{"id":32148,"date":"2022-05-16T09:00:00","date_gmt":"2022-05-16T14:00:00","guid":{"rendered":"https:\/\/thelogicgroup.com\/?p=32148"},"modified":"2022-08-18T15:12:05","modified_gmt":"2022-08-18T20:12:05","slug":"how-to-protect-against-identity-theft","status":"publish","type":"post","link":"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/","title":{"rendered":"Steps on How To Protect Against Identity Theft"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-341z62c-00199e0c3b66910b5a87808616dba800\">\n.avia-section.av-341z62c-00199e0c3b66910b5a87808616dba800{\nbackground-color:#3187bc;\nbackground-image:unset;\n}\n<\/style>\n<div id='amg-diagonal-overlay'  class='avia-section av-341z62c-00199e0c3b66910b5a87808616dba800 header_color avia-section-large avia-no-border-styling  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  avia-bg-style-scroll av-minimum-height av-minimum-height-25 av-height-25  container_wrap fullsize'   data-av_minimum_height_pc='25' data-av_min_height_opt='25'><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-32148'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2fu8a44-9409811bed0e9c6c6ec4105dbabc536f\">\n.flex_column.av-2fu8a44-9409811bed0e9c6c6ec4105dbabc536f{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-2fu8a44-9409811bed0e9c6c6ec4105dbabc536f av_one_full  avia-builder-el-1  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2owl278-337e2cbe21dc3e471321ff069cf5a0af\">\n#top .av-special-heading.av-l2owl278-337e2cbe21dc3e471321ff069cf5a0af{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\n}\nbody .av-special-heading.av-l2owl278-337e2cbe21dc3e471321ff069cf5a0af .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2owl278-337e2cbe21dc3e471321ff069cf5a0af .av-subheading{\nfont-size:23px;\n}\n<\/style>\n<div  class='av-special-heading av-l2owl278-337e2cbe21dc3e471321ff069cf5a0af av-special-heading-h1 blockquote modern-quote modern-centered  avia-builder-el-2  avia-builder-el-no-sibling  av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Steps on How To Protect Against Identity Theft<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-32148'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2ammlec-bcf788392a3c75e52f542b07e7d9194b\">\n.flex_column.av-2ammlec-bcf788392a3c75e52f542b07e7d9194b{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-2ammlec-bcf788392a3c75e52f542b07e7d9194b av_one_full  avia-builder-el-3  el_after_av_section  el_before_av_one_full  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2owlgqz-f40e9513f43dbbc215fb757bf46db388\">\n.avia-image-container.av-l2owlgqz-f40e9513f43dbbc215fb757bf46db388 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-l2owlgqz-f40e9513f43dbbc215fb757bf46db388 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-l2owlgqz-f40e9513f43dbbc215fb757bf46db388 av-styling- avia-align-center  avia-builder-el-4  el_before_av_hr  avia-builder-el-first '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-31984 avia-img-lazy-loading-not-31984 avia_image ' src=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-2-1210x423.jpg\" alt='' title='TLG-August-Blog-2'  height=\"423\" width=\"1210\"  itemprop=\"thumbnailUrl\"  \/><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1n6bsfo-aa583575815cc8af244c85008f85ea29\">\n#top .hr.hr-invisible.av-1n6bsfo-aa583575815cc8af244c85008f85ea29{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-1n6bsfo-aa583575815cc8af244c85008f85ea29 hr-invisible  avia-builder-el-5  el_after_av_image  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2owlw1t-71a2f228f03a6ce79eb4771a24794427\">\n#top .av_textblock_section.av-l2owlw1t-71a2f228f03a6ce79eb4771a24794427 .avia_textblock{\nfont-size:20px;\n}\n<\/style>\n<section  class='av_textblock_section av-l2owlw1t-71a2f228f03a6ce79eb4771a24794427 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><span style=\"font-weight: 400;\">With the proliferation of cyberattacks in recent years, <\/span><span style=\"font-weight: 400;\">cybersecurity<\/span><span style=\"font-weight: 400;\"> has never been more important in the business world. Even just one successful attack is enough to devastate a business of any size. One of the scariest potential consequences of a cyberattack is identity theft. Fortunately, there are steps you can take to protect yourself, your staff, and your customers from having <\/span><span style=\"font-weight: 400;\">personal information<\/span><span style=\"font-weight: 400;\"> compromised.