{"id":8,"date":"2017-07-28T08:51:44","date_gmt":"2017-07-28T08:51:44","guid":{"rendered":"http:\/\/blog.infopark.in\/?p=8"},"modified":"2017-07-28T09:00:30","modified_gmt":"2017-07-28T09:00:30","slug":"your-personal-guide-to-cyber-security","status":"publish","type":"post","link":"https:\/\/infopark.in\/blog\/index.php\/2017\/07\/28\/your-personal-guide-to-cyber-security\/","title":{"rendered":"Your Personal Guide to Cyber Security"},"content":{"rendered":"<p style=\"text-align: left\">Our vast, interconnected network of information needs to be protected and kept secure, to ensure the combined safety of individuals and governments.<\/p>\n<p style=\"text-align: justify;min-height: 240px\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2141\" style=\"float: left;padding-right: 20px;border: 0\" src=\"http:\/\/blog.infopark.in\/wp-content\/uploads\/2017\/07\/01.png\" alt=\"01\" width=\"200\" height=\"200\" \/><strong>1. Password Practices<\/strong><br \/>\nAlways ensure that your passwords are complicated, to prevent it being easily deciphered by a potential threat. By choosing a password that incorporates Upper and Lower case alphabets, as well as Numbers and Special Characters, your password will be very difficult to crack.<br \/>\nMake sure that each password is unique and not repeated across different platforms, as it will only increase the likelihood of a threat gaining access to more than one account. Even modifying individual characters is risky as there are effective ways to decode it.<br \/>\nMany websites encourage you to periodically update your password, to increase the security of your account. Stay a step ahead of the game by making sure to regularly update your passwords and be free from the risk of being hacked.<br \/>\nMost importantly, type your password in every time instead of saving it in your browser as this is the easiest information to access from your browser data.<\/p>\n<p style=\"text-align: justify;min-height: 220px\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2141\" style=\"float: right;padding-left: 20px;border: 0\" src=\"http:\/\/blog.infopark.in\/wp-content\/uploads\/2017\/07\/02.png\" alt=\"01\" width=\"200\" height=\"200\" \/><strong>2. Tighten Your Security &amp; Privacy Settings<\/strong><br \/>\nPrivacy Settings are a very useful tool that can be found on every major social media platform. These Privacy options are regularly updated and are often overlooked by users, as they tend to gloss over pop-ups and notifications about the same. Be more conscious of which social media accounts are linked to apps that access your data and are vulnerable to an attack.<br \/>\nIt is important to avoid half measures and take the necessary precautions to protect yourself and your information, even if it means an additional effort on your part. A Two-Step Verification or Authentication is often suggested by social media apps and websites as a way to further your security. This is very important as<br \/>\n\u2022 You receive a text message or app notification with a verification code to be entered in order to access your account.<br \/>\n\u2022 You\u2019ll be asked to specify your trusted device(s) to receive the code, e.g. personal Phone or Tablet, that only you have access to.<\/p>\n<p style=\"text-align: justify;min-height: 220px\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2141\" style=\"float: left;padding-right: 20px;border: 0\" src=\"http:\/\/blog.infopark.in\/wp-content\/uploads\/2017\/07\/03.png\" alt=\"01\" width=\"200\" height=\"200\" \/><strong>3. Security Program \/ Software<\/strong><br \/>\nThe minimum requirement today is a good virus protection program, as our daily browsing puts us at risk of receiving numerous viruses. Most anti-virus softwares also come with an effective Privacy measures to protect your data from harmful programs and unauthorised access.<br \/>\nSimilar to obtaining insurance against items of value, it is necessary to take precautions to protect your digital information and sensitive data.<\/p>\n<p style=\"text-align: justify;min-height: 220px\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2141\" style=\"float: right;padding-left: 20px;border: 0\" src=\"http:\/\/blog.infopark.in\/wp-content\/uploads\/2017\/07\/04.png\" alt=\"01\" width=\"200\" height=\"200\" \/><strong>4. Regularly Install Updates<\/strong><br \/>\nEvery application, website or Operating System is regularly updated to incorporate the latest software improvements and changes. By updating when required, you are ensuring your systems are equipped to remain secure and stable in the face of potential threats.<br \/>\nSoftware updates will always include a description of what the update includes, in terms of incorporating changes and working out existing bugs and issues. If there are any mentions of Security-related fixes, ensure that you update your account \/ system accordingly.<\/p>\n<p style=\"text-align: justify;min-height: 220px\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2141\" style=\"float: left;padding-right: 20px;border: 0\" src=\"http:\/\/blog.infopark.in\/wp-content\/uploads\/2017\/07\/05.png\" alt=\"01\" width=\"200\" height=\"200\" \/><strong>5. Never Simply Click On Any Link<\/strong><br \/>\nPhishing is the method that tempts users to click on a flashing button \/ message, which is actually a malicious URL that uploads a virus to the system or attempts accessing its information. Be extremely careful and particular with any URLs that are sent by banks or other entities that could request sensitive information or personal credentials.<br \/>\nAlso, be suspicious of messages received from unknown users via email or social media platforms, as this is the easiest way to get users to click on links or provide login details.<br \/>\nBy being responsible and thorough, you will be protecting yourself from all cybersecurity threats more effectively than the best anti-virus softwares in the market!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our vast, interconnected network of information needs to be protected and kept secure, to ensure the combined safety of individuals and governments. 1. Password Practices Always ensure that your passwords are complicated, to prevent it being easily deciphered by a potential threat. By choosing a password that incorporates Upper and Lower case alphabets, as well &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/infopark.in\/blog\/index.php\/2017\/07\/28\/your-personal-guide-to-cyber-security\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Your Personal Guide to Cyber Security&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-8","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/infopark.in\/blog\/index.php\/wp-json\/wp\/v2\/posts\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infopark.in\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infopark.in\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infopark.in\/blog\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/infopark.in\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":3,"href":"https:\/\/infopark.in\/blog\/index.php\/wp-json\/wp\/v2\/posts\/8\/revisions"}],"predecessor-version":[{"id":16,"href":"https:\/\/infopark.in\/blog\/index.php\/wp-json\/wp\/v2\/posts\/8\/revisions\/16"}],"wp:attachment":[{"href":"https:\/\/infopark.in\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=8"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infopark.in\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=8"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infopark.in\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}