{"id":636,"date":"2018-10-05T07:29:43","date_gmt":"2018-10-05T14:29:43","guid":{"rendered":"http:\/\/dshsolutions.com\/wordpress\/?p=636"},"modified":"2018-10-05T07:29:43","modified_gmt":"2018-10-05T14:29:43","slug":"ecsm-five-simple-steps-to-staying-safe-online-now-and-in-the-long-run","status":"publish","type":"post","link":"https:\/\/dshsolutions.com\/wordpress\/ecsm-five-simple-steps-to-staying-safe-online-now-and-in-the-long-run\/","title":{"rendered":"ECSM: Five simple steps to staying safe online now and in the long run"},"content":{"rendered":"<p>This is a very informative article from welivesecurity.com.<\/p>\n<blockquote>\n<h2><strong>Know the risks<\/strong><\/h2>\n<p>It all starts with the awareness of the risks along with the realization that\u00a0<em>everybody<\/em>\u00a0is a potential target. Much of what we do every day involves the internet positively in one way or another. On the other hand, the digital world is also inhabited by criminals who never miss a chance to steal fellow netizens\u2019 data or money, or both. First of all, then, it pays to be clear-eyed not just about the benefits, but also about the security and privacy risks of cyberspace.<\/p>\n<p>This ties in with the fact that attackers deploy ever more advanced tools and techniques to attack their targets. While we hold no sway over attackers\u2019 capabilities and incentives, we\u00a0<em>can<\/em>\u00a0make their \u201cjob\u201d harder by acknowledging and addressing the vulnerabilities in ourselves, as well as in our devices and software.<\/p>\n<p><a href=\"https:\/\/www.welivesecurity.com\/2018\/10\/05\/make-cyber-habit-five-simple-steps-staying-safe-online\/?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=wls-newsletter-051018\">Read more&#8230;<\/a><\/p><\/blockquote>\n<p>Source: <em><a href=\"https:\/\/www.welivesecurity.com\/2018\/10\/05\/make-cyber-habit-five-simple-steps-staying-safe-online\/?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=wls-newsletter-051018\">ECSM: Five simple steps to staying safe online now and in the long run<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is a very informative article from welivesecurity.com. Know the risks It all starts with the awareness of the risks along with the realization that\u00a0everybody\u00a0is a potential target. Much of what we do every day involves the internet positively in one way or another. On the other hand, the digital world is also inhabited by [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"quote","meta":{"footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-636","post","type-post","status-publish","format-quote","hentry","category-privacy","category-security-2","post_format-post-format-quote"],"_links":{"self":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/comments?post=636"}],"version-history":[{"count":0,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/636\/revisions"}],"wp:attachment":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/media?parent=636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/categories?post=636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/tags?post=636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}