{"id":8454,"date":"2017-02-07T09:37:52","date_gmt":"2017-02-07T17:37:52","guid":{"rendered":"http:\/\/blog.hellotech.com\/?p=8454"},"modified":"2022-03-16T12:46:49","modified_gmt":"2022-03-16T19:46:49","slug":"overlooking-digital-threats","status":"publish","type":"post","link":"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats","title":{"rendered":"Digital Threats You Might Be Overlooking and How to Stay Safe"},"content":{"rendered":"\n<p>We all know how much computers and the internet help improve our lives. We can now be more productive, communicate easily, and have endless entertainment options. Unfortunately, nothing is ever perfect. Negative effects come with the positive benefits of digital technology. Those hours you spend using your computer and browsing the web daily can make you vulnerable to a wide range of digital threats. These include viruses, phishing attacks, ransomware, hacking, identity theft, and more.<\/p>\n\n\n\n<p>Thankfully, we do have excellent antivirus software choices these days, and most computer systems have built-in firewalls and security protocols to give us a reliable enough level of protection. Still, there might be some threats that will escape your notice. It is highly important to be aware of them and know what safety measures to take.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-malicious-individuals-snooping-on-your-wi-fi\">Malicious Individuals Snooping on Your Wi-Fi<\/h2>\n\n\n\n<p>Your private Wi-Fi network at home affords you a high level of security. But the moment you log into networks in cafes, airports, or hotels, your vulnerability increases. The risk of running into a WI-Fi eavesdropper is high. On many occasions, the snooper can just be sitting over at the next table, or beside you at the airport.<\/p>\n\n\n\n<div class=\"wp-block-image size-medium\"><figure class=\"aligncenter size-full\"><span data-src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/5aade7478a815a9ed7091080262f0b06.png\" rel=\"lightbox\" data-fancybox><img decoding=\"async\" width=\"475\" height=\"632\" src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/5aade7478a815a9ed7091080262f0b06.png\" alt=\"Digital Threats You Might Be Overlooking and How to Stay Safe\" class=\"wp-image-23505\" srcset=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/5aade7478a815a9ed7091080262f0b06.png 475w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/5aade7478a815a9ed7091080262f0b06-225x300.png 225w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/5aade7478a815a9ed7091080262f0b06-293x390.png 293w\" sizes=\"(max-width: 475px) 100vw, 475px\" \/><\/span><figcaption>Public Wi-Fi hotspots are super helpful, but you need to be aware of online eavesdroppers. (Image: Wikimedia Commons)<\/figcaption><\/figure><\/div>\n\n\n\n<p>They can then monitor any sensitive information that you send out to the web without your knowledge&nbsp;unless you protect yourself properly. To ensure that you do not fall victim to snoopers (who are most likely identity thieves, hackers, or scammers), here are some safety measures you can implement:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>When opening websites, check if the URL has \u201chttps:\/\/\u201d If one doesn\u2019t, then that page is unsafe and you should get out of there pronto. Also, if you come across unsecured pages asking you to log in using your email or social media account, exit immediately. Those websites are most likely phishing pages and can only mean trouble.<\/li><li>Make use of a Virtual Private Network or VPN to mask your online activities. There are many reliable VPN choices, including <a href=\"http:\/\/www.cyberghostvpn.com\/en_us\">CyberGhost<\/a>, <a href=\"https:\/\/www.ipvanish.com\/\">IPVanish<\/a>, and <a href=\"https:\/\/airvpn.org\/\">AirVPN<\/a>.<\/li><li>Enable extra protection for your often-used email and social media accounts. You can activate two-factor authentication, for example, to add another layer of security. Make use of strong security questions as well, especially for password changes. This way, unauthorized individuals will have a tough time locking you out of your own accounts.<\/li><li>Keep all of your computer software updated. Old versions are likely to have codes that can be exploited by hackers to create a backdoor entry to your system. So, be diligent in updating crucial software. You can automate this process for convenience.<\/li><li>If you have to do online banking, change your passwords, or fill up important forms \u2013 it is best to do these activities when you are on a secure network.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-harmful-programs-transmitted-by-usb-drives\">Harmful Programs Transmitted by USB Drives<\/h2>\n\n\n\n<p>One of the most overlooked security threats is a USB drive. Maybe a friend borrowed your thumb drive in a pinch. Unknowingly, he infected it with a virus. Then, when you plug it into your system, you unwittingly corrupt your computer as well. Not good.