{"id":17829,"date":"2024-11-04T10:00:51","date_gmt":"2024-11-04T15:00:51","guid":{"rendered":"https:\/\/www.netreputation.com\/?p=17829"},"modified":"2025-08-12T14:47:50","modified_gmt":"2025-08-12T18:47:50","slug":"online-extortion-what-it-is-and-how-to-protect-yourself","status":"publish","type":"post","link":"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/","title":{"rendered":"Online Extortion: What It Is and How To Protect Yourself"},"content":{"rendered":"<p><strong><em>This article discusses online extortion strategies and how to keep yourself safe from cybercriminals.<\/em><\/strong><\/p>\n<p>Today, there are all types of cybercrimes, including cyberstalking hacking, identity theft, phishing and more. The list also includes cyber extortion, which is sometimes referred to as online blackmail.<\/p>\n<p>Practically anyone can become a victim of cyber extortion. The good news is that there are ways to protect yourself and prevent this from happening in the first place.<\/p>\n<p>And if the worst happens, there are ways to get through it and rebuild your online reputation in the aftermath.<\/p>\n<p>Let\u2019s get into it. To speak with an online reputation expert immediately, give us a call at <a class=\"cta_phone\" href=\"tel:8444613632\">844-461-3632<\/a> for a free consultation.<\/p>\n<h2>What Is Online Extortion?<\/h2>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-17834\" src=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/Card-Online-Extortion.jpeg\" alt=\"A person using a laptop holds a credit card, hinting at online shopping or payment. Despite the sunlight coming through a window and illuminating the wooden table, an air of caution lingers, as concerns about online extortion can overshadow this seemingly simple transaction.\" width=\"800\" height=\"450\" srcset=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/Card-Online-Extortion.jpeg 800w, https:\/\/www.netreputation.com\/wp-content\/uploads\/Card-Online-Extortion-300x169.jpeg 300w, https:\/\/www.netreputation.com\/wp-content\/uploads\/Card-Online-Extortion-768x432.jpeg 768w, https:\/\/www.netreputation.com\/wp-content\/uploads\/Card-Online-Extortion-535x300.jpeg 535w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Cyber extortion is when cyber criminals threaten to expose a person\u2019s sensitive information, including images and videos, unless the victim meets the cyber extortionists\u2019 demands.<\/p>\n<p>Sometimes, the cyber extortionist will actually have the information they claim to have. Other times, it\u2019s a bluff to get you to comply even though they don\u2019t have anything to back up their claims.<\/p>\n<p>For example, a cyber extortionist may insist on a large money transfer, or else your bank account information will go public. Other threats may include:<\/p>\n<ul>\n<li>Damage to personal property, including online and physical assets<\/li>\n<li>Releasing private information that can ruin a person\u2019s reputation<\/li>\n<li>Violent acts against loved ones<\/li>\n<\/ul>\n<p>The only difference between offline blackmail and online blackmail is that cyber blackmail takes place in a digital space. However, it will still cause serious, real-world damage to the victim.<\/p>\n<p>One of the most insidious aspects of cyber extortion is that information can spread much more quickly than in the offline world. <strong>An online blackmail event can become public knowledge fast.<\/strong> Plus, cyber extortionists are able to spread the victim\u2019s personal information around quickly since everything takes place online.<\/p>\n<p>More often than not, the cyber extortionist is someone who\u2019s well-versed in digital technology and hacking. They\u2019ll be able to get around online security infrastructures quickly, leaving you vulnerable to whatever they\u2019re in the mood to do.<\/p>\n<h2>What To Do If You\u2019re the Victim of Online Blackmail<\/h2>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-17835\" src=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/ENVELOPE-Online-Extortion.jpeg\" alt=\"A laptop displaying an email icon with a red envelope on the screen sits on a wooden desk alongside a white cup and saucer, with a smartphone nearby. The scene is well-lit, suggesting a modern, cozy workspace, yet hints at online extortion lurking within the digital world.\" width=\"800\" height=\"600\" srcset=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/ENVELOPE-Online-Extortion.jpeg 800w, https:\/\/www.netreputation.com\/wp-content\/uploads\/ENVELOPE-Online-Extortion-300x225.jpeg 300w, https:\/\/www.netreputation.com\/wp-content\/uploads\/ENVELOPE-Online-Extortion-768x576.jpeg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>If you\u2019re the victim of cyber extortion, it can be nearly impossible to think clearly. Staying calm and making thoughtful decisions is extremely difficult.<\/p>\n<p>Unfortunately, that\u2019s exactly what cyber criminals count on when they contact you. They expect you to act fast and make rash decisions because you\u2019re so concerned with the potential outcome if you don\u2019t comply right away.<\/p>\n<p>The best approach is to slow down, think clearly and follow these steps. After all, so much of what cyber attackers say is false, and they use clever tactics to keep you from making wise decisions.<\/p>\n<h3>Do Not Engage With Cyber Criminals<\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-17836\" src=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/CRIMINAL-Online-Extortion.jpeg\" alt=\"A hooded figure sits at a computer in a dark room. The monitor displays a large padlock icon surrounded by digital graphics, hinting at themes of cybersecurity and online extortion. Yellow light frames are visible in the background, casting an ominous glow.