{"id":63802,"date":"2017-04-12T13:23:24","date_gmt":"2017-04-12T20:23:24","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=63802"},"modified":"2017-04-19T09:27:31","modified_gmt":"2017-04-19T16:27:31","slug":"how-to-monitor-and-protect-your-identity-online","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/","title":{"rendered":"How to Monitor and Protect Your Identity Online"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-65245\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/identity-theft-protection.jpg\" alt=\"Identity Theft Protection\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/identity-theft-protection.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/identity-theft-protection-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/identity-theft-protection-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Identity theft is a major threat in the United States, with around <a href=\"https:\/\/www.javelinstrategy.com\/coverage-area\/2016-identity-fraud-fraud-hits-inflection-point\" target=\"_blank\">13 million people<\/a> falling victim to fraud each year. Luckily, there are numerous steps you can take to protect yourself from this crime. Implement these easy tips, and you\u2019ll be able to better secure your information and make identity theft a lot less likely to happen to you.<\/p>\n<h3>Be Careful with Your Sensitive Information<\/h3>\n<p>There is almost no good reason to give out your Social Security number online unless you\u2019re filing taxes with a legitimate company or something similar. You should also never share this information over the phone or via email, as it\u2019s better to be extra careful than sorry. Sometimes, those wanting to steal your identity will send emails posing as those from your bank or the IRS, trying to get you to log in to your online account through a fraudulent link. Always click the sender\u2019s email profile, as you can usually spot a fake by the full email address (i.e., not your bank, but a random email address your bank would never use).<\/p>\n<h3>Opt Out of Third-Party Information Sharing<\/h3>\n<p>Look for an opt-out setting anytime you sign up for an account on a site\u2014such as an online retailer\u2014that may share your information with third parties. There\u2019s usually a little check box you can click to indicate you don\u2019t want your information shared, and it\u2019s worth clicking every time. You can also stop unwanted offers from credit card companies appearing in your mailbox by visiting <a href=\"https:\/\/www.optoutprescreen.com\/?rf=t\" target=\"_blank\">OptOutPrescreen.com<\/a>, which lets you remove your name from lists used by creditors and insurers. These little precautions will help you reign in how many people have your information.<\/p>\n<h3>Be Careful Where You Shop<\/h3>\n<p>Never check out with any online store that doesn\u2019t have a little lock icon next to the web address to indicate that it\u2019s a secure site. If you\u2019re in doubt about a company, look it up with the <a href=\"http:\/\/www.bbb.org\/\" target=\"_blank\">Better Business Bureau<\/a> for more information on its validity, and never go through with a purchase if you\u2019re unsure.<\/p>\n<h3>Don\u2019t Use Public Wi-Fi to Access Your Online Banking<\/h3>\n<p>When it comes to keeping your information secure, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/are-your-apple-devices-connecting-to-unknown-wi-fi-networks\/\" target=\"_blank\">public Wi-Fi is a danger zone<\/a>. Keep your coffee shop surfing to Facebook and other casual browsing, and don\u2019t log in to your online bank accounts while using a public internet connection because it\u2019s easier for people to hack and steal your information. You can always use your phone as a hotspot when you\u2019re in a pinch, which will be safer.<\/p>\n<h3>Update Your Mac\u2019s Security Settings Regularly<\/h3>\n<p>Keep your firewall, <a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">antivirus software<\/a>, and operating system up to date to reduce the chances of a hacker being able to access your data. You should also make sure your home network is secure by changing your router\u2019s name to one that doesn\u2019t identify the manufacturer, using WPA2 authentication, and keeping your password (and all online passwords) strong.<\/p>\n<h3>Monitor Your Accounts Closely<\/h3>\n<p>Ideally, your bank will offer free alerts that notify you when suspicious account activity occurs. If so, take advantage of these alerts by making sure you\u2019re signed up for them. It\u2019s cheaper and easier than the credit-monitoring services that some banks sell. Similarly, keep an eye on all your financial accounts. If something suspicious does happen, you can be aware of it as soon as possible, which will allow you take immediate action to rectify the problem.<\/p>\n<h3>Take Action Immediately in the Event of Identity Theft<\/h3>\n<p>If your identity is stolen, it\u2019s important to <a href=\"http:\/\/www.asecurelife.com\/repair-credit-after-identity-theft\/\" target=\"_blank\">respond quickly<\/a>. That means notifying your bank, reporting any suspicious activity, and even closing accounts if necessary. If you have security alerts set up, you should be able to take action fast and get things sorted out quickly. It\u2019s important to have all relevant documents available to you quickly in this situation, so make sure you\u2019ve consolidated all your credit reports, copies of your IDs and cards, and other necessary information in a safe place you can access easily if your identity is compromised.<\/p>\n<p>You don\u2019t need to fear online banking or shopping just because of the potential for hacking. Identity theft can feel scary, but you can take action to prevent it and keep your personal information safer online.