{"version":"1.0","provider_name":"The Strategy Story","provider_url":"https:\/\/thestrategystory.com\/blog","title":"Everything You Need to Know About Identity Theft - The Strategy Story","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"lfzNYuVQOB\"><a href=\"https:\/\/thestrategystory.com\/blog\/everything-you-need-to-know-about-identity-theft\/\">Everything You Need to Know About Identity Theft<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/thestrategystory.com\/blog\/everything-you-need-to-know-about-identity-theft\/embed\/#?secret=lfzNYuVQOB\" width=\"600\" height=\"338\" title=\"&#8220;Everything You Need to Know About Identity Theft&#8221; &#8212; The Strategy Story\" data-secret=\"lfzNYuVQOB\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/thestrategystory.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"http:\/\/thestrategystory.com\/blog\/wp-content\/uploads\/2025\/12\/towfiqu-barbhuiya-em5w9_xj3uU-unsplash.jpg","thumbnail_width":640,"thumbnail_height":427,"description":"In today\u2019s digitalized world, our entire lives are on the internet, which makes users highly susceptible to identity theft. Identity theft includes numerous methods of stealing an individual\u2019s information to commit fraud.\u00a0"}