\" width=\"800\" height=\"414\" srcset=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/CRIMINAL-Online-Extortion.jpeg 800w, https:\/\/www.netreputation.com\/wp-content\/uploads\/CRIMINAL-Online-Extortion-300x155.jpeg 300w, https:\/\/www.netreputation.com\/wp-content\/uploads\/CRIMINAL-Online-Extortion-768x397.jpeg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Whatever you do, do not continue communicating with the blackmailer.<\/p>\n<p>Every single interaction you have with them gives them a bit more power, control and information to use against you. You\u2019ll essentially prove to the blackmailer that you can be exploited and manipulated.<\/p>\n<p>The more contact you have with them, the more likely it is that your engagement will escalate and worsen.<\/p>\n<p>By stopping all communication, you reduce the amount of contact you have with the blackmailer. And even if that doesn\u2019t solve the problem entirely, it gives you some time to think about your next steps.<\/p>\n<p>This doesn&#8217;t mean you&#8217;re going to ignore the situation, just that you&#8217;ll discontinue speaking with the attacker while you work on solving the problem.<\/p>\n<h3>Keep a Record of All Communication<\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-17837\" src=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/CUT-Online-Extortion.jpeg\" alt=\"Illustration of a laptop with an image and text editor on the screen. A photo of mountains with a sun is being edited, surrounded by an outline. Scissors and a selection box indicate a cropping action. The gray background hints at online extortion themes, adding a sense of intrigue.\" width=\"800\" height=\"640\" srcset=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/CUT-Online-Extortion.jpeg 800w, https:\/\/www.netreputation.com\/wp-content\/uploads\/CUT-Online-Extortion-300x240.jpeg 300w, https:\/\/www.netreputation.com\/wp-content\/uploads\/CUT-Online-Extortion-768x614.jpeg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Next, you need to gather, save and catalog any and all contact you\u2019ve had with the blackmailer. Every single bit of proof will count in a cyber extortion case. Nothing is too small to keep, so don&#8217;t assume that something is unimportant and won&#8217;t be of help.<\/p>\n<p>Take screenshots of all interactions with the blackmailer, including emails, text messages, and any other modes of communication.<\/p>\n<p>Additionally, highlight any personal information that was mentioned during the exchanges. That includes information about the criminal and about you.<\/p>\n<p>For example, if the cyber criminal alluded to a <a href=\"https:\/\/www.netreputation.com\/boost-social-media-reach-strategies\/\" target=\"_blank\" rel=\"noopener\" data-wpil-monitor-id=\"256\">social media<\/a> platform they\u2019re on or a screen name they use, highlight it. This can help the authorities figure out where this individual spends their time online and who they are.<\/p>\n<p>Similarly, if they mention personal information about you, like your email address or banking information, highlight it in your documentation. This can provide insight into where and how they attained your sensitive information.<\/p>\n<h3>Report the Incident<\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-17838\" src=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/POLICE-Online-Extortion.jpeg\" alt=\"A person in a uniform sits at a desk surrounded by multiple monitors displaying maps and data, vigilantly monitoring for signs of online extortion. Several large screens are mounted on the wall showing similar information. Other people work at desks in the background, ensuring digital security.\" width=\"800\" height=\"448\" srcset=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/POLICE-Online-Extortion.jpeg 800w, https:\/\/www.netreputation.com\/wp-content\/uploads\/POLICE-Online-Extortion-300x168.jpeg 300w, https:\/\/www.netreputation.com\/wp-content\/uploads\/POLICE-Online-Extortion-768x430.jpeg 768w, https:\/\/www.netreputation.com\/wp-content\/uploads\/POLICE-Online-Extortion-535x300.jpeg 535w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Once you\u2019ve built a file of evidence, cyber extortion attacks should always be reported to the authorities. Start by calling your local police department. They may be able to help you, or they&#8217;ll point you to the right contact to report your case.<\/p>\n<p>Most law enforcement agencies have a process that they follow in a cyber blackmail case. You\u2019ll likely have to fill out a form with your personal info and submit it along with your evidence.<\/p>\n<h3>Prevent Future Cyber Extortion Attacks<\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-17839\" src=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/PASSWORD-Online-Extortion.jpeg\" alt=\"A person in a blue shirt holds a smartphone, cautiously inputting login credentials. A digital overlay shows username, password fields, and a padlock icon, symbolizing a secure defense against online extortion attempts.\" width=\"800\" height=\"332\" srcset=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/PASSWORD-Online-Extortion.jpeg 800w, https:\/\/www.netreputation.com\/wp-content\/uploads\/PASSWORD-Online-Extortion-300x125.jpeg 300w, https:\/\/www.netreputation.com\/wp-content\/uploads\/PASSWORD-Online-Extortion-768x319.jpeg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>In the next section, we\u2019ll discuss keeping yourself safe from digital blackmail occurring again. Prevention methods include:<\/p>\n<ul>\n<li>Improving your online security<\/li>\n<li>Adjusting <a href=\"https:\/\/www.netreputation.com\/online-reputation-vs-privacy\/\" data-wpil-monitor-id=\"253\">online privacy<\/a> settings<\/li>\n<li>Spotting common blackmail tactics early<\/li>\n<li>Removing your personal info from online sites<\/li>\n<\/ul>\n<p>When you know how to protect against and recognize targeted attacks like <a href=\"https:\/\/www.netreputation.com\/how-to-stop-junk-mail\/\" data-wpil-monitor-id=\"255\">phishing emails<\/a>, malicious software and ransomware attacks, among other threats, it\u2019s easier to not fall victim to them.