<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.identityiq.com</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/plans-pricing</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/search</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/faq</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/how-we-protect-you</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/why-we-are-better</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/features/identity-protection</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/features/identity-restoration</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/features/financial-wellness</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/features/family-protection</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/features/device-protection</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/features/additional-ways-we-protect-you</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/case-studies</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/what-is-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/network-partners</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/terms-of-service</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/tcpa</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/scam-report</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/scam-report-success</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/report</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/plans-pricing-discount</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/2024-fraud-trends-report</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/2024-fraud-trends-report-success</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/marketplace</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/10-effective-ways-to-prevent-compromised-credentials</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/2023-a-year-of-record-breaking-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/3-credit-facts-you-need-to-know-about-medical-debt</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/3-steps-to-take-if-you-are-the-victim-of-unemployment-benefits-fraud</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/3-ways-rent-payment-reporting-improves-your-credit</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/4-credit-moves-to-make-when-you-move-back-in-with-your-parents</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/4-identity-theft-myths-to-stop-believing</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/4-out-of-5-physicians-report-cyberattacks-as-health-care-industry-leads-in-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/4-reasons-identity-theft-is-a-major-threat-during-the-holiday-season</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/4-tips-on-how-to-mail-a-paper-check-safely</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/5-common-hotel-scams-and-how-to-avoid-them</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/5-data-breaches-you-may-have-missed</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/5-password-best-practices-you-should-be-using</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/5-reasons-to-monitor-your-credit-this-holiday-season</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/5-reasons-why-your-free-credit-report-isnt-enough</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/5-things-you-should-not-share-on-social-media</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/5-things-you-shouldnt-put-on-your-credit-card</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/5-tips-for-avoiding-charity-scams-over-the-holidays</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/5-travel-scams-to-avoid-when-you-reach-your-destination</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/6-common-credit-report-inaccuracies</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/6-common-facebook-marketplace-scams-and-how-to-avoid-them</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/6-tips-for-protecting-your-social-security-number</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/6-tips-for-sharing-files-safely-and-securely</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/6-ways-parental-controls-help-protect-your-child</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/7-common-credit-mistakes-to-avoid</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/7-eleven-customer-data-exposed-in-app-security-breach</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/7-simple-tips-for-safer-internet-browsing</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/7-tips-to-follow-for-safer-internet-day</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/7-ways-to-help-keep-your-kids-safe-online</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/8-common-identity-theft-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/8-warning-signs-you-might-be-a-victim-of-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/a-year-in-review-the-worst-data-breach-news-of-2018</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/account-takeover-what-is-it-and-how-to-prevent-it</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/address-fraud</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/ai-scams-targeting-voters-election</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/ai-voice-cloning-scams-a-clear-and-present-danger</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/amazon-scams-and-tips-to-avoid-them</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/are-college-students-targeted-by-identity-thieves</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/att-data-breach</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/audi-got-hacked-heres-what-cybercrimals-do-with-your-information-and-how-to-protect-it</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/aura-data-breach-2026</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/back-2-school-heres-why-credit-monitoring-is-a-must-have-for-college-students</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/banks-under-fire-for-refusing-reimbursements-to-victims-of-online-payment-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/best-credit-card-offers</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/bitcoin-atm-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/booking-a-vacation-heres-how-to-spot-rental-listing-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/buying-a-home-heres-how-your-credit-will-affect-your-mortgage-rate</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/byod-here-are-possible-risks-if-you-are-bringing-your-own-device-to-work</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/can-a-drivers-license-be-used-for-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/can-hackers-create-fake-hotspots</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/can-my-identity-be-stolen-from-my-birth-certificate</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/can-robocalls-steal-your-identity</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/can-someone-change-your-address-without-your-knowledge</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/can-your-identity-be-stolen-from-your-passport</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/can-your-identity-be-stolen-from-your-phone-number</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/cancel-identityiq-alternative</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/canvas-data-breach-2026</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/case-study-dorthey</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/cash-app-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/check-scams-are-on-the-rise-heres-how-to-keep-safe</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/child-identity-theft-prevention-protection-guide</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/cloudstar-remains-compromised-following-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/collection-1-data-breach-leaks-773-million-email-addresses-and-21-million-passwords</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/common-holiday-scams-and-how-to-avoid-them</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/common-tech-support-scams-and-how-to-avoid-them</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/companies-are-watching-you-and-charging-you-more-surveillance-pricing</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/cpn-scams-are-trending-heres-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/credit-card-protection-vs-identity-theft-protection</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/credit-freeze-v-credit-lock-differences-along-with-pros-cons</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/credit-karma-technical-issue-exposes-account-information-to-wrong-users</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/credit-score-ranges-is-your-score-considered-excellent-poor-or-in-between</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/criminal-identity-theft-what-is-it-and-how-does-it-work</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/crowdstrike-microsoft-outage</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/cryptocurrency-use-is-on-the-rise-and-so-are-crypto-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/data-privacy</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/debt-snowball-or-debt-avalanche-which-debt-repayment-method-is-right-for-you</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/deep-web-v-dark-web</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/dell-data-breach-affects-49-million-customers</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/discord-safe-kids</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/do-i-get-a-new-identity-protection-pin-every-year</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/do-people-go-through-trash-to-steal-your-identity</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/do-you-still-need-to-buy-antivirus-software</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/does-identity-theft-increase-during-the-holidays</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/donating-to-charity-follow-these-best-practices-to-avoid-fraud</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/dont-let-a-phishing-scam-ruin-your-holiday</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/equifax-to-pay-up-for-data-breach</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/ex-amazon-employee-arrested-for-hacking-more-than-100-million-capital-one-customers-data</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/fake-captcha-scam</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/fico-to-release-newest-versions-of-credit-scores</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/financial-account-fraud</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/five-charged-in-largest-criminal-case-ever-of-identity-theft-targeting-military-members-and-veterans</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/five-strategies-for-protecting-your-childs-privacy-online</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/former-uber-executive-charged-in-data-breach-cover-up</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/fortnite-scams-what-parents-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/free-dark-web-scan-and-what-to-do-if-your-data-is-found</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/ghost-student-scams-student-loan-scams-and-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/ghost-tapping-scam</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/gift-card-scams-and-how-to-avoid-them</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/graduation-means-more-freedom-but-also-more-risk-for-fraud-and-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/help-avoid-charity-scams-this-giving-tuesday</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/help-avoid-holiday-credit-card-fraud</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/holiday-identity-theft-protection-8-ways-to-stay-safe-while-shopping-online</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/holiday-travel-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/home-title-theft-warning-signs-and-prevention-tips</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-are-elderly-americans-vulnerable-to-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-are-hackers-targeting-your-devices-through-bluetooth</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-can-college-students-avoid-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-can-i-find-out-if-someone-is-using-my-social-security-number</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-can-i-protect-my-personal-information-after-a-data-breach</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-credit-card-pre-approval-offers-work</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-cybercriminals-profit-from-a-data-breach</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-cybercriminals-use-stolen-personal-data-for-tax-fraud</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-do-i-get-an-ip-pin-from-the-irs</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-do-i-help-protect-my-identity-after-losing-my-wallet</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-do-you-avoid-tax-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-do-you-know-if-your-information-is-on-the-dark-web</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-do-you-protect-yourself-from-credit-card-skimmers</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-does-a-fraud-alert-help-protect-you</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-does-a-late-payment-affect-your-credit</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-does-credit-card-fraud-work</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-does-credit-monitoring-protect-you-from-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-does-identity-theft-affect-your-credit-score</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-easy-is-it-to-get-a-personal-loan</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-hackers-steal-your-passwords</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-identity-theft-damages-more-than-just-your-credit-scores</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-important-are-phone-software-updates</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-independent-contractors-can-use-employee-identification-numbers-to-help-prevent-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-machine-learning-safeguards-your-data</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-oversharing-about-your-kids-on-social-media-can-lead-to-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-sharenting-can-lead-to-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-the-dark-web-can-threaten-your-credit-and-financial-security-2</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-add-utility-bills-to-your-credit-report</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-avoid-airbnb-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-avoid-and-report-boss-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-avoid-fake-qr-code-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-avoid-rideshare-scams-while-traveling</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-avoid-zelle-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-cancel-identityiq</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-contact-identityiq-customer-service</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-detect-and-respond-to-account-misuse</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-dispose-outdated-electronics-to-protect-your-identity</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-freeze-your-credit</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-get-an-ip-pin-for-your-child</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-get-your-credit-ready-for-a-credit-card-application</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-help-avoid-holiday-scams-this-season</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-help-avoid-tax-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-help-protect-a-deceased-loved-one-from-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-help-protect-adults-from-romance-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-help-protect-minor-children-from-synthetic-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-help-protect-your-digital-footprint</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-help-protect-your-identity-offline</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-help-protect-your-medical-records-from-cybercriminals</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-know-the-difference-between-the-deep-web-and-dark-web</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-not-get-scammed-buying-tickets</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-protect-my-business-from-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-protect-your-identity-during-tax-season-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-protect-your-identity-when-you-move-into-a-new-home</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-protect-your-mail-from-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