{"id":4438,"date":"2016-09-05T03:26:08","date_gmt":"2016-09-05T07:26:08","guid":{"rendered":"http:\/\/www.mccordweb.com\/weblogs\/?p=4438"},"modified":"2016-09-04T16:28:57","modified_gmt":"2016-09-04T20:28:57","slug":"whats-your-mobile-security-iq","status":"publish","type":"post","link":"https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/","title":{"rendered":"What&#8217;s Your Mobile Security IQ?"},"content":{"rendered":"<figure id=\"attachment_1200\" aria-describedby=\"caption-attachment-1200\" style=\"width: 140px\" class=\"wp-caption alignright\"><a href=\"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2009\/09\/privacy-policy.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1200\" src=\"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2009\/09\/privacy-policy.jpg\" alt=\"It's time to review your security on your smartphone.\" width=\"140\" height=\"210\" \/><\/a><figcaption id=\"caption-attachment-1200\" class=\"wp-caption-text\">It&#8217;s time to review\u00a0the security on your smartphone.<\/figcaption><\/figure>\n<p style=\"margin: 0px 0px 10px; padding: 0px; text-align: left; color: #222222; line-height: 19px; font-family: 'Helvetica', 'Arial', sans-serif; font-size: 14px; font-weight: normal;\" align=\"left\">This past month, my husband&#8217;s identity was stolen and my access to our bank account was hacked. In my husband&#8217;s case a credit card was opened in his name. In my case my online bank user name, password and PIN was used to raise credit limits and then steal over $3,000 from our checking account.<\/p>\n<p style=\"margin: 0px 0px 10px; padding: 0px; text-align: left; color: #222222; line-height: 19px; font-family: 'Helvetica', 'Arial', sans-serif; font-size: 14px; font-weight: normal;\" align=\"left\">Our bank took care of the matter, but what was problematic was just how robbers got access to my own personal online access information. The only thing we can think of is that I was using mobile banking features and may have accessed my bank while I was connected away from my home base.<\/p>\n<p style=\"margin: 0px 0px 10px; padding: 0px; text-align: left; color: #222222; line-height: 19px; font-family: 'Helvetica', 'Arial', sans-serif; font-size: 14px; font-weight: bold;\" align=\"left\">As a result, here are the things that I have done to improve my smartphone security.<\/p>\n<p style=\"margin: 0px 0px 10px; padding: 0px; text-align: left; color: #222222; line-height: 19px; font-family: 'Helvetica', 'Arial', sans-serif; font-size: 14px; font-weight: normal;\" align=\"left\">1. My entire family now uses on their mobile devices face or voice recognition biometrics to access our most important bank. For our other bank, we use two step verification. All family members use two step verification via text messages to smartphones to access bank accounts online through desktops.<\/p>\n<p style=\"margin: 0px 0px 10px; padding: 0px; text-align: left; color: #222222; line-height: 19px; font-family: 'Helvetica', 'Arial', sans-serif; font-size: 14px; font-weight: normal;\" align=\"left\">2. My entire family now has withdrawal, deposit and transaction alerts set up for banking, savings accounts, and credit cards. The focus is to catch robbers early before too much damage has been done.<\/p>\n<p style=\"margin: 0px 0px 10px; padding: 0px; text-align: left; color: #222222; line-height: 19px; font-family: 'Helvetica', 'Arial', sans-serif; font-size: 14px; font-weight: normal;\" align=\"left\">3. I personally am using <a href=\"http:\/\/www.nordvpn.com\/\" target=\"_blank\"><u><span style=\"color: #0066cc;\">NordVPN<\/span><\/u><\/a> which ia a subscription base security tool for my smartphone that encrypts my communication on mobile data or when I am connected to any Wi-Fi hotspots out of my office. This will be especially important to me as I will be traveling in the months to come and this secure tunnel will allow me to encrypt data I exchange on the internet, geomask my location as well as to prevent eavesdroppers from snatching my user names and passwords.<\/p>\n<p style=\"margin: 0px 0px 10px; padding: 0px; text-align: left; color: #222222; line-height: 19px; font-family: 'Helvetica', 'Arial', sans-serif; font-size: 14px; font-weight: normal;\" align=\"left\">Stay safe when you are online with your smartphone and encourage your family members to embrace new levels of mobile security to prevent the headaches that happened to us.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This past month, my husband&#8217;s identity was stolen and my access to our bank account was hacked. In my husband&#8217;s case a credit card was opened in his name. In my case my online bank user name, password and PIN was used to raise credit limits and then steal over $3,000 from our checking account. Our bank took care of the matter, but what was problematic was just how robbers got access to my own personal online access information. The only thing we can think of is that I was using mobile banking features and may have accessed my bank while I was connected away from my home base. As a result, here are the things that I have done to improve my smartphone security. 1. My entire family now uses on their mobile devices face or voice recognition biometrics to access our most important bank. For our other bank, we use two step verification. All family members use two step verification via text messages to smartphones to access bank accounts online through desktops. 2. My entire family now has withdrawal, deposit and transaction alerts set up for banking, savings accounts, and credit cards. The focus is to catch robbers early before too much damage has been done. 3. I personally am using NordVPN which ia a subscription base security tool for my smartphone that encrypts my communication on mobile data or when I am connected to any Wi-Fi hotspots out of my office. This will be especially important to me as I will be traveling in the months to come and this secure tunnel will allow me to encrypt data I exchange on the internet, geomask my location as well as to prevent eavesdroppers from snatching my user names and passwords. Stay safe when you are online with your smartphone and encourage your family members to embrace new levels of mobile security to prevent the headaches that happened to us.