{"id":25548,"date":"2019-02-23T07:11:44","date_gmt":"2019-02-23T07:11:44","guid":{"rendered":"http:\/\/a2942599-9493-4f16-a4b2-e01e32717758"},"modified":"2019-02-23T07:11:44","modified_gmt":"2019-02-23T07:11:44","slug":"less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/","title":{"rendered":"Less than one in 10 Americans take necessary steps to prevent identity theft"},"content":{"rendered":"<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>Think of all the ways you could be a victim of a crime. Do you classify any of these methods as <em>inevitable<\/em>? In almost every scenario, it is not even close to inevitability, with one major exception: Identity theft. \u00a0<\/p>\n<p>Your data may already be exposed online.<\/p>\n<p>The <a href=\"https:\/\/www.zdnet.com\/article\/over-87gb-of-email-address-and-passwords-exposed-in-collection-1-dump\/\">Collection 1 dump of 773 million email addresses<\/a>\u00a0and 22 million passwords, was part of a much larger set of <a href=\"https:\/\/www.zdnet.com\/article\/security-firm-identifies-hacker-behind-collection-1-leak-as-collection-2-5-become-public\/\">databases containing over 3.5 billion user records<\/a> and placed online. The largest public data breach by volume shows that you can not be too careful with your online records.\u00a0<\/p>\n<p>But do we care about our online data?<\/p>\n<p>Plantation, Fla.-based <a href=\"https:\/\/www.erpmaestro.com\" target=\"_blank\" rel=\"noopener noreferrer\">SaaS access control company ERP Maestro<\/a> surveyed 2,000 Americans ages between 18 and 82 in December 2018. It wanted to find out about their experiences and perception of cybercrime and identity theft<\/p>\n<p>It discovered that three out of four Americans (76 percent) believe that it is inevitable that they will be victims of identity theft or cybercrime. However, almost half (48 percent) of respondents said that they are not concerned about it.<\/p>\n<p>Over one in three (37 percent) of Americans say that they have already been victims of cybercrime and identity theft. Many of these have fallen victim to credit or debit charges (64 percent), stolen information (16 percent), or employment or tax fraud (6 percent)<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The top states with prevalence of identity theft are: 1. Michigan, 2. California, 3. Florida, 4. Maryland, and 5. Nevada. West Virginia, and South Dakota have the least amount of identity theft.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/02\/22\/c09b8380-017d-447a-9504-04b6052c2a51\/819bff984f5a82c3eaa5c6227d8c0d14\/states-of-identity-theft-eileen-brown-zdnet.jpg\" class=\"\" alt=\"Less than one in ten Americans take necessary steps to prevent identity theft zdnet\"\/><\/span> <span class=\"credit\">ERP Maestro<\/span><\/p>\n<p>Sadly, only 32 percent of victims think they could have prevented the crime,\u00a0 and three out of four victims said that they did not change their online behaviour after the identity theft or cyber crime happened.<\/p>\n<p>Almost half (48 percent) thought that the incident was a big issue, causing them a lot of time, while others complained of losing a little money (19 percent), damaged credit ratings (11 percent), losing a lot of money (10 percent), or hurting their reputation (4 percent).<\/p>\n<p>One in three felt there were no real consequences from the data compromise.<\/p>\n<p>To prevent identity theft or cyber crime, almost four out of five (77 percent) of Americans look for fraudulent debit or credit charges on their account. Three out of five (60 percent) use very complex passwords, and 55 percent use firewalls or anti virus software at home.<\/p>\n<p>Almost three out of four said that high profile data breaches \u2013- such as Facebook, Twitter, and Marriot breaches in 2018 &#8212; have caused them to change their online behaviour.<\/p>\n<p>Over half of Americans (57 percent) believe if something happens, the damage will just get reversed, and less than one in 10 (9 percent) carry out the necessary steps to prevent cash disappearing from their accounts by freezing inactive credit cards.<\/p>\n<p>Both businesses and consumers need to assess their security risk and take all steps possible to prevent identity theft happening. Complacency will lead to ever larger data breaches &#8212; until no one&#8217;s data is safe.<\/p>\n<h3>Previous and related coverage:<\/h3>\n<h5><a href=\"https:\/\/www.zdnet.com\/pictures\/who-is-really-in-the-drivers-seat-unknown-digital-threats-to-your-cars-security\/\">Who is really in the driver&#8217;s seat? Unknown digital threats to your car&#8217;s security<\/a><\/h5>\n<p>The technology managing the systems in our cars could be open drivers up to the risk of hacking. Find out the most common digital threats to our cars, and how you can reduce your risk.<\/p>\n<h5><a href=\"https:\/\/www.zdnet.com\/article\/two-thirds-of-us-consumers-say-government-should-do-more-to-protect-data-privacy\/\">Two thirds of US consumers say Government should do more to protect data privacy<\/a><\/h5>\n<p>In the wake of breaches, US consumers are concerned more than ever about their data.<\/p>\n<h5><a href=\"https:\/\/www.zdnet.com\/article\/four-out-of-five-americans-distrust-mainstream-social-media-sites-like-facebook\/\">Four out of five Americans distrust mainstream social media sites like Facebook<\/a><\/h5>\n<p>Americans are so disillusioned by social media, that many are turning to forums for trustworthy information.<\/p>\n<h5><a href=\"https:\/\/www.zdnet.com\/article\/betrayal-by-cgi-study-reveals-almost-half-of-gen-y-and-z-do-not-know-they-are-following-a-bot\/\">Betrayal by CGI: Almost half of Gen Y and Z don&#8217;t know they&#8217;re following a bot<\/a><\/h5>\n<p>What if the influencer you had been following on Instagram &#8212; whose choices you admired, and whose social causes that you believed in &#8212; turned out to be a robot?<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most Americans think they will be victims of cyber crime -\u2013 yet not many are concerned about it<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25549,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-25548","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Less than one in 10 Americans take necessary steps to prevent identity theft 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Less than one in 10 Americans take necessary steps to prevent identity theft 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-23T07:11:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1003\" \/>\n\t<meta property=\"og:image:height\" content=\"586\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Less than one in 10 Americans take necessary steps to prevent identity theft\",\"datePublished\":\"2019-02-23T07:11:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\\\/\"},\"wordCount\":652,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\\\/\",\"name\":\"Less than one in 10 Americans take necessary steps to prevent identity theft 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft.jpg\",\"datePublished\":\"2019-02-23T07:11:44+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft.jpg\",\"width\":1003,\"height\":586},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Less than one in 10 Americans take necessary steps to prevent identity theft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Less than one in 10 Americans take necessary steps to prevent identity theft 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/","og_locale":"en_US","og_type":"article","og_title":"Less than one in 10 Americans take necessary steps to prevent identity theft 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-23T07:11:44+00:00","og_image":[{"width":1003,"height":586,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Less than one in 10 Americans take necessary steps to prevent identity theft","datePublished":"2019-02-23T07:11:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/"},"wordCount":652,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/","url":"https:\/\/www.threatshub.org\/blog\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/","name":"Less than one in 10 Americans take necessary steps to prevent identity theft 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft.jpg","datePublished":"2019-02-23T07:11:44+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft.jpg","width":1003,"height":586},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/less-than-one-in-10-americans-take-necessary-steps-to-prevent-identity-theft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Less than one in 10 Americans take necessary steps to prevent identity theft"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25548"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25548\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25549"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}