<\/p>\n<h2>How To Prevent Cyber Extortion Attacks<\/h2>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-17840\" src=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/SCARED-Online-Extortion.jpeg\" alt=\"A woman with long dark hair and glasses sits at a desk, looking intently at a laptop screen. Open notebooks are on the desk in front of her. The background shows a modern office with glass walls and shelves, as she delves into a report on online extortion.\" width=\"800\" height=\"533\" srcset=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/SCARED-Online-Extortion.jpeg 800w, https:\/\/www.netreputation.com\/wp-content\/uploads\/SCARED-Online-Extortion-300x200.jpeg 300w, https:\/\/www.netreputation.com\/wp-content\/uploads\/SCARED-Online-Extortion-768x512.jpeg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>It\u2019s always better to prevent scams or threats from happening in the first place than to try to rebound when one occurs. Here are the best ways to keep online threats at bay.<\/p>\n<h3>Improve Your Online Security<\/h3>\n<p>The most effective way to prevent online threats is to tighten up your online security. Here are a few ways to be more secure online:<\/p>\n<ul>\n<li>Create strong passwords that are difficult to guess.<\/li>\n<li>Change your passwords regularly.<\/li>\n<li>Never use the same password twice. Create a unique password for every account you have to log in to.<\/li>\n<li>Set up two-factor authentication. After signing in, you\u2019ll be prompted to enter a code that\u2019s texted or emailed to you for an extra layer of safety.<\/li>\n<li>Make sure your apps and software are always up to date.<\/li>\n<\/ul>\n<p>Limiting how much information others can find out about you and access means that hackers will move on to someone who has less stringent security.<\/p>\n<h3>Be Purposeful About Your Social Media Use<\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-17841\" src=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/SOCIAL-Online-Extortion.jpeg\" alt=\"A person with pink nail polish casually scrolls through their social media feed, the smartphone's glow highlighting a series of images and text posts. Standing on a concrete surface, their shadow stretches out, unaware of potential online extortion lurking in the digital shadows.\" width=\"800\" height=\"533\" srcset=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/SOCIAL-Online-Extortion.jpeg 800w, https:\/\/www.netreputation.com\/wp-content\/uploads\/SOCIAL-Online-Extortion-300x200.jpeg 300w, https:\/\/www.netreputation.com\/wp-content\/uploads\/SOCIAL-Online-Extortion-768x512.jpeg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Many people fall victim to cyber extortion because someone accessed their personal information. Sensitive data is the best tool that criminals have to use against you.<\/p>\n<p>Social media is an excellent platform for researching individuals. The more you share on social media, the more data there is for hackers to gather and use against you.<\/p>\n<p>Here are a few ways to stay safer on social media:<\/p>\n<ul>\n<li>Set your profile to private. This will make it much more difficult for hackers and people you don\u2019t know to see your content.<\/li>\n<li>Don\u2019t connect with people who you don\u2019t know.<\/li>\n<li>Limit the amount of information you share on social media. This includes what you post to your feed and the conversations you have on DM.<\/li>\n<\/ul>\n<p>Keep in mind that even if you\u2019ve connected with someone elsewhere online, like a dating site or another social platform, they may not be 100% safe. To prevent cyber extortion, keep your private information to yourself when using online platforms.<\/p>\n<h3>Remove Your Information From Data Broker Sites<\/h3>\n<p>Data broker sites and people search websites gather all sorts of private information about individuals and make it accessible in searchable online directories. Having so much information about you online makes it easy for hackers to access it.<\/p>\n<p>You&#8217;d be shocked at how much <a href=\"https:\/\/www.netreputation.com\/data-protection-with-privacy-lock\/\"  data-wpil-monitor-id=\"426\">data can be found about you online<\/a>. In addition to your contact information, you can find private info related to your bank accounts, <a href=\"https:\/\/www.netreputation.com\/real-estate-reputation-management\/\"  data-wpil-monitor-id=\"707\">real estate<\/a>, family members, criminal history, and so much more.<\/p>\n<p>It\u2019s always best to remove your information from all of the <a href=\"https:\/\/www.internetreputation.com\/find-mugshots-online\/\" target=\"_blank\" rel=\"noopener\">data broker sites<\/a> it\u2019s listed on. This can be a time-consuming and frustrating process, though.<\/p>\n<p>First, you\u2019ll need to find where your information is listed. Then, you&#8217;ll have to remove your data from each site one by one. Some sites have secretive removal methods, and they may not even follow through with removal in the end. You\u2019ll also need to ensure your info doesn\u2019t reappear on those sites, which is common.