{"id":502,"date":"2023-03-24T16:29:22","date_gmt":"2023-03-24T22:29:22","guid":{"rendered":"https:\/\/staging.datcomllc.com\/?page_id=502"},"modified":"2023-03-24T17:03:13","modified_gmt":"2023-03-24T23:03:13","slug":"502-2","status":"publish","type":"page","link":"https:\/\/staging.datcomllc.com\/index.php\/understanding-it\/502-2\/","title":{"rendered":"Understanding Your Virtual Identity"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text &#8211; Experience painless support&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1><span style=\"color: #008000;\">Understanding Your Virtual Identity<\/span><\/h1>\n<p>&nbsp;<\/p>\n<p>Protect yourself from online identity thieves.<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/staging.datcomllc.com\/wp-content\/uploads\/2023\/03\/identity_security-300x187.png\" width=\"300\" height=\"187\" alt=\"\" class=\"wp-image-455 alignright size-medium\" srcset=\"https:\/\/staging.datcomllc.com\/wp-content\/uploads\/2023\/03\/identity_security-300x187.png 300w, https:\/\/staging.datcomllc.com\/wp-content\/uploads\/2023\/03\/identity_security-400x250.png 400w, https:\/\/staging.datcomllc.com\/wp-content\/uploads\/2023\/03\/identity_security.png 430w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>We often talk about threats to business infrastructures, but the point stands that these same threats make advances on individuals as well. If enough personally identifiable information is stolen, a hacker could completely lift the identity of a user to take out loans, hijack credit card numbers, and even infiltrate social media accounts to further spread their influence. The result could be a ruined credit score and a damaged reputation&#8211;a major problem for anyone, not just the business owner.<\/p>\n<p>One thing to keep in mind is that a general best practice is to keep sensitive information as far away from the Internet as possible, and to only input such information into secured, verified sources. However, it\u2019s not always this simple. We\u2019ll discuss some of the most common ways that individuals can protect themselves against threats like identity theft.<\/p>\n<p>&nbsp;<\/p>\n<h2>Personally Identifiable Information<\/h2>\n<h4>Social Security numbers, dates of birth, home addresses, and more.<\/h4>\n<p>This should go without saying, but information like Social Security numbers, dates of birth, addresses, and other sensitive information that identifies directly with the user, should be used with discretion while on the Internet. Sometimes users might receive phishing emails from what appear to be banks or government agencies that request a \u201cverification\u201d of sensitive information. You should know that requests like these will never be sent via email or phone call, and will almost certainly be found in your home address mailbox.<\/p>\n<p>&nbsp;<\/p>\n<h2>Financial Credentials<\/h2>\n<h4>Credit card numbers, PINs, CSCs, etc.<\/h4>\n<p>Financial information is in high demand for hackers. If they don\u2019t want to use your personal finances for their own purposes, they can sell your credit card credentials on the black market to make money that way. Either way, hackers will resolutely pursue your credentials, and it\u2019s your responsibility to keep them away. Never store your financial credentials locally on your PC, and make sure that any site you\u2019re plugging them into is secured with encryption and a security certificate. You can check by looking for a green padlock icon, or https, in the browser\u2019s address bar.<\/p>\n<p>&nbsp;<\/p>\n<h2>Other Sensitive Data<\/h2>\n<h4>Passwords, usernames, and more.<\/h4>\n<p>Login credentials are common targets for hackers, and they\u2019ll use every trick in the book to get their hands on them. Passwords and usernames are required for logging into accounts. In particular, hackers could access your email, social media account, online shopping accounts like Amazon, and so much more, with the intention of stealing your identity or sensitive data. Using complex passwords and usernames is a great first step toward protecting yourself online, and using a consumer-grade password manager like LastPass can help you use complex passwords without the need to remember them.<\/p>\n<p>&nbsp;<\/p>\n<h2>Secure Your Identity Today<\/h2>\n<h4>Don\u2019t let hackers get their way.<\/h4>\n<p>It can be daunting to keep all of this sensitive information away from hackers, but it\u2019s crucial that you take steps to protect yourself online. To learn more about how you can protect your identity from online threats, reach out to us at (903) 842-2220.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_cta title=&#8221;FREE IT Whitepaper&#8221; button_url=&#8221;https:\/\/datcomllc.com\/10-benefits&#8221; button_text=&#8221;Download!&#8221; admin_label=&#8221;CTA &#8211; Free IT Whitepaper&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#349966&#8243; background_color=&#8221;#efefef&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#78BD1E&#8221; button_border_color=&#8221;#78BD1E&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000;\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/staging.datcomllc.com\/wp-content\/uploads\/2023\/03\/whitepaper-CTA-article-300x200.png\" width=\"300\" height=\"200\" alt=\"\" class=\"wp-image-163 alignnone size-medium\" srcset=\"https:\/\/staging.datcomllc.com\/wp-content\/uploads\/2023\/03\/whitepaper-CTA-article-300x200.png 300w, https:\/\/staging.datcomllc.com\/wp-content\/uploads\/2023\/03\/whitepaper-CTA-article.png 330w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000;\">This whitepaper evaluates the differences between traditional technical support practices and <strong>modern managed IT practices<\/strong>\u00a0and the\u00a0<strong>pros<\/strong>\u00a0and\u00a0<strong>cons<\/strong> of both for small and medium businesses.<\/span><\/p>\n<p>[\/et_pb_cta][et_pb_contact_form title=&#8221;IT Questions?&#8221; submit_button_text=&#8221;Contact Us&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; _unique_id=&#8221;53861f92-5d64-448a-9097-b36368b9b45a&#8221; form_field_background_color=&#8221;#FFFFFF&#8221; form_field_text_color=&#8221;#000000&#8243; form_field_focus_background_color=&#8221;#FFFFFF&#8221; form_field_custom_margin=&#8221;15px|1px|15px|0px|false|false&#8221; form_field_custom_padding=&#8221;|0px||5px|false|false&#8221; form_field_text_align=&#8221;left&#8221; form_field_line_height=&#8221;1.5em&#8221; background_color=&#8221;#efefef&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#78BD1E&#8221; button_border_color=&#8221;#78BD1E&#8221; button_use_icon=&#8221;off&#8221; button_custom_margin=&#8221;|0px||8px|false|false&#8221; button_custom_padding=&#8221;|20px||20px|false|false&#8221; width=&#8221;100%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;|0px|||false|false&#8221; custom_padding=&#8221;20px|30px|20px|30px|false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_contact_field field_id=&#8221;First_Name&#8221; field_title=&#8221;First Name&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.20.2&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Last_Name&#8221; field_title=&#8221;Last Name&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.20.2&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Email&#8221; field_title=&#8221;Email&#8221; field_type=&#8221;email&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Phone&#8221; field_title=&#8221;Phone&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Message&#8221; field_title=&#8221;Message&#8221; field_type=&#8221;text&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Understanding Your Virtual Identity &nbsp; Protect yourself from online identity thieves. We often talk about threats to business infrastructures, but the point stands that these same threats make advances on individuals as well. If enough personally identifiable information is stolen, a hacker could completely lift the identity of a user to take out loans, hijack [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":467,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"_links":{"self":[{"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/pages\/502"}],"collection":[{"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/comments?post=502"}],"version-history":[{"count":3,"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/pages\/502\/revisions"}],"predecessor-version":[{"id":506,"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/pages\/502\/revisions\/506"}],"up":[{"embeddable":true,"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/pages\/467"}],"wp:attachment":[{"href":"https:\/\/staging.datcomllc.com\/index.php\/wp-json\/wp\/v2\/media?parent=502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}