<\/p>\n\n\n\n<div class=\"wp-block-image size-medium\"><figure class=\"aligncenter size-full\"><span data-src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/USB_Stick.jpg\" rel=\"lightbox\" data-fancybox><img decoding=\"async\" width=\"649\" height=\"376\" src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/USB_Stick.jpg\" alt=\"Digital Threats You Might Be Overlooking and How to Stay Safe\" class=\"wp-image-23506\" srcset=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/USB_Stick.jpg 649w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/USB_Stick-300x174.jpg 300w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/USB_Stick-293x170.jpg 293w\" sizes=\"(max-width: 649px) 100vw, 649px\" \/><\/span><figcaption>KONICA MINOLTA DIGITAL CAMERA<\/figcaption><\/figure><\/div>\n\n\n\n<p>Although most computers these days are equipped with warning systems that will inform you if a USB device contains a malware, they are not capable of defending you from all threats. These tips will improve your protection:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Exercise caution and don\u2019t give in to curiosity. There are <a href=\"https:\/\/nakedsecurity.sophos.com\/2016\/09\/21\/dont-plug-it-in-scammers-post-infected-usb-sticks-through-letterboxes\/\">stories going around<\/a>&nbsp;of people unexpectedly receiving a malware-infected USB stick in the mail. These people willingly plugged the device into the computer, just to find out what&#8217;s inside. Needless to say, their systems were infected by the virus. So, be extra careful and don\u2019t plug any suspicious USB device to your computer.<\/li><li>Install an antivirus software that has a USB drive protection feature. If you have one already, double check the settings and make sure this feature is activated.<\/li><li>Even if you have automatic USB protection built into your computer or via an antivirus package, make it a habit to thoroughly scan the device just after plugging it in. Don\u2019t open anything in it until after the scan has concluded.<\/li><li>Minimize usage of USB sticks. Save or share your data in the cloud instead. Of course, implement necessary cloud protection as well.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-someone-peeking-at-you-through-your-webcam\">Someone Peeking at You through Your Webcam<\/h2>\n\n\n\n<p>Some stalkers can monitor you in your private space during your private time through your webcam. Unfortunately, it is not like we can totally get rid of webcams since we need them to communicate with people we care about who are far away. So, what to do?<\/p>\n\n\n\n<div class=\"wp-block-image size-medium\"><figure class=\"aligncenter size-full\"><span data-src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/48d4fa24bfb56abf50f4f2af10bc3123.png\" rel=\"lightbox\" data-fancybox><img decoding=\"async\" width=\"481\" height=\"356\" src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/48d4fa24bfb56abf50f4f2af10bc3123.png\" alt=\"Digital Threats You Might Be Overlooking and How to Stay Safe\" class=\"wp-image-23507\" srcset=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/48d4fa24bfb56abf50f4f2af10bc3123.png 481w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/48d4fa24bfb56abf50f4f2af10bc3123-300x222.png 300w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/48d4fa24bfb56abf50f4f2af10bc3123-293x217.png 293w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><\/span><figcaption>Someone you don&#8217;t know can be secretly observing you using your webcam. (Image: Wikipedia)<\/figcaption><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li>When you are not using it, keep the webcam covered. You can tape over it, or if it has a shutter, then use that.<\/li><li>For Windows users, you can access the \u201cDevice Manager\u201d menu from the Start button. Select the \u201cWebcam\u201d option located in the \u201cImaging devices\u201d section. Then, click \u201cDisable.\u201d You can enable it again when you\u2019re going to use it.<\/li><li>For MacOS users, disabling the webcam is, unfortunately, harder. You can back up your system files first, and then go to the folder with the \u201cMacintosh HD\/ System\/ Library\/ Quicktime\u201d address, and then remove the file named QuickTimeUSBVDCDigitizer.component<\/li><li>Another good solution is to carefully select which applications in your computer can use the webcam or not.<\/li><li>If your webcam is attached to your computer via USB, then simply pull it out when not in use.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-scams-masquerading-as-real-looking-messages\">Scams Masquerading as Real-Looking Messages<\/h2>\n\n\n\n<p>Just recently, a highly potent <a href=\"https:\/\/www.hellotech.com\/gmail-phishing-attack\/\">phishing attack targeted Gmail users<\/a>. Many fell victim because the phishing page looked so much like the real Gmail login page. People who are in a hurry or are not vigilant enough will easily miss the fact that the page is dangerous.<\/p>\n\n\n\n<div class=\"wp-block-image size-medium\"><figure class=\"aligncenter size-full\"><span data-src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/4248139290_32daab0c73.jpg\" rel=\"lightbox\" data-fancybox><img decoding=\"async\" width=\"355\" height=\"293\" src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/4248139290_32daab0c73.jpg\" alt=\"Digital Threats You Might Be Overlooking and How to Stay Safe\" class=\"wp-image-23508\" srcset=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/4248139290_32daab0c73.jpg 355w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/4248139290_32daab0c73-300x248.jpg 300w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2021\/06\/4248139290_32daab0c73-293x242.jpg 293w\" sizes=\"(max-width: 355px) 100vw, 355px\" \/><\/span><figcaption>One of the phishing emails circulating out there. This one poses as a Comcast email. (Image: Flickr_Elana Centor)<\/figcaption><\/figure><\/div>\n\n\n\n<p>This is just one of the many examples of dangerous pages and messages circulating on the internet today, all of which are meant to fool people into giving up personal details and other sensitive data. Protect yourself:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>If you notice that your email or a webpage you often visit is behaving suspiciously, exercise caution no matter how minor your suspicion is. For example, the logo of your online banking page looks off somehow, or perhaps you just logged into your email yet this attachment you clicked on asked you to log in again. Things like these often mean there is something fishy going on.