<\/p>\n<p>Instead of handling this yourself, you can hire a <a href=\"https:\/\/www.netreputation.com\/content-removal\/\" target=\"_blank\" rel=\"noopener\" data-wpil-monitor-id=\"254\">content removal<\/a> team to do it for you. <strong>Speak with one of our data removal specialists today at <a class=\"cta_phone\" href=\"tel:8444613632\">844-461-3632<\/a> to learn about our services.<\/strong><\/p>\n<h3>Recognize Common Cyber Extortion Scams<\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-17842\" src=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/MONEY-Online-Extortion.jpeg\" alt=\"A hand holding a key hovers over a laptop screen displaying a red padlock, while another hand extends cash toward the laptop. This image symbolizes online extortion, highlighting the sinister concept of a ransomware transaction or digital security breach.\" width=\"800\" height=\"565\" srcset=\"https:\/\/www.netreputation.com\/wp-content\/uploads\/MONEY-Online-Extortion.jpeg 800w, https:\/\/www.netreputation.com\/wp-content\/uploads\/MONEY-Online-Extortion-300x212.jpeg 300w, https:\/\/www.netreputation.com\/wp-content\/uploads\/MONEY-Online-Extortion-768x542.jpeg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>It\u2019s important to know what to watch out for so you can prevent a blackmail threat. If you don\u2019t know about basic blackmail scams, it\u2019s much easier to believe what hackers say and give in to their demands without thinking twice.<\/p>\n<p>Below are examples of a few types of digital blackmail scams that are far too common.<\/p>\n<p>In many cases, the hackers are lying about the information they have. Commonly, it\u2019s all a lie intended to scare the victim and get them to act fast without doing any research first.<\/p>\n<h4>Example 1: Sextortion<\/h4>\n<p>The attacker sends the victim an email that says malware has been installed on an adult website and the victim\u2019s password has been stolen. The attacker says that the victim has been recorded via a webcam while using the adult website. To keep the video of the victim private, the attacker demands a large amount of Bitcoin or money. If the victim does not pay the attacker on time, the threat is that the video will be shared with all of the victim\u2019s online contacts.<\/p>\n<h4>Example 2: Tax Evasion Threat<\/h4>\n<p>The attacker sends an email to the victim that says their computer was hacked. The attacker says that documents were found that show the victim has hidden information from the IRS. In order to keep the documents from being released, the attacker demands money. Sometimes, the attacker will also threaten to infect the victim\u2019s computer with ransomware if they don\u2019t comply.<\/p>\n<p>A similar threat is when the attacker poses as an IRS agent. They say that you have to pay a certain amount of money to avoid legal trouble.<\/p>\n<h4>Example 3: DDoS Attack Threat<\/h4>\n<p>An attacker contacts a small business owner and says they\u2019ll launch a large-scale DDoS attack if they don\u2019t comply with their demands. Sometimes, a small, short-term DDoS attack is launched to convince the victim that the threat is serious (even though it\u2019s typically not).<\/p>\n<p>DDoS stands for \u201cDistributed Denial-of-Service.\u201d This type of attack sends so much traffic to a website that it becomes inaccessible to anyone else. This can cause financial and reputational losses for the website owner.<\/p>\n<h2>Protect Yourself From Cyber Extortion and Damage To Your Online Reputation<\/h2>\n<p>Anybody can fall victim to cyber extortion. At best, dealing with an online scammer can be annoying and time-consuming. In the worst-case scenario, cyber criminals can expose your sensitive information or attack your business, ruining your digital reputation.<\/p>\n<p>If you\u2019ve been the victim of digital blackmail and you need to rebuild your personal or brand reputation as a result, our <a href=\"https:\/\/www.netreputation.com\/what-is-reputation-management\/\" target=\"_blank\" rel=\"noopener\" data-wpil-monitor-id=\"252\">online reputation management<\/a> (ORM) team can help.<\/p>\n<p><strong>Contact us today at <a class=\"cta_phone\" href=\"tel:8444613632\">844-461-3632<\/a> or by filling out the form below for a free consultation.<\/strong><\/p>\n\t\t\n\t<!-- form -->\n\t<div class=\"netRepForm 888888\">\n\t\t<h3 style=\"margin: 0 0 20px;color:#37935C;text-align:center;\">Request a Free Consultation<\/h3>\t\n\n\t<script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\nvar gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),document.addEventListener(\"gform\/theme\/scripts_loaded\",function(){gform.themeScriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>\"function\"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn(\"The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1.\"),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener(\"gform_main_scripts_loaded\",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener(\"gform\/theme\/scripts_loaded\",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener(\"DOMContentLoaded\",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook(\"action\",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook(\"filter\",o,r,e,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,r){gform.removeHook(\"action\",o,r)},removeFilter:function(o,r,e){gform.removeHook(\"filter\",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+\"_\"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==r?t.apply(null,e):e[0]=t.apply(null,e)})),\"filter\"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}});\n\/* ]]> *\/\n<\/script>\n\n                <div class='gf_browser_unknown gform_wrapper gform_legacy_markup_wrapper gform-theme--no-framework contact_gform_wrapper post_gform_wrapper' data-form-theme='legacy' data-form-index='0' id='gform_wrapper_14' ><form