{"id":382,"date":"2016-12-16T11:36:38","date_gmt":"2016-12-16T16:36:38","guid":{"rendered":"https:\/\/www.baronsoftware.com\/Blog\/?p=382"},"modified":"2016-12-16T11:36:38","modified_gmt":"2016-12-16T16:36:38","slug":"learning-yahoo-hack-protect","status":"publish","type":"post","link":"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/","title":{"rendered":"Learning from the Yahoo hack and how to protect yourself"},"content":{"rendered":"<h2 style=\"text-align: center;\">Learning from the Yahoo hack and how to protect yourself<\/h2>\n<p><a href=\"http:\/\/www.eweek.com\/security\/yahoo-suffers-new-hack-1-billion-users-impacted-this-time.html?utm_medium=email&amp;utm_campaign=EWK_NL_BOE_20161216_STR5L1&amp;dni=384124264&amp;rni=21957237\"><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" data-attachment-id=\"383\" data-permalink=\"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/yahoohacked\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?fit=605%2C391&amp;ssl=1\" data-orig-size=\"605,391\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;Chris Preimesberger&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1481729942&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Yahoohacked\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Yahoo is hacked.&lt;\/p&gt;\n\" data-medium-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?fit=300%2C194&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?fit=605%2C391&amp;ssl=1\" class=\"size-full wp-image-383\" src=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?resize=605%2C391&#038;ssl=1\" alt=\"Yahoo Hack\" width=\"605\" height=\"391\" srcset=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?w=605&amp;ssl=1 605w, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?resize=300%2C194&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?resize=140%2C90&amp;ssl=1 140w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/a><\/p>\n<p>How and what can you do to protect yourself or your company from being hacked from malware or virus ?\u00a0 Some of this are very simple steps that you can do on a daily basis.<\/p>\n<h3 style=\"text-align: center;\">Safe steps to protect yourself<\/h3>\n<p>Step 1 &#8211; Make sure the email you are receiving is from someone or company you know before you do anything.\u00a0 Opening up an email can trigger an attempt by an outside party to install something on your system.<\/p>\n<p>Step 2 &#8211; Make sure your workstations and servers have up to date virus and malware software installed.\u00a0\u00a0Staying on top of updates is now necessary due to the daily virus creations that are being done.\u00a0 You need to make sure that you have the best performing malware \/ virus software and our recommendation is <a href=\"https:\/\/us.norton.com\/?&amp;om_sem_cid=hho_sem_sy:us:ggl:en:e|kw0000501755|164599283480|c&amp;country=US&amp;gclid=CjwKEAiAvs7CBRC24rao6bGCoiASJABaCt5DYhvlsBOJy2p_OsusuJFQfeFEyJj-Q3V06OIhAhJrJRoCx2nw_wcB\" target=\"_blank\">Symantec &#8211; Norton Security software<\/a><\/p>\n<p>Step 3 &#8211; Attachments can have malware &#8211; viruses inserted in them.\u00a0 If you do not know the company or person that has sent you the attachment your best bet is delete the email.\u00a0 Simply clicking on it may insert an application that will copy your personal information, credit card information or any other valuable piece of information.\u00a0 One current scheme is to send invoices with a claimer that the person is about to be taken to court.\u00a0 Usually this would scare folks into easily opening the attachment and then a hacker is let into the machine.<\/p>\n<p>Step 4 &#8211; Beware of web sites that have current events or products that are declared free as well as pornographic web sites offering free movies and images.\u00a0 These are the web sites that will insert a virus or malware that could steal your personal information.<\/p>\n<p>Step 5 &#8211; downloading or installing free software from friends.\u00a0 Just because you think you have gotten the deal of the century your machine may be taken over.\u00a0 There is no such thing as a free lunch unless it is from your mother.<\/p>\n<p>Step 6 &#8211; Password protect your router, set up a strong password on the wireless account as well.\u00a0 A simple strong password will contain a mixture of letters, special symbols and numbers.\u00a0 Something like your dog&#8217;s name can look like R88I&amp;N*G%O will protect you a long way.\u00a0 There are some stories that users have 1234 or PASSWORD which is a BAD idea.<\/p>\n<p>Step 7 &#8211; Enforce the internal users to change their passwords at the very least 90 days.<\/p>\n<p>Step 8 &#8211; Keep up with your backups daily or at least once a week.\u00a0 Machines that are hacked can become useless or even RANSOM.\u00a0 A Ransomed machine is something such as the FBI virus which placed a FBI warning and requested folks to purchase a $200.00 cash card to be given to the hacker.\u00a0 You need to call a specialist or reinstall the operating system to overcome this.