{"id":23176,"date":"2021-10-18T11:52:50","date_gmt":"2021-10-18T19:52:50","guid":{"rendered":"https:\/\/www.spokeo.com\/compass\/?p=23176"},"modified":"2022-04-13T12:22:03","modified_gmt":"2022-04-13T20:22:03","slug":"how-to-stop-spam-and-phishing-emails","status":"publish","type":"post","link":"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/","title":{"rendered":"How to Protect Yourself from Phishing Emails"},"content":{"rendered":"\n<p><em>A quick note from Spokeo CEO Harrison Tang (10\/18\/21): \u201cWe are aware of scammers posing as Spokeo by sending suspicious emails addresses asking for user information. This is a fake email \u2013 we did not send these type of phishing emails to anyone.\u00a0 Please always double-check the sender\u2019s info before clicking on any link in the email.\u00a0 When in doubt, please\u00a0<a target=\"_blank\" href=\"https:\/\/www.spokeo.com\/contact\" rel=\"noreferrer noopener\">contact us<\/a>\u00a0at any time.\u201d<\/em><\/p>\n\n\n\n<p>As a human in the 21st century, unwanted emails are a common nuisance.\u00a0 Your credit card might invite you to transfer funds, or your favorite store might announce a sale \u2014 but are these emails just annoying, or are they harmful?<\/p>\n\n\n\n<p>Scammers are constantly getting better at using fake emails to mimic legitimate companies and collect your personal information.&nbsp; At first glance, these phishing emails might look like the real thing.&nbsp; Read on to learn how to safely identify and block these emails to protect your information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is Phishing?<\/h2>\n\n\n\n<p>Phishing refers to a type of email scam that solicits personal information, often to gain access to bank accounts or credit cards.&nbsp; Online crimes like phishing cost Americans <a href=\"https:\/\/www.fbi.gov\/news\/stories\/ic3-releases-2018-internet-crime-report-042219\">$2.7 billion in 2018<\/a>, almost double the amount lost to internet scams in 2017.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Spotting a Malicious Message<\/h2>\n\n\n\n<p>Phishing emails <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-tell-if-someone-is-scamming-you-online\/\">usually impersonate a company<\/a> or individual you already interact with, like a financial institution, social media site or online store.&nbsp; Learn how to check an email\u2019s legitimacy before handing over valuable personal details.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Email Solicits Your Information<\/h3>\n\n\n\n<p>Phishing emails usually claim that your account has a problem and ask you to provide personal information.&nbsp; The email might claim suspicious activity or attempts to log in, cite problems with payment information or offer a coupon or deal. It will usually ask you to click on a link and provide information, which puts you at risk for an attack.<\/p>\n\n\n\n<p><em>Never<\/em> click on links in suspicious emails.&nbsp; Instead, access your account directly. For example, the email shown below claims that the account is locked.&nbsp; A user could identify the email as phishing if they can successfully log into their account as usual.&nbsp; You can also run a Google search with the company\u2019s name and the word \u201cphishing\u201d to see if others have reported similar attacks, like this <a href=\"https:\/\/www.cordcuttersnews.com\/disney-users-accounts-are-being-hacked-sold-online\/?fbclid=IwAR2xDnrzlGCFNDyWJ6pY6AQtMjtW8eUJ8V9SUq7yeRswSjOzMYv0T_ya8Zs\">Disney+ scam<\/a>.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/3qRZXoVs5HhHlHF_6v-rqxlxdzXSKe7a-D3uluty71eXcq_q8dL3kFQEq14wJteEpJh3klRK8TP8QNmulFalvoxXIDtdALIyqcdGWVXhFkSBKpv2S7LzsItv06Rxd8J7hZz9Y9lhRCgx9bfRgA\" alt=\"A screenshot of a cell phone\n\nDescription automatically generated\"\/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Other Visual Clues<\/h3>\n\n\n\n<p>Some phishing emails might have typos and <a href=\"https:\/\/www.consumer.ftc.gov\/articles\/how-recognize-and-avoid-phishing-scams\">generic greetings<\/a>, which indicate that the email is a scam.&nbsp; But more sophisticated attacks are able to make the email really look legitimate.&nbsp; Looking closely will raise some red flags.<\/p>\n\n\n\n<p>In this Disney+ example, the email address in the \u201cReply-To\u201d field is suspicious.&nbsp; To check this out, search the rest of your inbox for legitimate emails from Disney+, like when you first registered for the service.&nbsp; You might notice that these messages come from disneyplus@mail.disneyplus.com.