method='post' enctype='multipart\/form-data' target='gform_ajax_frame_14' id='gform_14' class='contact_gform post_gform' action='\/wp-json\/wp\/v2\/posts\/17829' data-formid='14' novalidate>\t\t\t\t\t<div style=\"display: none !important;\" class=\"akismet-fields-container gf_invisible\" data-prefix=\"ak_\">\n\t\t\t\t\t\t<label>&#916;<textarea name=\"ak_hp_textarea\" cols=\"45\" rows=\"8\" maxlength=\"100\"><\/textarea><\/label>\n\t\t\t\t\t\t<input type=\"hidden\" id=\"ak_js_1\" name=\"ak_js\" value=\"149\" \/>\n\t\t\t\t\t\t<script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\ndocument.getElementById( \"ak_js_1\" ).setAttribute( \"value\", ( new Date() ).getTime() );\n\/* ]]> *\/\n<\/script>\n\n\t\t\t\t\t<\/div>\n                        <div class='gform-body gform_body'><ul id='gform_fields_14' class='gform_fields top_label form_sublabel_below description_below validation_below'><li id=\"field_14_48\" class=\"gfield gfield--type-honeypot gform_validation_container field_sublabel_below gfield--has-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_14_48'>Comments<\/label><div class='ginput_container'><input name='input_48' id='input_14_48' type='text' value='' autocomplete='new-password'\/><\/div><div class='gfield_description' id='gfield_description_14_48'>This field is for validation purposes and should be left unchanged.<\/div><\/li><li id=\"field_14_40\" class=\"gfield gfield--type-name gfield--input-type-name gfield--width-full gfield_contains_required field_sublabel_hidden_label gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible gname_wrap\"  data-field-class=\"gname_wrap\" ><label class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_14_40'>\n                            \n                            <span id='input_14_40_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_40.3' id='input_14_40_3' value=''   aria-required='true'   placeholder='First Name*'  \/>\n                                                    <label for='input_14_40_3' class='gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text'>First Name<\/label>\n                                                <\/span>\n                            \n                            <span id='input_14_40_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_40.6' id='input_14_40_6' value=''   aria-required='true'   placeholder='Last Name*'  \/>\n                                                    <label for='input_14_40_6' class='gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text'>Last Name<\/label>\n                                                <\/span>\n                            \n                        <\/div><\/li><li id=\"field_14_4\" class=\"gfield gfield--type-email gfield--input-type-email gfield--width-full gf_left_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_14_4'>Email<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_4' id='input_14_4' type='email' value='' class='medium'   placeholder='Email Address*' aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/li><li id=\"field_14_3\" class=\"gfield gfield--type-phone gfield--input-type-phone gf_right_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_14_3'>Phone<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_phone'><input name='input_3' id='input_14_3' type='tel' value='' class='medium'  placeholder='Phone Number*' aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/li><li id=\"field_14_5\" class=\"gfield gfield--type-textarea gfield--input-type-textarea aqua-textarea field_sublabel_below gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_14_5'>Message<\/label><div class='ginput_container ginput_container_textarea'><textarea name='input_5' id='input_14_5' class='textarea medium'    placeholder='Message'  aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/li><li id=\"field_14_41\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gfield--width-full gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_41' id='input_14_41' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='' \/><\/div><\/li><li id=\"field_14_42\" class=\"gfield gfield--type-html gfield--input-type-html gfield--width-full concentText gfield_html gfield_html_formatted gfield_no_follows_desc field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  >By Submitting you agree to our <b><a target=\"_blank\" href=\"https:\/\/www.netreputation.com\/terms-of-service\/\">Terms of Service<\/a><\/b> and <b><a target=\"_blank\" href=\"https:\/\/www.netreputation.com\/privacy-policy\/\">Privacy Policy<\/a><\/b><\/li><li id=\"field_14_6\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden all_traffic_sources\" id=\"all_traffic_sources\" name=\"input_6\"><\/li><li id=\"field_14_8\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden city\" id=\"city\" name=\"input_8\"><\/li><li id=\"field_14_9\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden country\" id=\"country\" name=\"input_9\"><\/li><li id=\"field_14_10\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden fc_campaign\" id=\"fc_campaign\" name=\"input_10\"><\/li><li id=\"field_14_11\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden fc_channel\" id=\"fc_channel\" name=\"input_11\"><\/li><li id=\"field_14_12\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden fc_content\" id=\"fc_content\" name=\"input_12\"><\/li><li id=\"field_14_13\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden fc_landing\" id=\"fc_landing\" name=\"input_13\"><\/li><li id=\"field_14_14\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden fc_medium\" id=\"fc_medium\" name=\"input_14\"><\/li><li id=\"field_14_15\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden fc_referrer\" id=\"fc_referrer\" name=\"input_15\"><\/li><li