{"id":17162,"date":"2021-04-13T18:22:23","date_gmt":"2021-04-13T12:52:23","guid":{"rendered":"https:\/\/www.cyberdrip.com\/?p=17162"},"modified":"2021-04-13T18:22:23","modified_gmt":"2021-04-13T12:52:23","slug":"psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction","status":"publish","type":"post","link":"https:\/\/www.cyberdrip.com\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/","title":{"rendered":"Psychical Cyber Security risk of not destroying receipts after a bank transaction."},"content":{"rendered":"<p align=\"justify\">Cyber security is not just an unauthorized access to bank account, financial information or healthcare information available online but also the information which can identify and capable of giving access to an account. After a transaction, some bank transaction receipt provide sufficient enough information for an unauthorized access if the receipt has taken by an hacker after throwing away once a transaction has been completed. To better understand physical Cyber Security risk and how to avoid such risk, we have to understand the basic potential methods of avoid giving access to identifiable information.<\/p>\n<p align=\"justify\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-17183 aligncenter\" src=\"http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2021\/04\/bank-transaction-1.jpg\" alt=\"\" width=\"186\" height=\"346\" srcset=\"https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2021\/04\/bank-transaction-1.jpg 1283w, https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2021\/04\/bank-transaction-1-161x300.jpg 161w, https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2021\/04\/bank-transaction-1-551x1024.jpg 551w, https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2021\/04\/bank-transaction-1-768x1428.jpg 768w, https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2021\/04\/bank-transaction-1-826x1536.jpg 826w, https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2021\/04\/bank-transaction-1-1101x2048.jpg 1101w\" sizes=\"(max-width: 186px) 100vw, 186px\" \/><\/p>\n<p align=\"justify\">Phone Number, Account Number, Full Name, Identification Card information which provide on some banks or bills will give access to sufficient enough information to unauthorized access to financial, healthcare, legal, and even possibility of transfer illegal transaction to the account and access after the transaction which has successfully transferred money illegally on to your account or business account and gain access to re-transfer money from the your bank account bitcoin or possible another bank account to be invisible and misrepresent as you have done a transaction illegally which will lead you to potential legal action or even law suit.<\/p>\n<p align=\"justify\">This is why, all industry workers required to understand the benefit of Cyber Security Awareness Training and basic methods to safeguard information and if the information has be compromised, how to recover, or avoid such risk in the future. Digital information we process through freely available WIFI,would be also at risk if an hacker access to information transfer through the WIFI router since all use same password. This is common in Universities, schools, and favorite coffee shop, airports, hotels, or any place which will give access to internet for free without a unique password.<\/p>\n<p align=\"justify\">As the basics security measure, always recommend to keep the receipt with you till get home and burn it or use a paper cutting machine, a scissor or a pen to erase information before throwing away. Even in most banks have given a trash to throw away the receipt after the transaction is completed but please do not throw away at the bank to avoid the risk. Also not recommend to keep a digital copy of the receipt as a picture on a device which have access through internet such as mobile device, or personal computer. Change password at least every 30 days if possible on all accounts or frequently to avoid access to the accounts if the passwords has been compromised.<\/p>\n<p align=\"justify\"><img decoding=\"async\" class=\"alignnone size-full wp-image-17167\" src=\"http:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2021\/04\/the-blowup-EvNZeUNhZW4-unsplash-cyberdrip-1.jpg\" alt=\"\" width=\"1200\" height=\"901\" srcset=\"https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2021\/04\/the-blowup-EvNZeUNhZW4-unsplash-cyberdrip-1.jpg 1200w, https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2021\/04\/the-blowup-EvNZeUNhZW4-unsplash-cyberdrip-1-300x225.jpg 300w, https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2021\/04\/the-blowup-EvNZeUNhZW4-unsplash-cyberdrip-1-1024x769.jpg 1024w, https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2021\/04\/the-blowup-EvNZeUNhZW4-unsplash-cyberdrip-1-768x577.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p align=\"justify\">As a secured method, highly recommend to check surrounded cameras when entering password or pass code before access via mobile device or laptop at open area or outdoor since it\u2019s possible for an unauthorized personal to monitor through the surveillance cameras remotely and harvest information. If you believe that you have done any given potential risks, highly recommend to change the password. To become a Cyber Security warrior introduce us to your business or organization employees. Download free e-book <a href=\"https:\/\/cyberdrip.wasmer.app\/freepdf\/Cybersecurity_Awareness_Training-cyberdrip.pdf\">here<\/a>. Start the service now, and pay us later. <a href=\"https:\/\/cyberdrip.wasmer.app\/subscription-plans\/\" target=\"_blank\" rel=\"noopener\">Click here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security is not just an unauthorized access to bank account, financial information or healthcare information available online but also the information