-protect-yourself-from-airline-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-protect-yourself-from-investment-fraud</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-protect-yourself-from-rental-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-protect-yourself-from-the-latest-ai-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-read-your-identityiq-credit-report</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-replace-your-social-security-card</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-safely-share-vacation-photos-on-social-media-checklist</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-spot-a-debt-collection-scam</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-spot-a-fake-shopping-website-this-holiday-season</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-spot-an-email-phishing-attempt-at-work</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-spot-an-employment-scam</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-spot-common-venmo-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-spot-student-loan-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-to-use-parental-controls-to-protect-your-kids-on-social-media-and-online</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-virtual-card-numbers-make-online-shopping-safer</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/how-virtual-phone-numbers-can-help-protect-your-identity</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/id-theft-what-to-do-to-recover-your-identity-credit</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/identity-theft-monitoring</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/identity-theft-protection-for-military-members</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/identity-theft-victim-checklist</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/identityiq-launches-new-website</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/identityiq-review-is-identityiq-worth-it</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/identityiq-scam-report-ai-social-engineering</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/idiq-offers-military-discount-for-identityiq-credit-identity-theft-monitoring-services</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/improve-your-credit-score-with-utility-payment-reporting</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/instagram-accounts-at-risk-with-new-phishing-scam-using-false-2-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/is-a-debt-consolidation-loan-right-for-you</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/is-dark-web-monitoring-worth-it</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/is-identity-theft-a-felony</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/is-identity-theft-protection-tax-deductible</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/is-identity-theft-protection-worth-it</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/is-identityiq-a-scam</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/is-it-safe-to-do-a-dark-web-scan</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/is-it-safe-to-open-a-holiday-e-card</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/is-roblox-safe-for-kids</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/jake-case-study</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/juice-jacking-the-latest-cyber-threat-to-your-personal-information-and-devices</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/late-payments-on-credit-report</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/lifelock-data-breach-compromises-thousands-learn-how-to-help-protect-your-online-identity</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/looking-for-love-online-be-aware-of-scammers-and-fraud</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/looking-to-donate-to-charity-follow-these-best-practices-to-avoid-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/louie-case-study</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/macys-data-breach-exposed-customer-data-and-payment-info-to-hacker-syndicate</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/malware-attack-suspected-in-barnes-noble-data-breach</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/massive-marriott-data-breach-exposes-personal-information-of-up-to-500-million-guests</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/memorial-day-celebration-includes-25-of-credit-and-id-theft-protection-for-military-and-veterans</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/mobile-banking-security-tips</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/move-forward-with-a-financial-wellness-plan</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/my-information-is-for-sale-on-the-dark-web-what-should-i-do</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/new-ai-scams-to-look-out-for-in-2024</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/october-is-cybersecurity-awareness-month-here-are-4-cybersecurity-tips-to-keep-protected</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/organizations-and-businesses-face-500-increase-in-ransomware-attacks</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/payment-app-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/paypal-scams-guide-how-to-keep-yourself-safe</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/personal-loans</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/phishing-and-malware-attacks-most-common-techniques-for-credential-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/phishing-attacks-increasing</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/protect-against-identity-theft-and-voter-fraud</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/protect-your-personal-documents-to-avoid-medical-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/protect-yourself-and-your-children-from-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/protecting-your-kids-from-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/protecting-yourself-from-ai-voice-cloning-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/roblox-scams-what-parents-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/rockyou2024-10-billion-passwords-exposed</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/romance-scam-prevention-act</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/romance-scams-and-relationship-scams-whats-the-difference</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/safe-gaming-tips</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/sam-case-study</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/scam-school-bad-practices-on-social-media-could-put-your-identity-at-risk</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/scammers-use-ai-generated-voice-deepfake-to-steal-almost-250000-from-ceo</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/seven-reasons-to-pull-your-credit-report-right-now</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/should-i-report-identity-theft-to-the-police</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/should-you-always-use-a-vpn</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/should-you-pay-your-credit-card-statement-balance-or-current-balance</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/signs-your-phone-has-been-hacked</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/sim-swap-scams-how-thieves-can-use-your-phone-number-to-take-over-your-accounts</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/sim-swap-scams-how-to-protect-yourself</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/sim-swapping-attacks-on-the-rise-heres-how-to-keep-safe</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/smart-financial-moves-to-make-with-your-tax-refund</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/smart-tv-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/sms-database-leaves-millions-of-text-messages-with-personal-info-exposed</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/snap-benefit-scams-avoid-ebt-fraud</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/someone-filed-a-tax-return-in-my-name</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/spam-vs-phishing</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/spoofing-ai-voice-cloning-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/sprint-confirms-second-data-breach-of-customer-information-this-year</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/summary-itrc-consumer-impact-report</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/synthetic-identity-fraud-targets-children-in-a-long-con</