id=\"field_14_16\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden fc_source\" id=\"fc_source\" name=\"input_16\"><\/li><li id=\"field_14_17\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden fc_term\" id=\"fc_term\" name=\"input_17\"><\/li><li id=\"field_14_18\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden GA_Client_ID\" id=\"GA_Client_ID\" name=\"input_18\"><\/li><li id=\"field_14_19\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden gclid\" id=\"gclid\" name=\"input_19\"><\/li><li id=\"field_14_20\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden ip_address\" id=\"ip_address\" name=\"input_20\"><\/li><li id=\"field_14_21\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden region\" id=\"region\" name=\"input_21\"><\/li><li id=\"field_14_22\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden lc_campaign\" id=\"lc_campaign\" name=\"input_22\"><\/li><li id=\"field_14_23\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden lc_channel\" id=\"lc_channel\" name=\"input_23\"><\/li><li id=\"field_14_24\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden lc_content\" id=\"lc_content\" name=\"input_24\"><\/li><li id=\"field_14_28\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gfield--width-full gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden lc_landing\" id=\"lc_landing\" name=\"input_28\"><\/li><li id=\"field_14_27\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gfield--width-full gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden lc_medium\" id=\"lc_medium\" name=\"input_27\"><\/li><li id=\"field_14_25\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden lc_referrer\" id=\"lc_referrer\" name=\"input_25\"><\/li><li id=\"field_14_26\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden lc_source\" id=\"lc_source\" name=\"input_26\"><\/li><li id=\"field_14_29\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden lc_term\" id=\"lc_term\" name=\"input_29\"><\/li><li id=\"field_14_30\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden latitude\" id=\"latitude\" name=\"input_30\"><\/li><li id=\"field_14_31\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden longitude\" id=\"longitude\" name=\"input_31\"><\/li><li id=\"field_14_32\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden page_visits\" id=\"page_visits\" name=\"input_32\"><\/li><li id=\"field_14_33\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden pages_visited_list\" id=\"pages_visited_list\" name=\"input_33\"><\/li><li id=\"field_14_34\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_34' id='input_14_34' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='' \/><\/div><\/li><li id=\"field_14_35\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden pages_visited_list\" id=\"pages_visited_list\" name=\"input_35\"><\/li><li id=\"field_14_36\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden device\" id=\"device\" name=\"input_36\"><\/li><li id=\"field_14_37\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden time_passed\" id=\"time_passed\" name=\"input_37\"><\/li><li id=\"field_14_38\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><input type=\"hidden\" class=\"gform_hidden time_zone\" id=\"time_zone\" name=\"input_38\"><\/li><li id=\"field_14_43\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gfield--width-full gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_43' id='input_14_43' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='' \/><\/div><\/li><li id=\"field_14_44\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gfield--width-full gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_44' id='input_14_44' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='' \/><\/div><\/li><li id=\"field_14_45\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gfield--width-full gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_45' id='input_14_45' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='' \/><\/div><\/li><li id=\"field_14_46\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gfield--width-full gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_46' id='input_14_46' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='' \/><\/div><\/li><li id=\"field_14_47\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gfield--width-full gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_47' id='input_14_47' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='' \/><\/div><\/li><\/ul><\/div>\n        <div class='gform-footer gform_footer top_label'> <input type=\"submit\" id=\"gform_submit_button_14\" class=\"gform_button button\" onclick=\"gform.submission.handleButtonClick(this);this.classList.add('disabled');\" data-submission-type=\"submit\" value=\"Submit\"> <input type='hidden' name='gform_ajax' value='form_id=14&amp;title=&amp;description=&amp;tabindex=0&amp;theme=legacy&amp;styles=[]&amp;hash=c80ab7211107791b0939bc4c13eecc5a' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_14' value='iframe' \/>\n            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_14' id='gform_theme_14' value='legacy' \/>\n            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_14' id='gform_style_settings_14' value='[]' \/>\n            <input type='hidden' class='gform_hidden' name='is_submit_14' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='14' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_14' value='WyJbXSIsIjUyZDM1ZTlhMmJiYTkyNTU5OTg3OWFjYzc4MzYwN2UyIl0=' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_14' id='gform_target_page_number_14' value='0' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_14' id='gform_source_page_number_14' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <\/form>\n                        <\/div>\n\t\t                <iframe style='display:none;width:0px;height:0px;' src='about:blank' name='gform_ajax_frame_14' id='gform_ajax_frame_14' title='This iframe contains the logic required to handle Ajax powered Gravity Forms.'