{"id":1005,"date":"2020-04-20T17:51:00","date_gmt":"2020-04-20T21:51:00","guid":{"rendered":"https:\/\/www.baronsoftware.com\/Blog\/?p=1005"},"modified":"2020-04-20T17:51:02","modified_gmt":"2020-04-20T21:51:02","slug":"being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses","status":"publish","type":"post","link":"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/","title":{"rendered":"Being Secured Against Hackers and Criminals dealing with Covid-19 and other viruses"},"content":{"rendered":"\n<p>Cyber threats are real. Everyone is being attacked on a daily basis from outside agents.  These agents for the most part have criminal intent on using the Covid-19 fear.  You must be on guard against emails that have attachments.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\\\\www.baronsoftware.com\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" width=\"626\" height=\"417\" data-attachment-id=\"1006\" data-permalink=\"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/hacker-with-laptop_23-2147985341\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/04\/hacker-with-laptop_23-2147985341.jpg?fit=626%2C417&amp;ssl=1\" data-orig-size=\"626,417\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;3.2&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;NIKON D800&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1539801322&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;50&quot;,&quot;iso&quot;:&quot;100&quot;,&quot;shutter_speed&quot;:&quot;0.016666666666667&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"hacker-with-laptop_23-2147985341\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/04\/hacker-with-laptop_23-2147985341.jpg?fit=626%2C417&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/04\/hacker-with-laptop_23-2147985341.jpg?resize=626%2C417&#038;ssl=1\" alt=\"\" class=\"wp-image-1006\" srcset=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/04\/hacker-with-laptop_23-2147985341.jpg?w=626&amp;ssl=1 626w, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/04\/hacker-with-laptop_23-2147985341.jpg?resize=300%2C200&amp;ssl=1 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n\n\n\n<p>User email accounts, contact information or even companies are used to fake a person into thinking the email is from someone they know.<\/p>\n\n\n\n<p>You must check the actual email address where the item came from.  For the most part an email could come from an insurance company or finance house.  The hacker will show the company logo but the email address has a fake domain.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Security Steps<\/h3>\n\n\n\n<p><strong>1. Install and maintain anti-virus software.<\/strong> One recommendation is Norton Security which will scan for a wide range of threats, but no one program can catch 100% of threats. The second is MalwareBytes that will look for hidden files that can extract key information.\u00a0 IT people usually maintain systems regularly, including &#8220;virus definition updates&#8221; but now that most people are working remotely you must be extra careful!<\/p>\n\n\n\n<p><strong>2. Make sure your anti-virus is integrated with your email program.<\/strong> Let it scan all incoming files. Usually the AV software will remove the attachment from the email.\u00a0 Make sure you do not click on links that are part of an email.  If the email is coming from a friend and looks bogus than you can reach out to verify that with them.<\/p>\n\n\n\n<p><strong>3. Only open attachments or click on links you expect to receive.<\/strong> Do not open attachments or click on links if it indicates coronavirus, COVID, accounts, logins, passwords or other words to lure you into opening the file. <\/p>\n\n\n\n<p><strong>4. Beware Of Emails coming from government or finance.<\/strong>\u00a0 No bank or IRS or FBI or your old school will be sending emails requesting private information.  Most will send regular mail to your location if there is a issue.<\/p>\n\n\n\n<p><strong>5. Backup Backup and Backup.<\/strong> Should disaster strike, your best protection is to have backups of your work. You can use the cloud or internal drives to safe store information. Always backup otherwise you may get caught short.<\/p>\n\n\n\n<p><strong>6. Paying ransom. <\/strong> You will get emails telling you that a particular password has been compromise and you better pay them off.  DO NOT DO PAY ANYONE MONEY.  Stories have been told that government offices were taken over and the information was encrypted.  That is mostly due to lack of security or an employee decided to open an outside email.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Security and Passwords<\/h3>\n\n\n\n<p><strong>7. Change Password every quarter. <\/strong> For a small shop changing your password every quarter is better than never.  The password strength is the key.  Something like &#8220;BaBies@0@01500&#8221; is stronger to crack then &#8220;Password99&#8221; or the famous &#8220;12345678&#8221;.  Larger companies will force you to change your password every month but a home user can be a little easier.