{"id":73327,"date":"2017-12-06T11:24:52","date_gmt":"2017-12-06T19:24:52","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=73327"},"modified":"2017-12-06T11:24:52","modified_gmt":"2017-12-06T19:24:52","slug":"proactively-protecting-your-online-information-with-5-easy-tips","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/","title":{"rendered":"Proactively Protecting Your Online Information with 5 Easy Tips"},"content":{"rendered":"<p class=\"normal\"><img loading=\"lazy\" class=\"aligncenter wp-image-73396 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Data-Protection-Tips.jpg\" alt=\"Proactively Protecting Your Online Information with 5 Easy Tips\" width=\"750\" height=\"313\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Data-Protection-Tips.jpg 750w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Data-Protection-Tips-150x63.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Data-Protection-Tips-300x125.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Data-Protection-Tips-657x274.jpg 657w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/p>\n<p class=\"normal\"><span lang=\"EN\">What makes online shopping so attractive? Simplicity and convenience. The ability to fill your digital cart and have it delivered directly to your doorstep is a luxury that 72% of holiday shoppers will take advantage of this season. However, it\u2019s easy to forget about the considerable risk associated with online transactions, especially while exchanging sensitive identity or financial information. With credit fraud and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/category\/malware\/\" target=\"_blank\">Mac malware<\/a> on the rise, it\u2019s particularly important to protect yourself with knowledge and a few simple tools that can help you defend your online information against unauthorized access. \u00a0<\/span><\/p>\n<p class=\"normal\">The aim of most cybercrime is data theft, and malware is merely\u00a0one tool in the arsenal criminals have at their disposal to get hold of sensitive personal information. By using a layered approach to security, you can make their job immeasurably\u00a0more difficult so that your data will be a less tempting target. Here are five important security tips to help you proactively protect your online information.<\/p>\n<h3 class=\"normal\">Tip 1: Update your software<\/h3>\n<p class=\"normal\">Whether or not you&#8217;re concerned about malware on your Mac, malicious software is not the only threat you should be concerned about. We&#8217;re talking about vulnerabilities in software installed on your computer. Humans write software and humans make mistakes (to err is to be human, as they say), so software sometimes has vulnerabilities that need to be corrected. One of the main risks is that spyware, for instance, can take advantage of vulnerabilities in third-party software installed on computers and spread silently.<\/p>\n<p class=\"normal\">Most software companies update their products from time to time, and popular software is a popular target by cybercriminals, so they frequently update to fix security flaws. While there are many ways that cybercriminals can get to your data, there are many ways you can protect yourself and updating your software is one of them. Be\u00a0sure your operating system and web browsers (browser plugins in particular) are all up-to-date and protected against all known vulnerabilities before shopping online.<\/p>\n<h3 class=\"normal\">Tip 2: Use antivirus with\u00a0real-time\u00a0scanning<\/h3>\n<p class=\"normal\">Does your antivirus software include real-time scanning?\u00a0Real-time antivirus scanning is one of the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\" target=\"_blank\">most important features<\/a> in any antivirus product.<\/p>\n<p class=\"normal\">Most people are familiar with <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">antivirus software<\/a> and typically prescribe to the notion that simply updating malware signatures and running a periodic scan of your computer is all that&#8217;s needed. While true that keeping your malware signatures up-to-date is imperative\u00a0(similar to keeping other third-party software updated), a lot can happen in between scans, which can put your system and your data at risk.\u00a0Real-time scanning essentially takes the human element out of antivirus protection; in fact, full system scans (manual scans) are technically not necessary these days because of real-time scanning.<\/p>\n<p class=\"normal\">If a manual scan is the equivalent of the guards within your castle doing a one-time sweep for\u00a0threats and then going back to bed, then real-time scanning\u00a0is like\u00a0having guards within your castle walls constantly\u00a0on the lookout\u00a0for imminent threats every hour of the day. With manual scanning, files are checked for malware only when a scan is run\u00a0\u2014 you will not find an infected file until after it is downloaded and you choose to run a scan. With real-time scanning, your antivirus constantly checks files as they are accessed. In this way, any malware that you come across will be detected before it can run and do damage to your system or steal your data.<\/p>\n<h3 class=\"normal\">Tip 3: Enroll in an identity theft protection service<\/h3>\n<p>Monitoring for unauthorized online activity including the use of sensitive financial or identity information can be extremely hard to detect and prevent without assistance. Therefore, it\u2019s still possible that your personal information could be used elsewhere on the web. Interacting with <a href=\"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/\" target=\"_blank\">fake ecommerce websites<\/a>, virus extensions, and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/\" target=\"_blank\">phishing scams<\/a> can put your personal information in the wrong hands.<\/p>\n<p>With cyber identity theft affecting one in every sixteen individuals, and accounting for annual losses that exceed $16 billion, it\u2019s essential to be take the necessary precautions in order to prevent and catch credit thieves and cybercriminals. Therefore, monitoring credit information and frequently checking your billing and account statements for mistakes or potential theft is always recommended, especially if you\u2019ve had your credit or identity stolen in the past. So when considering your security options, look for an <a href=\"https:\/\/www.lifelock.com\/\" target=\"_blank\">identity theft protection company like LifeLock<\/a> that offers both active web monitoring services and fraud insurance.<\/p>\n<h3>Tip 4: Use advanced passwords and security settings<\/h3>\n<p>The simplest thing every individual can do is create completely new and unique passwords for every account. Minor variations won\u2019t cut it, especially if you\u2019ve used the same password or pattern elsewhere. When creating a new password, always remember to write it down \u2014 but <a href=\"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/\" target=\"_blank\">only if you can\u00a0store it in a safe place<\/a>. Although saving passwords to your Internet browser is convenient, it\u2019s not the\u00a0safest practice, because if your computer gets stolen, unauthorized users could have direct access to your accounts.