{"id":5733,"date":"2020-05-12T20:38:21","date_gmt":"2020-05-13T03:38:21","guid":{"rendered":"http:\/\/clikcloud.com\/?p=6600"},"modified":"2020-05-12T20:46:32","modified_gmt":"2020-05-13T03:46:32","slug":"cybersecurity-in-challenging-times","status":"publish","type":"post","link":"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-in-challenging-times\/","title":{"rendered":"Cybersecurity in Challenging Times"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In these unprecedented times, we spend more time than ever on various devices, using them both for work and recreation. As in other difficult times, heroes rise to the occasion. However, so do bad actors, seeking to take advantage of the situation. Read on to learn more about protecting yourself from cyber attacks.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Hazards to Watch For<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Cyberattacks are on the rise these days, with bad actors looking to take advantage of the situation, playing both on people\u2019s fears, and their desire to help others. As ever, though, we can protect ourselves using tools along with caution and common sense. Social engineering schemes, including phishing attacks, are used to gain confidential information from unwitting victims or to install malware on their devices. For instance, a person might receive emails that look like ones from credible organizations, and these emails capitalize on fears of COVID-19. Cybercriminals might use \u201cspoofing\u201d as a tactic, making an email seem like it\u2019s from someone you know. It might contain an urgent appeal to buy items for a relative because the \u201csender\u201d is in quarantine. Other possibilities are ads for items like masks or stories about vaccines and cures for COVID-19.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Keep Your Network and Your Employees Secure<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Many businesses now have employees working remotely, accessing the business\u2019 computer network. The first tool that can help keep the network secure is a virtual private network (VPN) that workers can use to safely access files and applications. Other tools that should be part of the arsenal are current antivirus and anti-malware definitions. Remind workers of common-sense precautions like not clicking on links or attachments. If they receive a strange email that appears to be from a supervisor or coworker, they can call to find out if the email is genuine. If it isn\u2019t, they need to report and delete the email. They can point the mouse arrow over the URL to see if that looks suspicious, and refrain from responding to the email. Just being aware that cyber attacks are on the rise can help workers keep their guard up. An option to test workers\u2019 knowledge of phishing attacks is staging a mock attack to learn which people respond, and in what way.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A great writer said that people need to be reminded rather than instructed, and this can apply to cybersecurity. To learn more about how to keep your network and your employees safe, contact your trusted technology advisor today.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In these unprecedented times, we spend more time than ever on various devices, using them both for work and recreation. As in other difficult times, heroes rise to the occasion. However, so do bad actors, seeking to take advantage of the situation. Read on to learn more about protecting yourself from cyber attacks.<\/p>\n","protected":false},"author":1,"featured_media":5735,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[5,100],"tags":[118],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity in Challenging Times<\/title>\n<meta name=\"description\" content=\"In these unprecedented times, we spend more time than ever on various devices, using them both for work and recreation. As in other difficult times, heroes rise to the occasion. However, so do bad actors, seeking to take advantage of the situation. Read on to learn more about protecting yourself from cyber attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-in-challenging-times\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"clikcloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-in-challenging-times\/\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-in-challenging-times\/\",\"name\":\"Cybersecurity in Challenging Times\",\"isPartOf\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\"},\"datePublished\":\"2020-05-13T03:38:21+00:00\",\"dateModified\":\"2020-05-13T03:46:32+00:00\",\"author\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\"},\"description\":\"In these unprecedented times, we spend more time than ever on various devices, using them both for work and recreation. As in other difficult times, heroes rise to the occasion. However, so do bad actors, seeking to take advantage of the situation. Read on to learn more about protecting yourself from cyber attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-in-challenging-times\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-in-challenging-times\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-in-challenging-times\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clikcloud.net\/3gtelco\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity in Challenging Times\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/\",\"name\":\"3G Master (3gtelco)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\",\"name\":\"clikcloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"caption\":\"clikcloud\"},\"sameAs\":[\"http:\/\/www.clikcloud.com\"],\"url\":\"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity in Challenging Times","description":"In these unprecedented times, we spend more time than ever on various devices, using them both for work and recreation. As in other difficult times, heroes rise to the occasion. However, so do bad actors, seeking to take advantage of the situation. Read on to learn more about protecting yourself from cyber attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-in-challenging-times\/","twitter_misc":{"Written by":"clikcloud","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-in-challenging-times\/","url":"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-in-challenging-times\/","name":"Cybersecurity in Challenging Times","isPartOf":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#website"},"datePublished":"2020-05-13T03:38:21+00:00","dateModified":"2020-05-13T03:46:32+00:00","author":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92"},"description":"In these unprecedented times, we spend more time than ever on various devices, using them both for work and recreation. As in other difficult times, heroes rise to the occasion. However, so do bad actors, seeking to take advantage of the situation. Read on to learn more about protecting yourself from cyber attacks.","breadcrumb":{"@id":"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-in-challenging-times\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clikcloud.net\/3gtelco\/cybersecurity-in-challenging-times\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-in-challenging-times\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clikcloud.net\/3gtelco\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity in Challenging Times"}]},{"@type":"WebSite","@id":"https:\/\/clikcloud.net\/3gtelco\/#website","url":"https:\/\/clikcloud.net\/3gtelco\/","name":"3G Master (3gtelco)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92","name":"clikcloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","caption":"clikcloud"},"sameAs":["http:\/\/www.clikcloud.com"],"url":"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/"}]}},"_links":{"self":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5733"}],"collection":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/comments?post=5733"}],"version-history":[{"count":1,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5733\/revisions"}],"predecessor-version":[{"id":5734,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5733\/revisions\/5734"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media\/5735"}],"wp:attachment":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media?parent=5733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/categories?post=5733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/tags?post=5733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}