<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[490,315,357],"tags":[491,362,243,507],"class_list":["post-4438","post","type-post","status-publish","format-standard","hentry","category-just-nancy","category-mobile-web","category-news-trends","tag-just-nancy","tag-mobile","tag-reviews","tag-smartphone"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What&#039;s Your Mobile Security IQ? | The Web Authority<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What&#039;s Your Mobile Security IQ? | The Web Authority\" \/>\n<meta property=\"og:description\" content=\"This past month, my husband&#8217;s identity was stolen and my access to our bank account was hacked. In my husband&#8217;s case a credit card was opened in his name. In my case my online bank user name, password and PIN was used to raise credit limits and then steal over $3,000 from our checking account. Our bank took care of the matter, but what was problematic was just how robbers got access to my own personal online access information. The only thing we can think of is that I was using mobile banking features and may have accessed my bank while I was connected away from my home base. As a result, here are the things that I have done to improve my smartphone security. 1. My entire family now uses on their mobile devices face or voice recognition biometrics to access our most important bank. For our other bank, we use two step verification. All family members use two step verification via text messages to smartphones to access bank accounts online through desktops. 2. My entire family now has withdrawal, deposit and transaction alerts set up for banking, savings accounts, and credit cards. The focus is to catch robbers early before too much damage has been done. 3. I personally am using NordVPN which ia a subscription base security tool for my smartphone that encrypts my communication on mobile data or when I am connected to any Wi-Fi hotspots out of my office. This will be especially important to me as I will be traveling in the months to come and this secure tunnel will allow me to encrypt data I exchange on the internet, geomask my location as well as to prevent eavesdroppers from snatching my user names and passwords. Stay safe when you are online with your smartphone and encourage your family members to embrace new levels of mobile security to prevent the headaches that happened to us.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/\" \/>\n<meta property=\"og:site_name\" content=\"The Web Authority\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mccordweb\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-05T07:26:08+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2009\/09\/privacy-policy.jpg\" \/>\n<meta name=\"author\" content=\"Nancy McCord\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mccordweb\" \/>\n<meta name=\"twitter:site\" content=\"@mccordweb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nancy McCord\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/09\\\/05\\\/whats-your-mobile-security-iq\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/09\\\/05\\\/whats-your-mobile-security-iq\\\/\"},\"author\":{\"name\":\"Nancy McCord\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/person\\\/7499f3ac0b008bc0e5b7a138ac1dc0ba\"},\"headline\":\"What&#8217;s Your Mobile Security IQ?\",\"datePublished\":\"2016-09-05T07:26:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/09\\\/05\\\/whats-your-mobile-security-iq\\\/\"},\"wordCount\":338,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/09\\\/05\\\/whats-your-mobile-security-iq\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2009\\\/09\\\/privacy-policy.jpg\",\"keywords\":[\"\\\"Just Nancy\\\"\",\"Mobile\",\"Reviews\",\"Smartphone\"],\"articleSection\":[\"\\\"Just Nancy\\\"\",\"Mobile Web\",\"News &amp; Trends\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/09\\\/05\\\/whats-your-mobile-security-iq\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/09\\\/05\\\/whats-your-mobile-security-iq\\\/\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/09\\\/05\\\/whats-your-mobile-security-iq\\\/\",\"name\":\"What's Your Mobile Security IQ? | The Web Authority\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/09\\\/05\\\/whats-your-mobile-security-iq\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/09\\\/05\\\/whats-your-mobile-security-iq\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2009\\\/09\\\/privacy-policy.jpg\",\"datePublished\":\"2016-09-05T07:26:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/09\\\/05\\\/whats-your-mobile-security-iq\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/09\\\/05\\\/whats-your-mobile-security-iq\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/09\\\/05\\\/whats-your-mobile-security-iq\\\/#primaryimage\",\"url\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2009\\\/09\\\/privacy-policy.jpg\",\"contentUrl\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2009\\\/09\\\/privacy-policy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/09\\\/05\\\/whats-your-mobile-security-iq\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What&#8217;s Your Mobile Security IQ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#website\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\",\"name\":\"The Web Authority | McCord Web Services News\\\/Blog\",\"description\":\"Smart Digital Marketing, Real Business Results - McCord Web Services\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\",\"name\":\"McCord Web Services LLC\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/McCord-Web-White-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/McCord-Web-White-logo.png\",\"width\":450,\"height\":203,\"caption\":\"McCord Web Services LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mccordweb\",\"https:\\\/\\\/x.com\\\/mccordweb\",\"https:\\\/\\\/www.instagram.com\\\/nancy_mccord\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/nancymccord\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/mccordweb\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/person\\\/7499f3ac0b008bc0e5b7a138ac1dc0ba\",\"name\":\"Nancy McCord\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"caption\":\"Nancy McCord\"},\"sameAs\":[\"http:\\\/\\\/www.mccordweb.