<\/p>\n<p>Follow the company security guide lines on protecting yourself and your job.\u00a0 If your company does not have any security guide lines then speak to your IT department to make it a formal request.\u00a0 Even following these simple steps will go a long way in protecting you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learning from the Yahoo hack and how to protect yourself How and what can you do to protect yourself or your company from being hacked from malware or virus ?\u00a0 Some of this are very simple steps that you can do on a daily basis. Safe steps to protect yourself Step 1 &#8211; Make sure [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[11,31],"tags":[],"class_list":["post-382","post","type-post","status-publish","format-standard","hentry","category-pc-tips-bits-bytes","category-software-development-concepts"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Learning from the Yahoo hack and how to protect yourself - Baron Software<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Learning from the Yahoo hack and how to protect yourself\" \/>\n<meta property=\"og:description\" content=\"Simple steps to protect your workstation at home and work from possible hackers\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/\" \/>\n<meta property=\"og:site_name\" content=\"Baron Software\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-16T16:36:38+00:00\" \/>\n<meta name=\"author\" content=\"richard@baronsoftware.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Learning from the Yahoo hack and how to protect yourself\" \/>\n<meta name=\"twitter:description\" content=\"Simple steps to protect your workstation at home and work from possible hackers\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:site\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"richard@baronsoftware.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/\"},\"author\":{\"name\":\"richard@baronsoftware.com\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd\"},\"headline\":\"Learning from the Yahoo hack and how to protect yourself\",\"datePublished\":\"2016-12-16T16:36:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/\"},\"wordCount\":532,\"publisher\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg\",\"articleSection\":[\"Computer PC Tips - bits and bytes\",\"Software development Concepts\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/\",\"url\":\"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/\",\"name\":\"Learning from the Yahoo hack and how to protect yourself - Baron Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg\",\"datePublished\":\"2016-12-16T16:36:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?fit=605%2C391&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?fit=605%2C391&ssl=1\",\"width\":605,\"height\":391,\"caption\":\"Yahoo is hacked.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.baronsoftware.com\/Blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Learning from the Yahoo hack and how to protect yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#website\",\"url\":\"https:\/\/www.baronsoftware.com\/Blog\/\",\"name\":\"Baron Software\",\"description\":\"Highest Quality Software Developed.\",\"publisher\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.baronsoftware.com\/Blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#organization\",\"name\":\"Baron Software\",\"url\":\"https:\/\/www.baronsoftware.com\/Blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"contentUrl\":\"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"width\":1920,\"height\":400,\"caption\":\"Baron Software\"},\"image\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/Rbaroniunas\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd\",\"name\":\"richard@baronsoftware.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"caption\":\"richard@baronsoftware.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Learning from the Yahoo hack and how to protect yourself - Baron Software","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/","og_locale":"en_US","og_type":"article","og_title":"Learning from the Yahoo hack and how to protect yourself","og_description":"Simple steps to protect your workstation at home and work from possible hackers","og_url":"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/","og_site_name":"Baron Software","article_published_time":"2016-12-16T16:36:38+00:00","author":"richard@baronsoftware.com","twitter_card":"summary_large_image","twitter_title":"Learning from the Yahoo hack and how to protect yourself","twitter_description":"Simple steps to protect your workstation at home and work from possible hackers","twitter_image":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo.jpg","twitter_creator":"@Rbaroniunas","twitter_site":"@Rbaroniunas","twitter_misc":{"Written by":"richard@baronsoftware.com","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/#article","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/"},"author":{"name":"richard@baronsoftware.com","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd"},"headline":"Learning