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/tax-identity-theft-how-to-recover-your-return</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/tax-prep-checklist-what-you-need-to-file-your-taxes-and-help-prevent-tax-fraud</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/tax-preparer-fraud-how-to-choose-the-right-tax-preparer</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/tax-refund-advance-loans-scam</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/the-difference-between-revolving-credit-and-installment-credit</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/the-future-of-identity-verification</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/the-growing-threat-of-google-voice-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/the-importance-of-family-identity-theft-protection</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/the-origins-and-history-of-the-dark-web</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/the-pros-and-cons-of-automatic-bill-payments</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/the-rise-of-ai-social-engineering-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/the-social-threat-how-criminals-can-use-the-information-you-share-on-social-media</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/this-tax-season-beware-irs-phone-scams-that-target-taxpayers</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/tips-to-avoid-holiday-job-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/tips-to-help-avoid-internet-fraud</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/tips-to-keep-your-identity-safe-in-case-of-a-disaster</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/top-10-identityiq-blog-posts-of-2023</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/top-5-scams-to-watch-out-for-during-the-2024-holiday-season</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/top-7-data-security-practices-for-the-workplace</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/top-travel-scams-to-watch-out-for-how-to-avoid-them</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/traveler-identity-theft-protection</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/types-of-social-engineering-attacks</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/unpaid-toll-text-scam</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/utility-payment-reporting-new-year-goals</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/vantagescore-3</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/watch-out-for-scams-this-holiday-season</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/watch-out-for-this-google-calendar-phishing-scam</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-are-cookies-and-are-they-bad</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-are-nft-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-are-social-engineering-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-are-the-benefits-of-a-password-manager</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-are-the-risks-of-a-data-breach</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-do-i-do-if-my-social-security-card-is-stolen</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-do-you-need-to-do-when-your-employer-gets-hacked</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-happens-if-a-scammer-has-your-email-address</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-happens-if-you-give-someone-your-ip-address</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-happens-if-you-open-a-spam-email-on-your-phone</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-happens-to-your-credit-after-7-years</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-a-brushing-scam</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-a-dark-web-scan</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-a-fake-package-delivery-scam</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-a-gift-card-draining-scam</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-a-keylogger-and-what-does-keylogging-mean</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-a-passkey</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-a-vpn-and-how-does-it-work</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-clone-phishing-and-how-do-i-avoid-it</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-credential-stuffing</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-credit-report-monitoring-and-why-is-it-important</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-dark-web-monitoring</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-digital-identity</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-email-spoofing-definition-protection-tips</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-employment-identity-theft-and-how-can-it-happen</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-identity-theft-insurance</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-identity-theft-protection</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-malware</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-phishing-prevent-attacks-with-common-examples</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-phone-cloning</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-ransomware-and-how-does-it-work</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-shoulder-surfing</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-social-media-account-cloning</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-spear-phishing-and-how-to-avoid-it</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-synthetic-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-tor-and-how-does-onion-routing-work</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-is-two-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-to-do-if-my-email-is-found-on-the-dark-web</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-to-do-if-you-lose-your-license-and-how-to-get-a-replacement</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-to-do-if-your-phone-is-lost-or-stolen</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-to-do-if-youre-a-victim-of-a-hospital-data-breach</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-to-know-about-privacy-data</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-you-need-to-know-about-apples-namedrop-ios17-feature</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/what-you-should-know-about-pig-butchering-scams</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/who-can-check-your-credit-report</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/why-are-military-members-more-vulnerable-to-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/why-child-identity-theft-grows-during-tax-season</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/why-identity-theft-protection-is-an-important-employee-benefit</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/why-k-12-schools-are-prime-targets-for-cybercriminals</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/why-local-governments-are-vulnerable-to-ransomware-attacks</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/articles/working-from-home-make-sure-your-data-is-secure</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/author/albert-cervantes</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/author/brian-acton</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/author/hannah-love</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/author/holly-parker</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/author/kristin-hudson</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/author/melissa-whitten</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/author/randy-russell</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/author/tristini-tomlinson</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/downloads/10-best-secured-credit-cards</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/downloads/10-steps-to-get-your-loan</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/downloads/identityiq-fraud-trend-report-2024-2025</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/marketplace/best-credit-cards</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/marketplace/best-loans</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/marketplace/credit-building-tools</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/marketplace/financial-coaching-services</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/marketplace/products-to-protect-you</loc>
    </url>
    <url>
        <loc>https://www.identityiq.com/marketplace/tax-filing-services</loc>
    </url>
</urlset>