<\/li><li>When you do find something suspicious, check the URL first and find the https:\/\/ or green lock key. If you don\u2019t find that, then exit\/close the page right away.<\/li><li>Be careful opening email attachments. If you see that it is a PDF or JPEG file, but it opens as a webpage, then that is likely a virus or a phishing attack. Close that immediately, and then run a complete malware scan.<\/li><li>Stay clear of pop-ups, especially those saying you won something, or that there is a virus and you need to install something to get rid of it. If you are really worried about a malware, go to your antivirus software and run a scan from there.<\/li><li>Keep computer applications up to date, including browsers and email apps.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusion<\/h2>\n\n\n\n<p>By being aware of these often-overlooked digital threats, you are one step closer to keeping yourself and your computer safe. Also, always remember that vigilance will go a long way towards protecting yourself while using your computer and the internet. Make sure as well that your system is fully equipped with defensive solutions to minimize harmful programs from infecting your machine.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We all know how much computers and the internet help improve our lives. We can now be more productive, communicate easily, and have endless entertainment options. Unfortunately, nothing is ever perfect. Negative effects come with the positive benefits of digital technology. Those hours you spend using your computer and browsing the web daily can make you vulnerable to a wide range of digital threats. These include viruses, phishing attacks, ransomware, hacking, identity theft, and more. Thankfully, we do have excellent [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8496,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[17593,17580],"tags":[],"class_list":["post-8454","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-staying-safe","category-tips-and-tricks"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.10 (Yoast SEO v20.10) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Digital Threats You Might Be Overlooking and How to Stay Safe - The Plug - HelloTech<\/title>\n<meta name=\"description\" content=\"The countless hours you spend using your computer and browsing the web can make you vulnerable to a wide range of digital threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Threats You Might Be Overlooking and How to Stay Safe - The Plug - HelloTech\" \/>\n<meta property=\"og:description\" content=\"We all know how much computers and the internet help improve our lives. We can now be more productive, communicate easily, and have endless entertainment\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats\" \/>\n<meta property=\"og:site_name\" content=\"The Plug - HelloTech\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/hellotech\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-07T17:37:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-16T19:46:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2017\/02\/hacker-1872291_640-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@HelloTech\" \/>\n<meta name=\"twitter:site\" content=\"@HelloTech\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/dec00225dd888a509740ace5e4d9de6c\"},\"headline\":\"Digital Threats You Might Be Overlooking and How to Stay Safe\",\"datePublished\":\"2017-02-07T17:37:52+00:00\",\"dateModified\":\"2022-03-16T19:46:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats\"},\"wordCount\":1306,\"publisher\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/#organization\"},\"articleSection\":[\"Staying Safe\",\"Tips and Tricks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats\",\"url\":\"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats\",\"name\":\"Digital Threats You Might Be Overlooking and How to Stay Safe - The Plug - HelloTech\",\"isPartOf\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/#website\"},\"datePublished\":\"2017-02-07T17:37:52+00:00\",\"dateModified\":\"2022-03-16T19:46:49+00:00\",\"description\":\"The countless hours you spend using your computer and browsing the web can make you vulnerable to a wide range of digital threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hellotech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital Threats You Might Be Overlooking and How to Stay Safe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#website\",\"url\":\"https:\/\/www.hellotech.com\/blog\/\",\"name\":\"The Plug - HelloTech\",\"description\":\"Turn to The Plug for informative tech news that you can use. \",\"publisher\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hellotech.