<\/p>\n\n\n\n<p><strong>8. Do Not Use the same password for EVERYTHING. <\/strong> Using the same password defeats security and if there is a breach where your password is stolen. Then most of your personal and business accounts are open.<\/p>\n\n\n\n<p>So if you look into security now, do daily backups and watch what you receive via emails you should be safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber threats are real. Everyone is being attacked on a daily basis from outside agents. These agents for the most part have criminal intent on using the Covid-19 fear. You must be on guard against emails that have attachments. User email accounts, contact information or even companies are used to fake a person into thinking [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5],"tags":[277],"class_list":["post-1005","post","type-post","status-publish","format-standard","hentry","category-rad-studio-embarcadero-delphi-development","tag-emails"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Being Secured Against Hackers and Criminals dealing with Covid-19 and other viruses - Baron Software<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Being Secured Against Hackers and Criminals dealing with Covid-19 and other viruses - Baron Software\" \/>\n<meta property=\"og:description\" content=\"Cyber threats are real. Everyone is being attacked on a daily basis from outside agents. These agents for the most part have criminal intent on using the Covid-19 fear. You must be on guard against emails that have attachments. User email accounts, contact information or even companies are used to fake a person into thinking [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/\" \/>\n<meta property=\"og:site_name\" content=\"Baron Software\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-20T21:51:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-20T21:51:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/04\/hacker-with-laptop_23-2147985341.jpg\" \/>\n<meta name=\"author\" content=\"richard@baronsoftware.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Being Secured Against Hackers and Criminals dealing with Covid-19\" \/>\n<meta name=\"twitter:description\" content=\"Cyber threats are real. Everyone is being attacked on a daily basis from outside agents. These agents for the most part have criminal intent on using the Covid-19 fear. You must be on guard against emails that have attachments.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\" \/>\n<meta name=\"twitter:creator\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:site\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"richard@baronsoftware.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\\\/\"},\"author\":{\"name\":\"richard@baronsoftware.com\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\"},\"headline\":\"Being Secured Against Hackers and Criminals dealing with Covid-19 and other viruses\",\"datePublished\":\"2020-04-20T21:51:00+00:00\",\"dateModified\":\"2020-04-20T21:51:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\\\/\"},\"wordCount\":530,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/hacker-with-laptop_23-2147985341.jpg\",\"keywords\":[\"Emails\"],\"articleSection\":[\"Rad Studio Delphi Development\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\\\/\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\\\/\",\"name\":\"Being Secured Against Hackers and Criminals dealing with Covid-19 and other viruses - Baron Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/hacker-with-laptop_23-2147985341.jpg\",\"datePublished\":\"2020-04-20T21:51:00+00:00\",\"dateModified\":\"2020-04-20T21:51:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/hacker-with-laptop_23-2147985341.jpg?fit=626%2C417&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/hacker-with-laptop_23-2147985341.jpg?fit=626%2C417&ssl=1\",\"width\":626,\"height\":417},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Being Secured Against Hackers and Criminals dealing with Covid-19 and other viruses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"name\":\"Baron Software\",\"description\":\"Highest Quality Software Developed.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\",\"name\":\"Baron Software\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"width\":1920,\"height\":400,\"caption\":\"Baron Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/Rbaroniunas\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\",\"name\":\"richard@baronsoftware.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"caption\":\"richard@baronsoftware.