&nbsp; The email address in this message doesn\u2019t match at all \u2014 the different domain name \u201cdisneyaccount.com\u201d is a clear clue that this email is malicious.<\/p>\n\n\n\n<p>You should also <a href=\"https:\/\/www.spokeo.com\/username-search\">run a search on Spokeo<\/a> to verify any email address you aren\u2019t sure about.&nbsp; Pay attention to context and unusual activity as well.&nbsp; If a friend or family member is hacked, they could unknowingly send you malicious emails from their real email address.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Stop Spam Emails<\/h2>\n\n\n\n<p>Once you recognize an email as spam, there are several actions you can take to help prevent future phishing attempts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Reporting Spam vs. Phishing<\/h3>\n\n\n\n<p>First, report the specific message as phishing through your email provider.&nbsp; For example, Gmail now has a \u201c<a href=\"https:\/\/support.google.com\/mail\/answer\/8253?hl=en\">Report phishing\u201d<\/a> function in addition to \u201cReport spam.\u201d&nbsp; Make sure malicious messages are flagged as phishing specifically, not spam, so they are reported as dangerous.<\/p>\n\n\n\n<p>You can also <a href=\"https:\/\/www.us-cert.gov\/report-phishing\">report phishing to the US government<\/a> and separately contact the company being impersonated.&nbsp; But don\u2019t contact the company through the phishing email.&nbsp; Instead, use your typical method of contacting the company, like calling a customer-service number listed on their website, to report the incident.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Inbox Security Measures<\/h3>\n\n\n\n<p>In your email provider\u2019s settings, you can configure your inbox to customize how you want spam and phishing emails handled.&nbsp; In Outlook, for example, you can <a href=\"https:\/\/support.office.com\/en-us\/article\/change-the-level-of-protection-in-the-junk-email-filter-e89c12d8-9d61-4320-8c57-d982c8d52f6b\">increase the protection level<\/a> to filter more messages directly into a junk folder.&nbsp; You can also block specific email senders in <a href=\"https:\/\/support.office.com\/en-us\/article\/block-a-mail-sender-b29fd867-cac9-40d8-aed1-659e06a706e4\">Outlook<\/a>, <a href=\"https:\/\/support.google.com\/mail\/answer\/8151?co=GENIE.Platform%3DDesktop&amp;hl=en\">Gmail<\/a> and other email providers.<\/p>\n\n\n\n<p>Beyond spam filters, you can install more security features to protect your inbox.&nbsp; Gmail has a <a href=\"https:\/\/chrome.google.com\/webstore\/detail\/gmail-sender-icons\/jniljaamodclkmphgkgkooplflhkadpg?hl=en\">Sender Icons plug-in<\/a> to verify whether the email address is really from a particular company.&nbsp; You should also regularly review the plug-ins attached to your inbox and remove any you don\u2019t recognize or need, as they may be letting in unwanted and potentially dangerous emails.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Additional Security Measures<\/h3>\n\n\n\n<p>For additional layers of protection, make sure you always <a href=\"https:\/\/www.consumer.ftc.gov\/blog\/2019\/06\/update-your-software-now\">update to the latest version of software<\/a> on your computer, phone and tablet.&nbsp; Even better \u2014 configure your settings to install new versions automatically.&nbsp; You should always have security software on your computer and keep that updated as well.<\/p>\n\n\n\n<p>Make sure you are using a <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-remember-passwords\/\">secure password<\/a> for all your accounts.&nbsp; Also, whenever possible, consider using <a href=\"https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/tig\/back-basics-multi-factor-authentication\">multi-factor authentication<\/a> to make it more difficult for hackers to break into your accounts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Other Kinds of Spam<\/h2>\n\n\n\n<p>Email isn\u2019t the only way scammers can get your personal information.&nbsp; Watch out for smishing, which is <a href=\"https:\/\/www.spokeo.com\/compass\/top-text-scams-to-watch-out-for\/\">spam messages sent over text message<\/a>.&nbsp; When in doubt, delete the message and block the sender.<\/p>\n\n\n\n<p><em>Katrina Ballard is a communications manager in Washington, DC. She holds a master\u2019s degree in public administration and has written extensively on technology, business and more.