<\/span><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2owmifh-e209a61fc8dc862ebc6e138992a9c781\">\n#top .av-special-heading.av-l2owmifh-e209a61fc8dc862ebc6e138992a9c781{\npadding-bottom:10px;\ncolor:#4a4a4a;\n}\nbody .av-special-heading.av-l2owmifh-e209a61fc8dc862ebc6e138992a9c781 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2owmifh-e209a61fc8dc862ebc6e138992a9c781 .special-heading-inner-border{\nborder-color:#4a4a4a;\n}\n.av-special-heading.av-l2owmifh-e209a61fc8dc862ebc6e138992a9c781 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2owmifh-e209a61fc8dc862ebc6e138992a9c781 av-special-heading-h2 custom-color-heading blockquote modern-quote  avia-builder-el-7  el_after_av_textblock  el_before_av_textblock  amg-blog-heading av-linked-heading'><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >How To Protect Against Identity Theft<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2owo0an-44fcb6790cea401a3a288c12678a4078 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">Identity theft is a serious problem that\u2019s getting worse by the year. To avoid the repercussions of this type of cybercrime, you need to follow cybersecurity best practices. Before discussing the steps you can take to guard against identity theft, however, let\u2019s first talk about <\/span><span style=\"font-weight: 400;\">what<\/span> <span style=\"font-weight: 400;\">cyber identity theft<\/span><span style=\"font-weight: 400;\"> is. The more you understand about the concept and how it works, the easier it is to stay secure.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Identity theft is a type of cybercrime where your personal and financial data is obtained without your permission. What this means is the hacker who stole this information has unauthorized access to things like <\/span><span style=\"font-weight: 400;\">Social Security Numbers<\/span><span style=\"font-weight: 400;\"> (SSN), bank account numbers, <\/span><span style=\"font-weight: 400;\">credit cards<\/span><span style=\"font-weight: 400;\">, and more. Someone who has this kind of data can assume your digital identity and wreak a lot of havoc. For example, they could use your identity to open new bank accounts or apply for <\/span><span style=\"font-weight: 400;\">credit cards<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This type of cybercrime can be carried out in a variety of ways. From skimming\u2014when a hacker tampers with an electronic card reader to steal card data\u2014to stealing your wallet, there\u2019s no shortage of attack methods. However, most of the damage is done through phishing emails and imposter phone calls.\u00a0\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While there\u2019s no way to keep your business 100% <\/span><span style=\"font-weight: 400;\">protected from identity theft<\/span><span style=\"font-weight: 400;\">, there are steps you can follow to greatly lower your chances of it happening. Here are a few <\/span><span style=\"font-weight: 400;\">identity theft <\/span><span style=\"font-weight: 400;\">information security<\/span><span style=\"font-weight: 400;\"> tips you can use to prevent cybercriminals from taking your sensitive information.<\/span><\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><\/p><\/div><div  class='flex_column av-1d774c4-c49ee52e5af0515dfcd126d72ef9d9bb av_one_full  avia-builder-el-9  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2owoy46-a0cb55a0177c3a6b33eda8eb15f7a8d3\">\n#top .av-special-heading.av-l2owoy46-a0cb55a0177c3a6b33eda8eb15f7a8d3{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#7e8f87;\n}\nbody .av-special-heading.av-l2owoy46-a0cb55a0177c3a6b33eda8eb15f7a8d3 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2owoy46-a0cb55a0177c3a6b33eda8eb15f7a8d3 .special-heading-inner-border{\nborder-color:#7e8f87;\n}\n.av-special-heading.av-l2owoy46-a0cb55a0177c3a6b33eda8eb15f7a8d3 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2owoy46-a0cb55a0177c3a6b33eda8eb15f7a8d3 av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-10  el_before_av_textblock  avia-builder-el-first  av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Be Cautious on How You\u2019re Exchanging Information<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2owpan6-3819015f2c8a4e829b32889e2409c58b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-32\" class=\"lp-element lp-pom-text nlh\">\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">In business, it\u2019s not uncommon for employees to exchange confidential personal and corporate information. In fact, many companies request that new employees provide information like routing numbers and home addresses for direct payment on their first day. When this time comes, never do it over the phone or on a website. A skilled hacker can easily access these channels and steal whatever is being passed.