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Being Secured Against Hackers and Criminals dealing with Covid-19 and other viruses - Baron Software","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/","og_locale":"en_US","og_type":"article","og_title":"Being Secured Against Hackers and Criminals dealing with Covid-19 and other viruses - Baron Software","og_description":"Cyber threats are real. Everyone is being attacked on a daily basis from outside agents. These agents for the most part have criminal intent on using the Covid-19 fear. You must be on guard against emails that have attachments. User email accounts, contact information or even companies are used to fake a person into thinking [&hellip;]","og_url":"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/","og_site_name":"Baron Software","article_published_time":"2020-04-20T21:51:00+00:00","article_modified_time":"2020-04-20T21:51:02+00:00","og_image":[{"url":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/04\/hacker-with-laptop_23-2147985341.jpg","type":"","width":"","height":""}],"author":"richard@baronsoftware.com","twitter_card":"summary_large_image","twitter_title":"Being Secured Against Hackers and Criminals dealing with Covid-19","twitter_description":"Cyber threats are real. Everyone is being attacked on a daily basis from outside agents. These agents for the most part have criminal intent on using the Covid-19 fear. You must be on guard against emails that have attachments.","twitter_image":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","twitter_creator":"@Rbaroniunas","twitter_site":"@Rbaroniunas","twitter_misc":{"Written by":"richard@baronsoftware.com","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/#article","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/"},"author":{"name":"richard@baronsoftware.com","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd"},"headline":"Being Secured Against Hackers and Criminals dealing with Covid-19 and other viruses","datePublished":"2020-04-20T21:51:00+00:00","dateModified":"2020-04-20T21:51:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/"},"wordCount":530,"commentCount":0,"publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/04\/hacker-with-laptop_23-2147985341.jpg","keywords":["Emails"],"articleSection":["Rad Studio Delphi Development"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/","url":"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/","name":"Being Secured Against Hackers and Criminals dealing with Covid-19 and other viruses - Baron Software","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/#primaryimage"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/04\/hacker-with-laptop_23-2147985341.jpg","datePublished":"2020-04-20T21:51:00+00:00","dateModified":"2020-04-20T21:51:02+00:00","breadcrumb":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/#primaryimage","url":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/04\/hacker-with-laptop_23-2147985341.jpg?fit=626%2C417&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/04\/hacker-with-laptop_23-2147985341.jpg?fit=626%2C417&ssl=1","width":626,"height":417},{"@type":"BreadcrumbList","@id":"https:\/\/www.baronsoftware.com\/Blog\/being-secured-against-hackers-and-criminals-dealing-with-covid-19-and-other-viruses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.baronsoftware.com\/Blog\/"},{"@type":"ListItem","position":2,"name":"Being Secured Against Hackers and Criminals dealing with Covid-19 and other viruses"}]},{"@type":"WebSite","@id":"https:\/\/www.baronsoftware.com\/Blog\/#website","url":"https:\/\/www.baronsoftware.com\/Blog\/","name":"Baron Software","description":"Highest Quality Software Developed.","publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.baronsoftware.com\/Blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization","name":"Baron Software","url":"https:\/\/www.baronsoftware.com\/Blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","contentUrl":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","width":1920,"height":400,"caption":"Baron Software"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Rbaroniunas"]},{"@type":"Person","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd","name":"richard@baronsoftware.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","caption":"richard@baronsoftware.com"}}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2e6qU-gd","jetpack-related-posts":[{"id":651,"url":"https:\/\/www.baronsoftware.com\/Blog\/zdnet-predicts-will-2018-see-death-printers-email-workplace\/","url_meta":{"origin":1005,"position":0},"title":"ZDNet predicts will 2018 see the death of printers and email in the workplace?","author":"richard@baronsoftware.com","date":"January 4, 2018","format":false,"excerpt":"ZDNet predicts will 2018 see the death of printers and email in the workplace? Well as it is expected to come the latest predictions are coming out of the wood work.\u00a0 ZDNet has predicted that the end of email and the printer in the work place is a thing that\u2026","rel":"","context":"In &quot;News Items&quot;","block_context":{"text":"News Items","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/news-items\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/is-300x276.