<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">References:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.fbi.gov\/news\/stories\/ic3-releases-2018-internet-crime-report-042219\">https:\/\/www.fbi.gov\/news\/stories\/ic3-releases-2018-internet-crime-report-042219<\/a><\/li><li><a href=\"https:\/\/www.cordcuttersnews.com\/disney-users-accounts-are-being-hacked-sold-online\/?fbclid=IwAR2xDnrzlGCFNDyWJ6pY6AQtMjtW8eUJ8V9SUq7yeRswSjOzMYv0T_ya8Zs\">https:\/\/www.cordcuttersnews.com\/disney-users-accounts-are-being-hacked-sold-online\/?fbclid=IwAR2xDnrzlGCFNDyWJ6pY6AQtMjtW8eUJ8V9SUq7yeRswSjOzMYv0T_ya8Zs<\/a><\/li><li><a href=\"https:\/\/www.consumer.ftc.gov\/articles\/how-recognize-and-avoid-phishing-scams\">https:\/\/www.consumer.ftc.gov\/articles\/how-recognize-and-avoid-phishing-scams<\/a><\/li><li><a href=\"https:\/\/support.google.com\/mail\/answer\/8253?hl=en\">https:\/\/support.google.com\/mail\/answer\/8253?hl=en<\/a><\/li><li><a href=\"https:\/\/www.us-cert.gov\/report-phishing\">https:\/\/www.us-cert.gov\/report-phishing<\/a><\/li><li><a href=\"https:\/\/support.office.com\/en-us\/article\/change-the-level-of-protection-in-the-junk-email-filter-e89c12d8-9d61-4320-8c57-d982c8d52f6b\">https:\/\/support.office.com\/en-us\/article\/change-the-level-of-protection-in-the-junk-email-filter-e89c12d8-9d61-4320-8c57-d982c8d52f6b<\/a><\/li><li><a href=\"https:\/\/support.office.com\/en-us\/article\/block-a-mail-sender-b29fd867-cac9-40d8-aed1-659e06a706e4\">https:\/\/support.office.com\/en-us\/article\/block-a-mail-sender-b29fd867-cac9-40d8-aed1-659e06a706e4<\/a><\/li><li><a href=\"https:\/\/support.google.com\/mail\/answer\/8151?co=GENIE.Platform%3DDesktop&amp;hl=en\">https:\/\/support.google.com\/mail\/answer\/8151?co=GENIE.Platform%3DDesktop&amp;hl=en<\/a><\/li><li><a href=\"https:\/\/chrome.google.com\/webstore\/detail\/gmail-sender-icons\/jniljaamodclkmphgkgkooplflhkadpg?hl=en\">https:\/\/chrome.google.com\/webstore\/detail\/gmail-sender-icons\/jniljaamodclkmphgkgkooplflhkadpg?hl=en<\/a><\/li><li><a href=\"https:\/\/www.consumer.ftc.gov\/blog\/2019\/06\/update-your-software-now\">https:\/\/www.consumer.ftc.gov\/blog\/2019\/06\/update-your-software-now<\/a><\/li><li><a href=\"https:\/\/www.spokeo.com\/compass\/how-to-remember-passwords\/\">https:\/\/www.spokeo.com\/compass\/how-to-remember-passwords\/<\/a><\/li><li><a href=\"https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/tig\/back-basics-multi-factor-authentication\">https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/tig\/back-basics-multi-factor-authentication<\/a><\/li><li><a href=\"https:\/\/www.spokeo.com\/compass\/top-text-scams-to-watch-out-for\/\">https:\/\/www.spokeo.com\/compass\/top-text-scams-to-watch-out-for\/<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>A quick note from Spokeo CEO Harrison Tang (10\/18\/21): \u201cWe are aware of scammers posing as Spokeo by sending suspicious emails addresses asking for user information. This is a fake&hellip;<\/p>\n","protected":false},"author":112,"featured_media":23520,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[614],"tags":[],"class_list":["post-23176","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-safety"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Protect Yourself from Phishing Emails - The Compass Blog | Digital Identity and People Search | Spokeo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Yourself from Phishing Emails - The Compass Blog | Digital Identity and People Search | Spokeo\" \/>\n<meta property=\"og:description\" content=\"A quick note from Spokeo CEO Harrison Tang (10\/18\/21): \u201cWe are aware of scammers posing as Spokeo by sending suspicious emails addresses asking for user information. This is a fake&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/\" \/>\n<meta property=\"og:site_name\" content=\"The Compass Blog | Digital Identity and People Search | Spokeo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Spokeo\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-18T19:52:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-13T20:22:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/2-InternetSafetyProtectFromPhisingEmails_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"411\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fred Decker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:site\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fred Decker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/\",\"url\":\"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/\",\"name\":\"How