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, don\u2019t blindly trust whoever is requesting the information. As mentioned earlier, one of the most common ways identities are stolen is through imposter phone calls and phishing emails. Always verify the legitimacy of the organization and the person asking for the information. If you\u2019re in doubt, you can talk to a colleague or your manager about the request.<\/span><\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div>\n<div id=\"lp-pom-text-34\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2owpnn7-2866979b533a48089cd8f7207345d291\">\n#top .av-special-heading.av-l2owpnn7-2866979b533a48089cd8f7207345d291{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#7e8f87;\n}\nbody .av-special-heading.av-l2owpnn7-2866979b533a48089cd8f7207345d291 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2owpnn7-2866979b533a48089cd8f7207345d291 .special-heading-inner-border{\nborder-color:#7e8f87;\n}\n.av-special-heading.av-l2owpnn7-2866979b533a48089cd8f7207345d291 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2owpnn7-2866979b533a48089cd8f7207345d291 av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-12  el_after_av_textblock  el_before_av_textblock  av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Keep an Eye on the URLs You\u2019re Using<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2owq160-b7688bac2c1eb7dda1be174af5420dea '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-32\" class=\"lp-element lp-pom-text nlh\">\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">Depending on what your job is, you\u2019ve likely filled out your fair share of online forms. Some of them may be questionnaires that want you to share your opinion, while others may be more formal. However, there are times when those forms may ask you to provide sensitive information.\u00a0\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you ever have to fill out an online form, always take a moment to check the URL. The URL should have a \u201chttps:\/\/\u201d and a padlock icon next to it. This is an indication that the website is secure. If it doesn\u2019t have these elements, avoid it and investigate whether the form is legitimate.<\/span><\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div>\n<div id=\"lp-pom-text-34\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2owqjn4-0446188c9db9007908a44357dea2058e\">\n#top .av-special-heading.av-l2owqjn4-0446188c9db9007908a44357dea2058e{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#7e8f87;\n}\nbody .av-special-heading.av-l2owqjn4-0446188c9db9007908a44357dea2058e .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2owqjn4-0446188c9db9007908a44357dea2058e .special-heading-inner-border{\nborder-color:#7e8f87;\n}\n.av-special-heading.av-l2owqjn4-0446188c9db9007908a44357dea2058e .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2owqjn4-0446188c9db9007908a44357dea2058e av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-14  el_after_av_textblock  el_before_av_textblock  av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Use Only Strong Passwords<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2owqwd9-8f82422595e90b4c0ad6d820d15693e8 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-32\" class=\"lp-element lp-pom-text nlh\">\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">Although they may be an annoyance, passwords play an important role in keeping your accounts safe. It can be tempting to create easy-to-remember passwords or reuse passwords you have for other accounts but doing so can negate the benefit of having a password. Creating a simple password or reusing a password makes the hacker\u2019s job much easier.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Everyone in your organization should be creating strong passwords and changing them on a regular basis. You also want to avoid writing down and storing your passwords in your desk. If you\u2019re worried about forgetting a password you created, you can always use a password manager. With a password manager, you can securely store all of your passwords in one place, so you only have to remember the one password you created to access the manager.