal and behavioral data. So, as an extra layer of protection, go into your browser and adjust the privacy settings to block tracking used by advertisers.<img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-82868\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/11\/identity-theft-300x200.jpg\" alt=\"Identity Theft\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft-300x200.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft-768x512.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft-750x500.jpg 750w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft.jpg 900w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/li>\n<li><strong>Shred it.<\/strong>\u00a0I used to think this was such an old-school, irrelevant practice but safety digital experts agree: If you don\u2019t own a shredder, you might consider one to guard your privacy. Identity theft via snail mail is still an issue. What kind of information should you shred? Anything containing:<br \/>\n\u2022 Your Social Security Number (even just the last four digits)<br \/>\n\u2022 Your birth date<br \/>\n\u2022 Your credit card numbers<br \/>\n\u2022 Any account numbers from financial institutions<br \/>\n\u2022 Medical insurance numbers<br \/>\n\u2022 Unsolicited credit applications<\/li>\n<li><strong>Back to basics checklist. <\/strong>No matter how much you think you know about technology and the risks, stay humble about your vulnerability to online crime. Pay attention to privacy basics which include:\u00a0updating <strong>passwords,<\/strong> amping <strong>privacy settings<\/strong> on all social networks, avoiding <strong>public Wi-Fi<\/strong>, and using <strong>two-step authentication<\/strong> for logins.<\/li>\n<li><strong>Update and protect<\/strong>. Update your <a href=\"http:\/\/us.mcafeestore.com\/products\/live-safe\">virus protection software<\/a> regularly and do not download files from strangers. Too, when you get an alert to <strong>update software<\/strong> \u2014 be it your phone, laptop, or tablet \u2014 pay attention. Updates put one more lock on your digital security. Criminals can exploit flaws in old software versions to hack into your device.<\/li>\n<li><strong>Secure Your Home Network.<\/strong>\u00a0Limit your circle of trust when it comes to access to your home network \u2014\u00a0doing so protects your whole family physically and financially.\u00a0Be sure to name your home network something other than your family name and don\u2019t be casual when it comes to giving out your password. Treat your network password the way you would a house key. Think about creating a guest network so visitors can connect without gaining access to your family\u2019s other networked devices or shared files.<\/li>\n<li><strong>Know the signs.<\/strong>\u00a0If a thief is using your data, you may notice: <strong>1)\u00a0<\/strong><span class=\"print_infobox\">Pre-approved credit card offers arriving via mail <strong>2)<\/strong>\u00a0<\/span><span class=\"print_infobox\">Collection agencies calling <strong>3)<\/strong> Court notices regarding delinquent bills.\u00a0If you suspect someone is using your personal information to open accounts, file taxes, or make purchases, visit <a href=\"http:\/\/www.identitytheft.gov\/\">IdentityTheft.gov.<\/a><\/span><\/li>\n<li><strong>Understand the scope.<\/strong> Identity theft isn&#8217;t just about money. Sometimes it&#8217;s about access to services. Medical identity theft\u00a0is when someone uses your information to receive medical care or benefits. Crooks have even applied for apartment rentals, mortgages, jobs, and tax refunds using other people&#8217;s identities.<\/li>\n<li><strong>Freeze your accounts.<\/strong> If you think there&#8217;s been a breach, ask each credit bureau (Equifax, Experian, and TransUnion) to freeze your credit reports, which prevents anyone else from using your personal information to open a new line of credit. Put an alert on your credit that will warn you if attempts to use your name or credit.<\/li>\n<li><strong>Move with confidence.<\/strong> It won&#8217;t take you long to do a security sweep of your digital activity and make some changes. Once you know you&#8217;ve done all you can, enjoy your digital life with confidence, not fear. Why let a crook rob you of anything more? Celebrate National Identity Theft Awareness Month (December) by doing everything you can do to shut down online criminals.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><em>Toni Birdsong is a <a href=\"\/\/securingtomorrow.mcafee.com\/author\/toni-birdsong\">Family Safety Evangelist<\/a> to <a title=\"McAfee\" href=\"http:\/\/home.mcafee.com\">McAfee<\/a>. You can find her on Twitter <a href=\"https:\/\/twitter.com\/McAfee_Family\">@McAfee_Family<\/a>. (<a href=\"\/\/ow.ly\/1bdMH&gt;\">Disclosures<\/a>).<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to the latest reports, digital thieves stole more than $16 billion from consumers in 2016 \u2014 that&#8217;s up\u00a0nearly $1&#8230;<\/p>\n","protected":false},"author":642,"featured_media":82869,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[],"coauthors":[3359],"class_list":["post-82848","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-privacy-identity-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>identity theft<\/title>\n<meta name=\"description\" content=\"Identity theft hits hard. Here are 10 ways to shore up your personal information online and avoid digital danger zones.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"identity theft\" \/>\n<meta property=\"og:description\" content=\"Identity theft hits hard. Here are 10 ways to shore up your personal information online and avoid digital danger zones.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-05T15:33:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-14T05:54:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft11.