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":578,"url":"https:\/\/www.baronsoftware.com\/Blog\/veeam-agent-microsoft-windows-free\/","url_meta":{"origin":1005,"position":1},"title":"Veeam Agent  for Microsoft Windows FREE","author":"richard@baronsoftware.com","date":"September 14, 2017","format":false,"excerpt":"Veeam Agent for Microsoft Windows FREE Veeam Agent for\u00a0Microsoft Windows is\u00a0a\u00a0simple, standalone agent that delivers backup and recovery for\u00a0Windows servers and workstations running in\u00a0the public cloud, for\u00a0physical Windows servers and workstations, and endpoints running on\u2011premises. It delivers all-new functionality to\u00a0give you features and capabilities unheard of\u00a0in\u00a0a\u00a0FREE desktop backup, and data\u2026","rel":"","context":"In &quot;Software Releases&quot;","block_context":{"text":"Software Releases","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/software-releases\/"},"img":{"alt_text":"Veeam","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo-300x53.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":757,"url":"https:\/\/www.baronsoftware.com\/Blog\/will-facebook-dislike-button-not-question\/","url_meta":{"origin":1005,"position":2},"title":"Will Facebook have a Dislike button or not is the question","author":"richard@baronsoftware.com","date":"February 13, 2018","format":false,"excerpt":"Will Facebook have a Dislike button or not is the question ? Facebook is testing a dislike button with certain users, effectively creating the \u201cdislike\u201d button.\u00a0 This has been something in the making for the past 3 to 4 years with various users wishing that they could put that on\u2026","rel":"","context":"In &quot;Software Events&quot;","block_context":{"text":"Software Events","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/software-events\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":419,"url":"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/","url_meta":{"origin":1005,"position":3},"title":"Cybersecurity risks expected to increase in 2017","author":"richard@baronsoftware.com","date":"February 10, 2017","format":false,"excerpt":"Cybersecurity risks expected to increase in 2017 The year 2016 saw a rise in cyber-attacks, both ransomware and distributed denial-of-service (DDoS) on small and large corporations globally. \u00a0Close to 50 percent of companies were subjected to some form of cyber-ransom attack in 2016. \u00a0Whether the ransom was medical records or\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"Baron Software","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo-300x53.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":501,"url":"https:\/\/www.baronsoftware.com\/Blog\/half-windows-7-machines-dont-run-av-microsoft\/","url_meta":{"origin":1005,"position":4},"title":"Half of Windows 7 machines do not run AV software","author":"richard@baronsoftware.com","date":"August 24, 2017","format":false,"excerpt":"Half of Windows 7 machines do not run AV software It has been disclosed by Microsoft that Windows older desktop operating systems remains more vulnerable to malware as of today. \u00a0The majority of users are still running older versions of Windows, without necessarily using up to date security software which\u2026","rel":"","context":"In &quot;Microsoft Development&quot;","block_context":{"text":"Microsoft Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/microsoft-development\/"},"img":{"alt_text":"AV","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/10\/microsofts-logo-gets-a-makeover-300x225.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1228,"url":"https:\/\/www.baronsoftware.com\/Blog\/important-cybersecurity-tips-to-help-protect-your-financial-accounts\/","url_meta":{"origin":1005,"position":5},"title":"Important Cybersecurity Tips to Help Protect Your Financial Accounts","author":"richard@baronsoftware.com","date":"July 23, 2025","format":false,"excerpt":"Help Protect Your Finances with these 5 Quick cybersecurity Tips \u00a0 Help stay ahead of cyber threats with these simple tips to help keep your financial information safeUse Strong Passwords Create unique passwords that are difficult to guess by using strong password suggestions or a password manager. Be sure to\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/cybersecurity\/"},"img":{"alt_text":"Cybersecurity Tips","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/image-1.png?fit=1024%2C768&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/image-1.png?fit=1024%2C768&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/image-1.png?fit=1024%2C768&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/image-1.png?fit=1024%2C768&ssl=1&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/1005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/comments?post=1005"}],"version-history":[{"count":1,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/1005\/revisions"}],"predecessor-version":[{"id":1007,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/1005\/revisions\/1007"}],"wp:attachment":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/media?parent=1005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/categories?post=1005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/tags?post=1005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}