<\/span><\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div>\n<div id=\"lp-pom-text-34\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2owrf1d-0700f77b7dbb6f41ee060cad617788f1\">\n#top .av-special-heading.av-l2owrf1d-0700f77b7dbb6f41ee060cad617788f1{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#7e8f87;\n}\nbody .av-special-heading.av-l2owrf1d-0700f77b7dbb6f41ee060cad617788f1 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2owrf1d-0700f77b7dbb6f41ee060cad617788f1 .special-heading-inner-border{\nborder-color:#7e8f87;\n}\n.av-special-heading.av-l2owrf1d-0700f77b7dbb6f41ee060cad617788f1 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2owrf1d-0700f77b7dbb6f41ee060cad617788f1 av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-16  el_after_av_textblock  el_before_av_textblock  av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Limit the Amount of Personal Information You Share on Social Media<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2owt4ra-6048c114204942742f4dca7aba2c7e65 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-32\" class=\"lp-element lp-pom-text nlh\">\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">A hacker doesn\u2019t necessarily have to hack anything to obtain personal data. You would be shocked by how much sensitive information people willingly give on their own social media accounts. That\u2019s why a common identity theft tactic is combing through a person\u2019s social media accounts.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Whether it\u2019s Facebook, Twitter, or even LinkedIn, these applications and websites are rich with <\/span><span style=\"font-weight: 400;\">personal information<\/span><span style=\"font-weight: 400;\">. You could simply get rid of all your social media accounts, but it\u2019s not necessary to take actions that are so drastic. Just make sure to scrub your accounts of any information that isn\u2019t necessary for others to see. <\/span><\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div>\n<div id=\"lp-pom-text-34\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2owtfpk-3911b9987a82701fd4b781ac710da8ee\">\n#top .av-special-heading.av-l2owtfpk-3911b9987a82701fd4b781ac710da8ee{\nmargin:0px 0px 0px 0px;\npadding-bottom:0;\ncolor:#7e8f87;\n}\nbody .av-special-heading.av-l2owtfpk-3911b9987a82701fd4b781ac710da8ee .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2owtfpk-3911b9987a82701fd4b781ac710da8ee .special-heading-inner-border{\nborder-color:#7e8f87;\n}\n.av-special-heading.av-l2owtfpk-3911b9987a82701fd4b781ac710da8ee .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2owtfpk-3911b9987a82701fd4b781ac710da8ee av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-18  el_after_av_textblock  el_before_av_textblock  av-linked-heading'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Securely Dispose of Documents<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2owtugz-62340e32d46d287c7c99573668a532a2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-32\" class=\"lp-element lp-pom-text nlh\">\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">Documents are a staple of business, and they often contain information that no one outside of the business should be privy to. Any documents that contain personal, company, and\/or confidential information should be handled carefully. Additionally, they should always be stored in a safe place that only qualified workers have access to. When these documents are no longer needed, they should be disposed of in a secure way.<\/span><\/p>\n<\/div>\n<div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div>\n<div id=\"lp-pom-text-34\" class=\"lp-element lp-pom-text nlh\"><\/div>\n<\/div><\/section><\/p><\/div><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-tp2mms-6eeb2a84e489f3425908be9f4a459f01\">\n.flex_column.av-tp2mms-6eeb2a84e489f3425908be9f4a459f01{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-tp2mms-6eeb2a84e489f3425908be9f4a459f01 av_one_full  avia-builder-el-20  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l2owul7r-1191e8ae973658dda91ab7f2848f07a8\">\n#top .av-special-heading.av-l2owul7r-1191e8ae973658dda91ab7f2848f07a8{\npadding-bottom:10px;\ncolor:#4a4a4a;\n}\nbody .av-special-heading.av-l2owul7r-1191e8ae973658dda91ab7f2848f07a8 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l2owul7r-1191e8ae973658dda91ab7f2848f07a8 .special-heading-inner-border{\nborder-color:#4a4a4a;\n}\n.av-special-heading.av-l2owul7r-1191e8ae973658dda91ab7f2848f07a8 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l2owul7r-1191e8ae973658dda91ab7f2848f07a8 av-special-heading-h2 custom-color-heading blockquote modern-quote  avia-builder-el-21  el_before_av_textblock  avia-builder-el-first  amg-blog-heading av-linked-heading'><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Get the Protection Your Business Needs<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-l2owv0pa-23eed764147877d7c4f19fce8d02e3d6 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"lp-pom-text-364\" class=\"lp-element lp-pom-text nlh\">\n<p><span style=\"font-weight: 400;\">For the best in <\/span><span style=\"font-weight: 400;\">cybersecurity and identity theft<\/span><span style=\"font-weight: 400;\"> protection, come to The Logic Group. We are an experienced managed services provider that offers customized full-service solutions. Through our advanced cybersecurity solutions\u2014like dark web monitoring and managed next-gen firewall\u2014we keep your network protected from even the worst cyberattacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Contact us today to learn more about our offerings.