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Toni Birdsong\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Toni Birdsong\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/\"},\"author\":{\"name\":\"Toni Birdsong\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/43ae9712cde24fe81854f2daa0af1228\"},\"headline\":\"10 Pro-Active Ways to Dodge the Traps of Identity Thieves\",\"datePublished\":\"2017-12-05T15:33:40+00:00\",\"dateModified\":\"2025-08-14T05:54:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/\"},\"wordCount\":1185,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft11.jpg\",\"articleSection\":[\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/\",\"name\":\"identity theft\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft11.jpg\",\"datePublished\":\"2017-12-05T15:33:40+00:00\",\"dateModified\":\"2025-08-14T05:54:38+00:00\",\"description\":\"Identity theft hits hard. Here are 10 ways to shore up your personal information online and avoid digital danger zones.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft11.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft11.jpg\",\"width\":1500,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy &amp; Identity Protection\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"10 Pro-Active Ways to Dodge the Traps of Identity Thieves\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/43ae9712cde24fe81854f2daa0af1228\",\"name\":\"Toni Birdsong\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/de48b651aa67772c9c2a8d7e7eee076a\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2016\/10\/Toni-Black-Shirt-Headshot-150x150.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2016\/10\/Toni-Black-Shirt-Headshot-150x150.jpeg\",\"caption\":\"Toni Birdsong\"},\"description\":\"Toni Birdsong began her career as a reporter in Los Angeles and later became a writer for Walt Disney Imagineering. Her passion for digital safety started 10 years ago as a way to gain the survival skills she needed to parent her own connected teenagers. Her goal with each post is to give busy parents the insight they need raise wiser, more compassionate digital kids. When she\u2019s not writing (her first love), you can find Toni hiking, watching TikTok, or trying not to break an important body part at CrossFit.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/toni-birdsong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"identity theft","description":"Identity theft hits hard. Here are 10 ways to shore up your personal information online and avoid digital danger zones.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"identity theft","og_description":"Identity theft hits hard. Here are 10 ways to shore up your personal information online and avoid digital danger zones.","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-12-05T15:33:40+00:00","article_modified_time":"2025-08-14T05:54:38+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft11.jpg","type":"image\/jpeg"}],"author":"Toni Birdsong","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Toni Birdsong","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/"},"author":{"name":"Toni Birdsong","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/43ae9712cde24fe81854f2daa0af1228"},"headline":"10 Pro-Active Ways to Dodge the Traps of Identity Thieves","datePublished":"2017-12-05T15:33:40+00:00","dateModified":"2025-08-14T05:54:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/"},"wordCount":1185,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft11.jpg","articleSection":["Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/","name":"identity theft","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft11.jpg","datePublished":"2017-12-05T15:33:40+00:00","dateModified":"2025-08-14T05:54:38+00:00","description":"Identity theft hits hard. Here are 10 ways to shore up your personal information online and avoid digital danger zones.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft11.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/identity-theft11.jpg","width":1500,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/10-pro-active-ways-to-dodge-the-traps-of-identity-thieves\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Privacy &amp; Identity Protection","item":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/"},{"@type":"ListItem","position":3,"name":"10 Pro-Active Ways to Dodge the Traps of Identity Thieves"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/43ae9712cde24fe81854f2daa0af1228","name":"Toni Birdsong","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/de48b651aa67772c9c2a8d7e7eee076a","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2016\/10\/Toni-Black-Shirt-Headshot-150x150.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2016\/10\/Toni-Black-Shirt-Headshot-150x150.jpeg","caption":"Toni Birdsong"},"description":"Toni Birdsong began her career as a reporter in Los Angeles and later became a writer for Walt Disney Imagineering. Her passion for digital safety started 10 years ago as a way to gain the survival skills she needed to parent her own connected teenagers. Her goal with each post is to give busy parents the insight they need raise wiser, more compassionate digital kids. When she\u2019s not writing (her first love), you can find Toni hiking, watching TikTok, or trying not to break an important body part at CrossFit.","url":"https:\/\/www.mcafee.com\/blogs\/author\/toni-birdsong\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/82848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/642"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=82848"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/82848\/revisions"}],"predecessor-version":[{"id":219598,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/82848\/revisions\/219598"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/82869"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=82848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=82848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=82848"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=82848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}