><\/iframe>\n\t\t                <script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n gform.initializeOnLoaded( function() {gformInitSpinner( 14, 'https:\/\/www.netreputation.com\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery('#gform_ajax_frame_14').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_14');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_14').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_14').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_14').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_14').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_14').val();gformInitSpinner( 14, 'https:\/\/www.netreputation.com\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [14, current_page]);window['gf_submitting_14'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_14').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [14]);window['gf_submitting_14'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_14').text());}else{jQuery('#gform_14').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger(\"gform_pre_post_render\", [{ formId: \"14\", currentPage: \"current_page\", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( \"gform_wrapper_14\" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( \"span\" );            visibilitySpan.id = \"gform_visibility_test_14\";            gformWrapperDiv.insertAdjacentElement( \"afterend\", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( \"gform_visibility_test_14\" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 14, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} ); \n\/* ]]> *\/\n<\/script>\n\t<\/div>\n\t\n","protected":false},"excerpt":{"rendered":"<p>This article discusses online extortion strategies and how to keep yourself safe from cybercriminals.<br \/>\nToday, there are all types of cybercrimes, including cyberstalking hacking, identity theft, phishing and more. The list also includes cyber extortion, which is sometimes referred to as online blackmail.<br \/>\nPractically anyone can become a victim of cyber extortion. &#8230;<\/p>\n","protected":false},"author":32,"featured_media":17942,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[593,1],"tags":[2857,247,18],"class_list":["post-17829","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-privacy","category-reputation-management-blog","tag-blackmail","tag-cyber-attack","tag-personal-information"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.0 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Online Extortion: What It Is &amp; How to Stay Safe | NetReputation<\/title>\n<meta name=\"description\" content=\"This article discusses online extortion strategies, how to keep yourself safe from cybercriminals and what to do if you&#039;re a victim.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Online Extortion: What It Is and How To Protect Yourself\" \/>\n<meta property=\"og:description\" content=\"Learn more about our NetReputation - Ranked #1 in ORM.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/\" \/>\n<meta property=\"og:site_name\" content=\"NetReputation\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netreputation\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-04T15:00:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-12T18:47:50+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.netreputation.com\/wp-content\/uploads\/Online-Extortion-What-It-Is-and-How-To-Protect-Yourself-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lindsay Pietroluongo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@netreputation\" \/>\n<meta name=\"twitter:site\" content=\"@netreputation\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lindsay Pietroluongo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/\",\"url\":\"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/\",\"name\":\"Online Extortion: What It Is & How to Stay Safe | NetReputation\",\"isPartOf\":{\"@id\":\"https:\/\/www.netreputation.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netreputation.com\/wp-content\/uploads\/Online-Extortion-What-It-Is-and-How-To-Protect-Yourself-1.jpeg\",\"datePublished\":\"2024-11-04T15:00:51+00:00\",\"dateModified\":\"2025-08-12T18:47:50+00:00\",\"author\":{\"@id\":\"https:\/\/www.netreputation.com\/#\/schema\/person\/951b575d99d0e057ff3be93cf2469c1d\"},\"description\":\"This article discusses online extortion strategies, how to keep yourself safe from cybercriminals and what to do if you're a victim.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/#primaryimage\",\"url\":\"https:\/\/www.netreputation.com\/wp-content\/uploads\/Online-Extortion-What-It-Is-and-How-To-Protect-Yourself-1.jpeg\",\"contentUrl\":\"https:\/\/www.netreputation.com\/wp-content\/uploads\/Online-Extortion-What-It-Is-and-How-To-Protect-Yourself-1.jpeg\",\"width\":1000,\"height\":585,\"caption\":\"A gloved hand holds a key near hands offering money, set against the backdrop of a blurred laptop displaying a lock symbol. Text reads, \\\"Online Extortion: What It Is and How To Protect Yourself.\\\" Navigate the digital realm safely by understanding and combating online extortion.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.netreputation.