<\/span><\/p>\n<\/div>\n<\/div><\/section><\/p><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":31984,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[23,19,22,21],"class_list":["post-32148","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity-and-identity-theft","tag-how-to-protect-against-identity-theft","tag-identity-theft-information-security","tag-what-cyber-identity-theft"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How To Protect Against Identity Theft | The Logic Group<\/title>\n<meta name=\"description\" content=\"In a time when cyberthreats are more prevalent than ever, identity protection has never been more important. Here\u2019s how to protect against identity theft.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Protect Against Identity Theft | The Logic Group\" \/>\n<meta property=\"og:description\" content=\"In a time when cyberthreats are more prevalent than ever, identity protection has never been more important. Here\u2019s how to protect against identity theft.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/\" \/>\n<meta property=\"og:site_name\" content=\"The Logic Group\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-16T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-18T20:12:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wpengine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"wpengine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/\"},\"author\":{\"name\":\"wpengine\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93\"},\"headline\":\"Steps on How To Protect Against Identity Theft\",\"datePublished\":\"2022-05-16T14:00:00+00:00\",\"dateModified\":\"2022-08-18T20:12:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/\"},\"wordCount\":2605,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-2.jpg\",\"keywords\":[\"cybersecurity and identity theft\",\"How To Protect Against Identity Theft\",\"identity theft information security\",\"what cyber identity theft\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/\",\"url\":\"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/\",\"name\":\"How To Protect Against Identity Theft | The Logic Group\",\"isPartOf\":{\"@id\":\"https:\/\/thelogicgroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-2.jpg\",\"datePublished\":\"2022-05-16T14:00:00+00:00\",\"dateModified\":\"2022-08-18T20:12:05+00:00\",\"author\":{\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93\"},\"description\":\"In a time when cyberthreats are more prevalent than ever, identity protection has never been more important. Here\u2019s how to protect against identity theft.\",\"breadcrumb\":{\"@id\":\"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/#primaryimage\",\"url\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-2.jpg\",\"contentUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-2.jpg\",\"width\":2000,\"height\":1250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/thelogicgroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Steps on How To Protect Against Identity Theft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thelogicgroup.com\/#website\",\"url\":\"https:\/\/thelogicgroup.com\/\",\"name\":\"The Logic Group\",\"description\":\"Turn to The Logic Group for all your Philadelphia managed IT services.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thelogicgroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93\",\"name\":\"wpengine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d8770fe9625ca7c4601f13d9d0ab86565a6dac8cd6a77bfe2ada6d83c6837870?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d8770fe9625ca7c4601f13d9d0ab86565a6dac8cd6a77bfe2ada6d83c6837870?s=96&d=mm&r=g\",\"caption\":\"wpengine\"},\"description\":\"This is the \\\"wpengine\\\" admin user that our staff uses to gain access to your admin area to provide support and troubleshooting. It can only be accessed by a button in our secure log that auto generates a password and dumps that password after the staff member has logged in. We have taken extreme measures to ensure that our own user is not going to be misused to harm any of our clients sites.