to Protect Yourself from Phishing Emails - The Compass Blog | Digital Identity and People Search | Spokeo\",\"isPartOf\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/2-InternetSafetyProtectFromPhisingEmails_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1\",\"datePublished\":\"2021-10-18T19:52:50+00:00\",\"dateModified\":\"2022-04-13T20:22:03+00:00\",\"author\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/2-InternetSafetyProtectFromPhisingEmails_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/2-InternetSafetyProtectFromPhisingEmails_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1\",\"width\":800,\"height\":411},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\",\"url\":\"https:\/\/www.spokeo.com\/compass\/\",\"name\":\"The Compass Blog | Digital Identity and People Search | Spokeo\",\"description\":\"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\",\"name\":\"Fred Decker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"caption\":\"Fred Decker\"},\"url\":\"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Yourself from Phishing Emails - The Compass Blog | Digital Identity and People Search | Spokeo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/","og_locale":"en_US","og_type":"article","og_title":"How to Protect Yourself from Phishing Emails - The Compass Blog | Digital Identity and People Search | Spokeo","og_description":"A quick note from Spokeo CEO Harrison Tang (10\/18\/21): \u201cWe are aware of scammers posing as Spokeo by sending suspicious emails addresses asking for user information. This is a fake&hellip;","og_url":"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/","og_site_name":"The Compass Blog | Digital Identity and People Search | Spokeo","article_publisher":"https:\/\/www.facebook.com\/Spokeo\/","article_published_time":"2021-10-18T19:52:50+00:00","article_modified_time":"2022-04-13T20:22:03+00:00","og_image":[{"width":800,"height":411,"url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/2-InternetSafetyProtectFromPhisingEmails_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1","type":"image\/jpeg"}],"author":"Fred Decker","twitter_card":"summary_large_image","twitter_creator":"@Spokeo","twitter_site":"@Spokeo","twitter_misc":{"Written by":"Fred Decker","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/","url":"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/","name":"How to Protect Yourself from Phishing Emails - The Compass Blog | Digital Identity and People Search | Spokeo","isPartOf":{"@id":"https:\/\/www.spokeo.com\/compass\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/#primaryimage"},"image":{"@id":"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/2-InternetSafetyProtectFromPhisingEmails_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1","datePublished":"2021-10-18T19:52:50+00:00","dateModified":"2022-04-13T20:22:03+00:00","author":{"@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/#primaryimage","url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/2-InternetSafetyProtectFromPhisingEmails_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/2-InternetSafetyProtectFromPhisingEmails_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1","width":800,"height":411},{"@type":"WebSite","@id":"https:\/\/www.spokeo.com\/compass\/#website","url":"https:\/\/www.spokeo.com\/compass\/","name":"The Compass Blog | Digital Identity and People Search | Spokeo","description":"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea","name":"Fred Decker","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","caption":"Fred Decker"},"url":"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/2-InternetSafetyProtectFromPhisingEmails_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p8V62u-61O","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/23176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/comments?post=23176"}],"version-history":[{"count":2,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/23176\/revisions"}],"predecessor-version":[{"id":25234,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/23176\/revisions\/25234"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media\/23520"}],"wp:attachment":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media?parent=23176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/categories?post=23176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/tags?post=23176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}