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Reputation Management Blog\",\"item\":\"https:\/\/www.netreputation.com\/reputation-management-blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Online Extortion: What It Is and How To Protect Yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.netreputation.com\/#website\",\"url\":\"https:\/\/www.netreputation.com\/\",\"name\":\"NetReputation\",\"description\":\"Expert Reputation Management\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.netreputation.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.netreputation.com\/#\/schema\/person\/951b575d99d0e057ff3be93cf2469c1d\",\"name\":\"Lindsay Pietroluongo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.netreputation.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fbd53f6384be2152c7c938223107f754a2811bfe60652b6ecf28e55196a91e28?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fbd53f6384be2152c7c938223107f754a2811bfe60652b6ecf28e55196a91e28?s=96&d=mm&r=g\",\"caption\":\"Lindsay Pietroluongo\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Online Extortion: What It Is & How to Stay Safe | NetReputation","description":"This article discusses online extortion strategies, how to keep yourself safe from cybercriminals and what to do if you're a victim.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/","og_locale":"en_US","og_type":"article","og_title":"Online Extortion: What It Is and How To Protect Yourself","og_description":"Learn more about our NetReputation - Ranked #1 in ORM.","og_url":"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/","og_site_name":"NetReputation","article_publisher":"https:\/\/www.facebook.com\/netreputation","article_published_time":"2024-11-04T15:00:51+00:00","article_modified_time":"2025-08-12T18:47:50+00:00","og_image":[{"width":1000,"height":585,"url":"http:\/\/www.netreputation.com\/wp-content\/uploads\/Online-Extortion-What-It-Is-and-How-To-Protect-Yourself-1.jpeg","type":"image\/jpeg"}],"author":"Lindsay Pietroluongo","twitter_card":"summary_large_image","twitter_creator":"@netreputation","twitter_site":"@netreputation","twitter_misc":{"Written by":"Lindsay Pietroluongo","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/","url":"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/","name":"Online Extortion: What It Is & How to Stay Safe | NetReputation","isPartOf":{"@id":"https:\/\/www.netreputation.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/#primaryimage"},"image":{"@id":"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netreputation.com\/wp-content\/uploads\/Online-Extortion-What-It-Is-and-How-To-Protect-Yourself-1.jpeg","datePublished":"2024-11-04T15:00:51+00:00","dateModified":"2025-08-12T18:47:50+00:00","author":{"@id":"https:\/\/www.netreputation.com\/#\/schema\/person\/951b575d99d0e057ff3be93cf2469c1d"},"description":"This article discusses online extortion strategies, how to keep yourself safe from cybercriminals and what to do if you're a victim.","breadcrumb":{"@id":"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/#primaryimage","url":"https:\/\/www.netreputation.com\/wp-content\/uploads\/Online-Extortion-What-It-Is-and-How-To-Protect-Yourself-1.jpeg","contentUrl":"https:\/\/www.netreputation.com\/wp-content\/uploads\/Online-Extortion-What-It-Is-and-How-To-Protect-Yourself-1.jpeg","width":1000,"height":585,"caption":"A gloved hand holds a key near hands offering money, set against the backdrop of a blurred laptop displaying a lock symbol. Text reads, \"Online Extortion: What It Is and How To Protect Yourself.\" Navigate the digital realm safely by understanding and combating online extortion."},{"@type":"BreadcrumbList","@id":"https:\/\/www.netreputation.com\/online-extortion-what-it-is-and-how-to-protect-yourself\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.netreputation.com\/"},{"@type":"ListItem","position":2,"name":"Reputation Management Blog","item":"https:\/\/www.netreputation.com\/reputation-management-blog\/"},{"@type":"ListItem","position":3,"name":"Online Extortion: What It Is and How To Protect Yourself"}]},{"@type":"WebSite","@id":"https:\/\/www.netreputation.com\/#website","url":"https:\/\/www.netreputation.com\/","name":"NetReputation","description":"Expert Reputation Management","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.netreputation.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.netreputation.com\/#\/schema\/person\/951b575d99d0e057ff3be93cf2469c1d","name":"Lindsay Pietroluongo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.netreputation.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fbd53f6384be2152c7c938223107f754a2811bfe60652b6ecf28e55196a91e28?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fbd53f6384be2152c7c938223107f754a2811bfe60652b6ecf28e55196a91e28?s=96&d=mm&r=g","caption":"Lindsay Pietroluongo"}}]}},"_links":{"self":[{"href":"https:\/\/www.netreputation.com\/wp-json\/wp\/v2\/posts\/17829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.netreputation.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.netreputation.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.netreputation.com\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netreputation.com\/wp-json\/wp\/v2\/comments?post=17829"}],"version-history":[{"count":5,"href":"https:\/\/www.netreputation.com\/wp-json\/wp\/v2\/posts\/17829\/revisions"}],"predecessor-version":[{"id":19560,"href":"https:\/\/www.netreputation.com\/wp-json\/wp\/v2\/posts\/17829\/revisions\/19560"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.netreputation.com\/wp-json\/wp\/v2\/media\/17942"}],"wp:attachment":[{"href":"https:\/\/www.netreputation.com\/wp-json\/wp\/v2\/media?parent=17829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.netreputation.com\/wp-json\/wp\/v2\/categories?post=17829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.netreputation.com\/wp-json\/wp\/v2\/tags?post=17829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}