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identity theft is a major threat in the United States, with around 13 million people falling victim to fraud each year. Luckily, there are numerous steps you can take to protect yourself from this crime. Implement these easy tips, and you\u2019ll be able to better secure your information and make identity theft a lot less [&hellip;]<\/p>\n","protected":false},"author":73,"featured_media":65251,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10],"tags":[215,345],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Identity theft is a major threat in the United States, with around 13 million people falling victim to fraud each year. Luckily, there are numerous steps\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Monitor and Protect Your Identity Online - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Identity theft is a major threat in the United States, with around 13 million people falling victim to fraud each year. Luckily, there are numerous steps\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-12T20:23:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-04-19T16:27:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/monitor-protect-identity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sarah Brown\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/monitor-protect-identity.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/monitor-protect-identity.jpg\",\"width\":400,\"height\":260,\"caption\":\"Monitor and Protect Identity\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/\",\"name\":\"How to Monitor and Protect Your Identity Online - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#primaryimage\"},\"datePublished\":\"2017-04-12T20:23:24+00:00\",\"dateModified\":\"2017-04-19T16:27:31+00:00\",\"description\":\"Identity theft is a major threat in the United States, with around 13 million people falling victim to fraud each year. Luckily, there are numerous steps\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Monitor and Protect Your Identity Online\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/29e6fd6586794288cfe316cdf036c329\"},\"headline\":\"How to Monitor and Protect Your Identity Online\",\"datePublished\":\"2017-04-12T20:23:24+00:00\",\"dateModified\":\"2017-04-19T16:27:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#webpage\"},\"wordCount\":735,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/monitor-protect-identity.jpg\",\"keywords\":[\"Identity Theft\",\"Tax Season\"],\"articleSection\":[\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/29e6fd6586794288cfe316cdf036c329\",\"name\":\"Sarah Brown\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adc4498cd331a76e356e4ad85fb15536?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adc4498cd331a76e356e4ad85fb15536?s=96&d=mm&r=g\",\"caption\":\"Sarah Brown\"},\"description\":\"Sarah Brown is a tech specialist with a love of all topics relating to the IoT. She writes about upcoming technologies, internet safety cyber security. Sarah believes that the through technology and the written word, we can all stay connected to each other and create a safe environment out in the ether.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/sarah-brown\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Identity theft is a major threat in the United States, with around 13 million people falling victim to fraud each year. Luckily, there are numerous steps","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/","og_locale":"en_US","og_type":"article","og_title":"How to Monitor and Protect Your Identity Online - The Mac Security Blog","og_description":"Identity theft is a major threat in the United States, with around 13 million people falling victim to fraud each year. Luckily, there are numerous steps","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-04-12T20:23:24+00:00","article_modified_time":"2017-04-19T16:27:31+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/monitor-protect-identity.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sarah Brown","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/monitor-protect-identity.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/monitor-protect-identity.jpg","width":400,"height":260,"caption":"Monitor and Protect Identity"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/","name":"How to Monitor and Protect Your Identity Online - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#primaryimage"},"datePublished":"2017-04-12T20:23:24+00:00","dateModified":"2017-04-19T16:27:31+00:00","description":"Identity theft is a major threat in the United States, with around 13 million people falling victim to fraud each year. Luckily, there are numerous steps","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How to Monitor and Protect Your Identity Online"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/29e6fd6586794288cfe316cdf036c329"},"headline":"How to Monitor and Protect Your Identity Online","datePublished":"2017-04-12T20:23:24+00:00","dateModified":"2017-04-19T16:27:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#webpage"},"wordCount":735,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/monitor-protect-identity.jpg","keywords":["Identity Theft","Tax Season"],"articleSection":["How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/29e6fd6586794288cfe316cdf036c329","name":"Sarah Brown","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/adc4498cd331a76e356e4ad85fb15536?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adc4498cd331a76e356e4ad85fb15536?s=96&d=mm&r=g","caption":"Sarah Brown"},"description":"Sarah Brown is a tech specialist with a love of all topics relating to the IoT. She writes about upcoming technologies, internet safety cyber security. Sarah believes that the through technology and the written word, we can all stay connected to each other and create a safe environment out in the ether.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/sarah-brown\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/monitor-protect-identity.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-gB4","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/63802"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/73"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=63802"}],"version-history":[{"count":12,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/63802\/revisions"}],"predecessor-version":[{"id":65488,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/63802\/revisions\/65488"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/65251"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=63802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=63802"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=63802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}