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#organization\",\"name\":\"HelloTech\",\"url\":\"https:\/\/www.hellotech.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2018\/11\/HT-logo-revised-final.png\",\"contentUrl\":\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2018\/11\/HT-logo-revised-final.png\",\"width\":1000,\"height\":174,\"caption\":\"HelloTech\"},\"image\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/hellotech\",\"https:\/\/twitter.com\/HelloTech\",\"http:\/\/www.instagram.com\/hello_tech\",\"https:\/\/www.youtube.com\/channel\/UCIR-fbAKRfVuAbciDr2z4nQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/dec00225dd888a509740ace5e4d9de6c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cbb537d18df244ad7d57a3639d94ede5cd90bf1fb742392af5731beaf11ffeb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cbb537d18df244ad7d57a3639d94ede5cd90bf1fb742392af5731beaf11ffeb1?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Digital Threats You Might Be Overlooking and How to Stay Safe - The Plug - HelloTech","description":"The countless hours you spend using your computer and browsing the web can make you vulnerable to a wide range of digital threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats","og_locale":"en_US","og_type":"article","og_title":"Digital Threats You Might Be Overlooking and How to Stay Safe - The Plug - HelloTech","og_description":"We all know how much computers and the internet help improve our lives. We can now be more productive, communicate easily, and have endless entertainment","og_url":"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats","og_site_name":"The Plug - HelloTech","article_publisher":"http:\/\/www.facebook.com\/hellotech","article_published_time":"2017-02-07T17:37:52+00:00","article_modified_time":"2022-03-16T19:46:49+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2017\/02\/hacker-1872291_640-min.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@HelloTech","twitter_site":"@HelloTech","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats#article","isPartOf":{"@id":"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats"},"author":{"name":"admin","@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/dec00225dd888a509740ace5e4d9de6c"},"headline":"Digital Threats You Might Be Overlooking and How to Stay Safe","datePublished":"2017-02-07T17:37:52+00:00","dateModified":"2022-03-16T19:46:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats"},"wordCount":1306,"publisher":{"@id":"https:\/\/www.hellotech.com\/blog\/#organization"},"articleSection":["Staying Safe","Tips and Tricks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats","url":"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats","name":"Digital Threats You Might Be Overlooking and How to Stay Safe - The Plug - HelloTech","isPartOf":{"@id":"https:\/\/www.hellotech.com\/blog\/#website"},"datePublished":"2017-02-07T17:37:52+00:00","dateModified":"2022-03-16T19:46:49+00:00","description":"The countless hours you spend using your computer and browsing the web can make you vulnerable to a wide range of digital threats.","breadcrumb":{"@id":"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.hellotech.com\/blog\/overlooking-digital-threats#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hellotech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Digital Threats You Might Be Overlooking and How to Stay Safe"}]},{"@type":"WebSite","@id":"https:\/\/www.hellotech.com\/blog\/#website","url":"https:\/\/www.hellotech.com\/blog\/","name":"The Plug - HelloTech","description":"Turn to The Plug for informative tech news that you can use. ","publisher":{"@id":"https:\/\/www.hellotech.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hellotech.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hellotech.com\/blog\/#organization","name":"HelloTech","url":"https:\/\/www.hellotech.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2018\/11\/HT-logo-revised-final.png","contentUrl":"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2018\/11\/HT-logo-revised-final.png","width":1000,"height":174,"caption":"HelloTech"},"image":{"@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/hellotech","https:\/\/twitter.com\/HelloTech","http:\/\/www.instagram.com\/hello_tech","https:\/\/www.youtube.com\/channel\/UCIR-fbAKRfVuAbciDr2z4nQ"]},{"@type":"Person","@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/dec00225dd888a509740ace5e4d9de6c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cbb537d18df244ad7d57a3639d94ede5cd90bf1fb742392af5731beaf11ffeb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cbb537d18df244ad7d57a3639d94ede5cd90bf1fb742392af5731beaf11ffeb1?s=96&d=mm&r=g","caption":"admin"}}]}},"_links":{"self":[{"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/posts\/8454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/comments?post=8454"}],"version-history":[{"count":0,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/posts\/8454\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/media\/8496"}],"wp:attachment":[{"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/media?parent=8454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/categories?post=8454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/tags?post=8454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}