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What's Your Mobile Security IQ? | The Web Authority","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/","og_locale":"en_US","og_type":"article","og_title":"What's Your Mobile Security IQ? | The Web Authority","og_description":"This past month, my husband&#8217;s identity was stolen and my access to our bank account was hacked. In my husband&#8217;s case a credit card was opened in his name. In my case my online bank user name, password and PIN was used to raise credit limits and then steal over $3,000 from our checking account. Our bank took care of the matter, but what was problematic was just how robbers got access to my own personal online access information. The only thing we can think of is that I was using mobile banking features and may have accessed my bank while I was connected away from my home base. As a result, here are the things that I have done to improve my smartphone security. 1. My entire family now uses on their mobile devices face or voice recognition biometrics to access our most important bank. For our other bank, we use two step verification. All family members use two step verification via text messages to smartphones to access bank accounts online through desktops. 2. My entire family now has withdrawal, deposit and transaction alerts set up for banking, savings accounts, and credit cards. The focus is to catch robbers early before too much damage has been done. 3. I personally am using NordVPN which ia a subscription base security tool for my smartphone that encrypts my communication on mobile data or when I am connected to any Wi-Fi hotspots out of my office. This will be especially important to me as I will be traveling in the months to come and this secure tunnel will allow me to encrypt data I exchange on the internet, geomask my location as well as to prevent eavesdroppers from snatching my user names and passwords. Stay safe when you are online with your smartphone and encourage your family members to embrace new levels of mobile security to prevent the headaches that happened to us.","og_url":"https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/","og_site_name":"The Web Authority","article_publisher":"https:\/\/www.facebook.com\/mccordweb","article_published_time":"2016-09-05T07:26:08+00:00","og_image":[{"url":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2009\/09\/privacy-policy.jpg","type":"","width":"","height":""}],"author":"Nancy McCord","twitter_card":"summary_large_image","twitter_creator":"@mccordweb","twitter_site":"@mccordweb","twitter_misc":{"Written by":"Nancy McCord","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/#article","isPartOf":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/"},"author":{"name":"Nancy McCord","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/person\/7499f3ac0b008bc0e5b7a138ac1dc0ba"},"headline":"What&#8217;s Your Mobile Security IQ?","datePublished":"2016-09-05T07:26:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/"},"wordCount":338,"commentCount":0,"publisher":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization"},"image":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/#primaryimage"},"thumbnailUrl":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2009\/09\/privacy-policy.jpg","keywords":["\"Just Nancy\"","Mobile","Reviews","Smartphone"],"articleSection":["\"Just Nancy\"","Mobile Web","News &amp; Trends"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/","url":"https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/","name":"What's Your Mobile Security IQ? | The Web Authority","isPartOf":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/#primaryimage"},"image":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/#primaryimage"},"thumbnailUrl":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2009\/09\/privacy-policy.jpg","datePublished":"2016-09-05T07:26:08+00:00","breadcrumb":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/#primaryimage","url":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2009\/09\/privacy-policy.jpg","contentUrl":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2009\/09\/privacy-policy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/09\/05\/whats-your-mobile-security-iq\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mccordweb.com\/weblogs\/"},{"@type":"ListItem","position":2,"name":"What&#8217;s Your Mobile Security IQ?"}]},{"@type":"WebSite","@id":"https:\/\/www.mccordweb.com\/weblogs\/#website","url":"https:\/\/www.mccordweb.com\/weblogs\/","name":"The Web Authority | McCord Web Services News\/Blog","description":"Smart Digital Marketing, Real Business Results - McCord Web Services","publisher":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mccordweb.com\/weblogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization","name":"McCord Web Services LLC","url":"https:\/\/www.mccordweb.com\/weblogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2025\/09\/McCord-Web-White-logo.png","contentUrl":"https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2025\/09\/McCord-Web-White-logo.png","width":450,"height":203,"caption":"McCord Web Services LLC"},"image":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mccordweb","https:\/\/x.com\/mccordweb","https:\/\/www.instagram.com\/nancy_mccord\/","https:\/\/www.linkedin.com\/in\/nancymccord","https:\/\/www.youtube.com\/user\/mccordweb"]},{"@type":"Person","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/person\/7499f3ac0b008bc0e5b7a138ac1dc0ba","name":"Nancy McCord","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","caption":"Nancy McCord"},"sameAs":["http:\/\/www.mccordweb.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/4438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/comments?post=4438"}],"version-history":[{"count":1,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/4438\/revisions"}],"predecessor-version":[{"id":4439,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/4438\/revisions\/4439"}],"wp:attachment":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/media?parent=4438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/categories?post=4438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/tags?post=4438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}