<\/p>\n<p>However, advanced password generators and two-factor authentication and login procedures can make the process easier and reduce your risk of potential cyberattack. For example, two-factor authentication is an advanced setting that allows you to follow a two-step login process consisting of one password, and one authorization code sent to a trusted device or account administrator. Mail clients, social media sites, and other online accounts offer these built-in security features for added layers of protection. To learn more about two-factor authentication and see how to set it up across your online accounts, you can check out <a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authentication-how-it-works-and-why-you-should-use-it\/\" target=\"_blank\">this article here<\/a>.<\/p>\n<h3>Tip 5: Be aware of the main risks shopping online<\/h3>\n<p>How many people shopping online\u00a0this holiday season will be cutting through the pleasant haze of excitement to think about their security when checking email, buying that cozy\u00a0sweater from a random website, or\u00a0clicking every sponsored link in Facebook promoting\u00a0deals that can&#8217;t be missed? It&#8217;s probably a very small percentage. Cybercriminals know this and will be using it to their advantage.<\/p>\n<p>With a little planning before you go on a shopping frenzy and a little awareness when you&#8217;re there, you can vastly decrease your odds of being victimized. Below are a few signs to watch for and some risky behavior to avoid when shopping online.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-73333\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/protect-online-information-infographic.jpg\" alt=\"Protect Online Information Infographic\" width=\"2357\" height=\"2970\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/protect-online-information-infographic.jpg 2357w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/protect-online-information-infographic-119x150.jpg 119w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/protect-online-information-infographic-238x300.jpg 238w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/protect-online-information-infographic-768x968.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/protect-online-information-infographic-813x1024.jpg 813w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/protect-online-information-infographic-657x828.jpg 657w\" sizes=\"(max-width: 2357px) 100vw, 2357px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The aim of most cybercrime is data theft \u2013 to get hold of your online information. Here are 5 security tips to help you proactively defend against identify theft.<\/p>\n","protected":false},"author":4,"featured_media":73405,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[44,215,159,365,1735],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The aim of most cybercrime is data theft \u2013 to get hold of your online information. Here are 5 security tips to help you proactively defend against identify theft.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Proactively Protecting Your Online Information with 5 Easy Tips - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The aim of most cybercrime is data theft \u2013 to get hold of your online information. Here are 5 security tips to help you proactively defend against identify theft.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-06T19:24:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Protect-Online-Info-Tips.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Protect-Online-Info-Tips.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Protect-Online-Info-Tips.jpg\",\"width\":400,\"height\":260,\"caption\":\"Protect Online Information Tips\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/\",\"name\":\"Proactively Protecting Your Online Information with 5 Easy Tips - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#primaryimage\"},\"datePublished\":\"2017-12-06T19:24:52+00:00\",\"dateModified\":\"2017-12-06T19:24:52+00:00\",\"description\":\"The aim of most cybercrime is data theft \\u2013 to get hold of your online information. Here are 5 security tips to help you proactively defend against identify theft.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Proactively Protecting Your Online Information with 5 Easy Tips\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Proactively Protecting Your Online Information with 5 Easy Tips\",\"datePublished\":\"2017-12-06T19:24:52+00:00\",\"dateModified\":\"2017-12-06T19:24:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#webpage\"},\"wordCount\":1041,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Protect-Online-Info-Tips.jpg\",\"keywords\":[\"Data Protection\",\"Identity Theft\",\"Infographic\",\"Security Tips\",\"Shopping Online\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The aim of most cybercrime is data theft \u2013 to get hold of your online information. Here are 5 security tips to help you proactively defend against identify theft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/","og_locale":"en_US","og_type":"article","og_title":"Proactively Protecting Your Online Information with 5 Easy Tips - The Mac Security Blog","og_description":"The aim of most cybercrime is data theft \u2013 to get hold of your online information. Here are 5 security tips to help you proactively defend against identify theft.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-12-06T19:24:52+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Protect-Online-Info-Tips.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Protect-Online-Info-Tips.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Protect-Online-Info-Tips.jpg","width":400,"height":260,"caption":"Protect Online Information Tips"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/","name":"Proactively Protecting Your Online Information with 5 Easy Tips - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#primaryimage"},"datePublished":"2017-12-06T19:24:52+00:00","dateModified":"2017-12-06T19:24:52+00:00","description":"The aim of most cybercrime is data theft \u2013 to get hold of your online information. Here are 5 security tips to help you proactively defend against identify theft.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Proactively Protecting Your Online Information with 5 Easy Tips"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Proactively Protecting Your Online Information with 5 Easy Tips","datePublished":"2017-12-06T19:24:52+00:00","dateModified":"2017-12-06T19:24:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#webpage"},"wordCount":1041,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Protect-Online-Info-Tips.jpg","keywords":["Data Protection","Identity Theft","Infographic","Security Tips","Shopping Online"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/proactively-protecting-your-online-information-with-5-easy-tips\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Protect-Online-Info-Tips.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-j4H","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/73327"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=73327"}],"version-history":[{"count":36,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/73327\/revisions"}],"predecessor-version":[{"id":73450,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/73327\/revisions\/73450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/73405"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=73327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=73327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=73327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}