\",\"sameAs\":[\"http:\/\/wpengine.com\"],\"url\":\"https:\/\/thelogicgroup.com\/author\/wpengine\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Protect Against Identity Theft | The Logic Group","description":"In a time when cyberthreats are more prevalent than ever, identity protection has never been more important. Here\u2019s how to protect against identity theft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/","og_locale":"en_US","og_type":"article","og_title":"How To Protect Against Identity Theft | The Logic Group","og_description":"In a time when cyberthreats are more prevalent than ever, identity protection has never been more important. Here\u2019s how to protect against identity theft.","og_url":"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/","og_site_name":"The Logic Group","article_published_time":"2022-05-16T14:00:00+00:00","article_modified_time":"2022-08-18T20:12:05+00:00","og_image":[{"width":2000,"height":1250,"url":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-2.jpg","type":"image\/jpeg"}],"author":"wpengine","twitter_card":"summary_large_image","twitter_misc":{"Written by":"wpengine","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/#article","isPartOf":{"@id":"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/"},"author":{"name":"wpengine","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93"},"headline":"Steps on How To Protect Against Identity Theft","datePublished":"2022-05-16T14:00:00+00:00","dateModified":"2022-08-18T20:12:05+00:00","mainEntityOfPage":{"@id":"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/"},"wordCount":2605,"commentCount":0,"image":{"@id":"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/#primaryimage"},"thumbnailUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-2.jpg","keywords":["cybersecurity and identity theft","How To Protect Against Identity Theft","identity theft information security","what cyber identity theft"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/","url":"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/","name":"How To Protect Against Identity Theft | The Logic Group","isPartOf":{"@id":"https:\/\/thelogicgroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/#primaryimage"},"image":{"@id":"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/#primaryimage"},"thumbnailUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-2.jpg","datePublished":"2022-05-16T14:00:00+00:00","dateModified":"2022-08-18T20:12:05+00:00","author":{"@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93"},"description":"In a time when cyberthreats are more prevalent than ever, identity protection has never been more important. Here\u2019s how to protect against identity theft.","breadcrumb":{"@id":"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/#primaryimage","url":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-2.jpg","contentUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2021\/07\/TLG-August-Blog-2.jpg","width":2000,"height":1250},{"@type":"BreadcrumbList","@id":"https:\/\/thelogicgroup.com\/how-to-protect-against-identity-theft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thelogicgroup.com\/"},{"@type":"ListItem","position":2,"name":"Steps on How To Protect Against Identity Theft"}]},{"@type":"WebSite","@id":"https:\/\/thelogicgroup.com\/#website","url":"https:\/\/thelogicgroup.com\/","name":"The Logic Group","description":"Turn to The Logic Group for all your Philadelphia managed IT services.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thelogicgroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/f2aa1a83c962457dd06815847c247a93","name":"wpengine","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d8770fe9625ca7c4601f13d9d0ab86565a6dac8cd6a77bfe2ada6d83c6837870?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d8770fe9625ca7c4601f13d9d0ab86565a6dac8cd6a77bfe2ada6d83c6837870?s=96&d=mm&r=g","caption":"wpengine"},"description":"This is the \"wpengine\" admin user that our staff uses to gain access to your admin area to provide support and troubleshooting. It can only be accessed by a button in our secure log that auto generates a password and dumps that password after the staff member has logged in. We have taken extreme measures to ensure that our own user is not going to be misused to harm any of our clients sites.","sameAs":["http:\/\/wpengine.com"],"url":"https:\/\/thelogicgroup.com\/author\/wpengine\/"}]}},"_links":{"self":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts\/32148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/comments?post=32148"}],"version-history":[{"count":0,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts\/32148\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/media\/31984"}],"wp:attachment":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/media?parent=32148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/categories?post=32148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/tags?post=32148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}