which can identify and capable of giving access to an account. After a transaction, some bank transaction receipt provide sufficient enough information for an unauthorized access if the receipt has taken by an&hellip;&nbsp;<\/p>\n","protected":false},"author":2,"featured_media":17163,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[5],"tags":[88,89,90,4,20,18,19,91,69,72,26,23,46],"class_list":["post-17162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-training","tag-bank_customer_information_security","tag-bank_cyber_security","tag-bank_information_security","tag-cyberdrip","tag-cybersecurity-training","tag-cyber_security","tag-cyber_security_awareness","tag-cyber_security_warrior","tag-free_cyber_security_awareness","tag-internet_security","tag-security_tips","tag-security_training","tag-why_cybersecurity_awareness"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Psychical Cyber Security risk of not destroying receipts -Cyberdrip Security<\/title>\n<meta name=\"description\" content=\"Cyber security is not just an unauthorized access to bank account, financial information or healthcare information available online. Read...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberdrip.wasmer.app\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Psychical Cyber Security risk of not destroying receipts -Cyberdrip Security\" \/>\n<meta property=\"og:description\" content=\"Cyber security is not just an unauthorized access to bank account, financial information or healthcare information available online. Read...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberdrip.wasmer.app\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/\" \/>\n<meta property=\"og:site_name\" content=\"cyberdrip Technology Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-13T12:52:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2021\/04\/austin-distel-uPK2TbJlvMQ-unsplash-cyberdrip-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tharindu Adikari\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tharindu Adikari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/index.php\\\/2021\\\/04\\\/13\\\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/index.php\\\/2021\\\/04\\\/13\\\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\\\/\"},\"author\":{\"name\":\"Tharindu Adikari\",\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/#\\\/schema\\\/person\\\/9f602c06be45b273fb71632075aab30a\"},\"headline\":\"Psychical Cyber Security risk of not destroying receipts after a bank transaction.\",\"datePublished\":\"2021-04-13T12:52:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/index.php\\\/2021\\\/04\\\/13\\\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\\\/\"},\"wordCount\":511,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/index.php\\\/2021\\\/04\\\/13\\\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberdrip.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/austin-distel-uPK2TbJlvMQ-unsplash-cyberdrip-1.jpg\",\"keywords\":[\"bank_customer_information_security\",\"bank_cyber_security\",\"bank_information_security\",\"cyberdrip\",\"cybersecurity training\",\"cyber_security\",\"cyber_security_awareness\",\"cyber_security_warrior\",\"free_cyber_security_awareness\",\"internet_security\",\"security_tips\",\"security_training\",\"why_cybersecurity_awareness\"],\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cyberdrip.wasmer.app\\\/index.php\\\/2021\\\/04\\\/13\\\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/index.php\\\/2021\\\/04\\\/13\\\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\\\/\",\"url\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/index.php\\\/2021\\\/04\\\/13\\\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\\\/\",\"name\":\"Psychical Cyber Security risk of not destroying receipts -Cyberdrip Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/index.php\\\/2021\\\/04\\\/13\\\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/index.php\\\/2021\\\/04\\\/13\\\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberdrip.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/austin-distel-uPK2TbJlvMQ-unsplash-cyberdrip-1.jpg\",\"datePublished\":\"2021-04-13T12:52:23+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/#\\\/schema\\\/person\\\/9f602c06be45b273fb71632075aab30a\"},\"description\":\"Cyber security is not just an unauthorized access to bank account, financial information or healthcare information available online. Read...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/index.php\\\/2021\\\/04\\\/13\\\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberdrip.wasmer.app\\\/index.php\\\/2021\\\/04\\\/13\\\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/index.php\\\/2021\\\/04\\\/13\\\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberdrip.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/austin-distel-uPK2TbJlvMQ-unsplash-cyberdrip-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cyberdrip.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/austin-distel-uPK2TbJlvMQ-unsplash-cyberdrip-1.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/index.php\\\/2021\\\/04\\\/13\\\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Psychical Cyber Security risk of not destroying receipts after a bank transaction.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/#website\",\"url\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/\",\"name\":\"cyberdrip Technology Solutions\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/#\\\/schema\\\/person\\\/9f602c06be45b273fb71632075aab30a\",\"name\":\"Tharindu Adikari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b1d1fe397c02c4c77a8c7607bbed45fee24a419bf57e5b866ab51b47ea07761?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b1d1fe397c02c4c77a8c7607bbed45fee24a419bf57e5b866ab51b47ea07761?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b1d1fe397c02c4c77a8c7607bbed45fee24a419bf57e5b866ab51b47ea07761?s=96&d=mm&r=g\",\"caption\":\"Tharindu Adikari\"},\"url\":\"https:\\\/\\\/www.cyberdrip.com\\\/index.php\\\/author\\\/adi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Psychical Cyber Security risk of not destroying receipts -Cyberdrip Security","description":"Cyber security is not just an unauthorized access to bank account, financial information or healthcare information available online. Read...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberdrip.wasmer.app\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/","og_locale":"en_US","og_type":"article","og_title":"Psychical Cyber Security risk of not destroying receipts -Cyberdrip Security","og_description":"Cyber security is not just an unauthorized access to bank account, financial information or healthcare information available online. Read...","og_url":"https:\/\/cyberdrip.wasmer.app\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/","og_site_name":"cyberdrip Technology Solutions","article_published_time":"2021-04-13T12:52:23+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/cyberdrip.wasmer.app\/wp-content\/uploads\/2021\/04\/austin-distel-uPK2TbJlvMQ-unsplash-cyberdrip-1.jpg","type":"image\/jpeg"}],"author":"Tharindu Adikari","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tharindu Adikari","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberdrip.wasmer.app\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/#article","isPartOf":{"@id":"https:\/\/cyberdrip.wasmer.app\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/"},"author":{"name":"Tharindu Adikari","@id":"https:\/\/cyberdrip.wasmer.app\/#\/schema\/person\/9f602c06be45b273fb71632075aab30a"},"headline":"Psychical Cyber Security risk of not destroying receipts after a bank transaction.","datePublished":"2021-04-13T12:52:23+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberdrip.wasmer.app\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/"},"wordCount":511,"commentCount":0,"image":{"@id":"https:\/\/cyberdrip.wasmer.app\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2021\/04\/austin-distel-uPK2TbJlvMQ-unsplash-cyberdrip-1.jpg","keywords":["bank_customer_information_security","bank_cyber_security","bank_information_security","cyberdrip","cybersecurity training","cyber_security","cyber_security_awareness","cyber_security_warrior","free_cyber_security_awareness","internet_security","security_tips","security_training","why_cybersecurity_awareness"],"articleSection":["cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cyberdrip.wasmer.app\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cyberdrip.wasmer.app\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/","url":"https:\/\/cyberdrip.wasmer.app\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/","name":"Psychical Cyber Security risk of not destroying receipts -Cyberdrip Security","isPartOf":{"@id":"https:\/\/cyberdrip.wasmer.app\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberdrip.wasmer.app\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/#primaryimage"},"image":{"@id":"https:\/\/cyberdrip.wasmer.app\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2021\/04\/austin-distel-uPK2TbJlvMQ-unsplash-cyberdrip-1.jpg","datePublished":"2021-04-13T12:52:23+00:00","author":{"@id":"https:\/\/cyberdrip.wasmer.app\/#\/schema\/person\/9f602c06be45b273fb71632075aab30a"},"description":"Cyber security is not just an unauthorized access to bank account, financial information or healthcare information available online. Read...","breadcrumb":{"@id":"https:\/\/cyberdrip.wasmer.app\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberdrip.wasmer.app\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberdrip.wasmer.app\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/#primaryimage","url":"https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2021\/04\/austin-distel-uPK2TbJlvMQ-unsplash-cyberdrip-1.jpg","contentUrl":"https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2021\/04\/austin-distel-uPK2TbJlvMQ-unsplash-cyberdrip-1.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/cyberdrip.wasmer.app\/index.php\/2021\/04\/13\/psychical-cyber-security-risk-of-not-destroying-receipts-after-a-bank-transaction\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberdrip.wasmer.app\/"},{"@type":"ListItem","position":2,"name":"Psychical Cyber Security risk of not destroying receipts after a bank transaction."}]},{"@type":"WebSite","@id":"https:\/\/cyberdrip.wasmer.app\/#website","url":"https:\/\/cyberdrip.wasmer.app\/","name":"cyberdrip Technology Solutions","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberdrip.wasmer.app\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cyberdrip.wasmer.app\/#\/schema\/person\/9f602c06be45b273fb71632075aab30a","name":"Tharindu Adikari","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b1d1fe397c02c4c77a8c7607bbed45fee24a419bf57e5b866ab51b47ea07761?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b1d1fe397c02c4c77a8c7607bbed45fee24a419bf57e5b866ab51b47ea07761?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b1d1fe397c02c4c77a8c7607bbed45fee24a419bf57e5b866ab51b47ea07761?s=96&d=mm&r=g","caption":"Tharindu Adikari"},"url":"https:\/\/www.cyberdrip.com\/index.php\/author\/adi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/posts\/17162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/comments?post=17162"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/posts\/17162\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/media\/17163"}],"wp:attachment":[{"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/media?parent=17162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/categories?post=17162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/tags?post=17162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}