from the Yahoo hack and how to protect yourself","datePublished":"2016-12-16T16:36:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/"},"wordCount":532,"publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg","articleSection":["Computer PC Tips - bits and bytes","Software development Concepts"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/","url":"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/","name":"Learning from the Yahoo hack and how to protect yourself - Baron Software","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/#primaryimage"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg","datePublished":"2016-12-16T16:36:38+00:00","breadcrumb":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/#primaryimage","url":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?fit=605%2C391&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?fit=605%2C391&ssl=1","width":605,"height":391,"caption":"Yahoo is hacked."},{"@type":"BreadcrumbList","@id":"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.baronsoftware.com\/Blog\/"},{"@type":"ListItem","position":2,"name":"Learning from the Yahoo hack and how to protect yourself"}]},{"@type":"WebSite","@id":"https:\/\/www.baronsoftware.com\/Blog\/#website","url":"https:\/\/www.baronsoftware.com\/Blog\/","name":"Baron Software","description":"Highest Quality Software Developed.","publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.baronsoftware.com\/Blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization","name":"Baron Software","url":"https:\/\/www.baronsoftware.com\/Blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","contentUrl":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","width":1920,"height":400,"caption":"Baron Software"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Rbaroniunas"]},{"@type":"Person","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd","name":"richard@baronsoftware.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","caption":"richard@baronsoftware.com"}}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2e6qU-6a","jetpack-related-posts":[{"id":974,"url":"https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/","url_meta":{"origin":382,"position":0},"title":"Importance of Cyber security","author":"richard@baronsoftware.com","date":"December 23, 2019","format":false,"excerpt":"Data Security can no longer be a requirement of the IT Department. It is vital that the entire company that are within the network be on their utmost watch. Cyber security rules and staff must be in place as of today. Data Breaches Watching current events there has been reports\u2026","rel":"","context":"In &quot;Rad Studio Delphi Development&quot;","block_context":{"text":"Rad Studio Delphi Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/rad-studio-embarcadero-delphi-development\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":591,"url":"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/","url_meta":{"origin":382,"position":1},"title":"Hackers hid malware in CCleaner software","author":"richard@baronsoftware.com","date":"September 20, 2017","format":false,"excerpt":"Hackers hid malware in CCleaner software Hackers have successfully breached CCleaner\u2019s security to inject malware into the app and distribute it to millions of users.\u00a0Security researchers at Cisco Talos discovered\u00a0that download servers used by Avast (the company that owns CCleaner) were compromised to distribute malware inside CCleaner. CCleaner Version 5.33\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2017\/09\/cc_128.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":501,"url":"https:\/\/www.baronsoftware.com\/Blog\/half-windows-7-machines-dont-run-av-microsoft\/","url_meta":{"origin":382,"position":2},"title":"Half of Windows 7 machines do not run AV software","author":"richard@baronsoftware.com","date":"August 24, 2017","format":false,"excerpt":"Half of Windows 7 machines do not run AV software It has been disclosed by Microsoft that Windows older desktop operating systems remains more vulnerable to malware as of today. \u00a0The majority of users are still running older versions of Windows, without necessarily using up to date security software which\u2026","rel":"","context":"In &quot;Microsoft Development&quot;","block_context":{"text":"Microsoft Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/microsoft-development\/"},"img":{"alt_text":"AV","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/10\/microsofts-logo-gets-a-makeover-300x225.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":828,"url":"https:\/\/www.baronsoftware.com\/Blog\/how-to-secure-your-wordpress-blog\/","url_meta":{"origin":382,"position":3},"title":"How to Secure and increase performance on your WordPress Blog","author":"richard@baronsoftware.com","date":"March 7, 2018","format":false,"excerpt":"How to Secure and increase performance on your WordPress Blog To secure your wordpress blog it is an extremely good idea to follow some of the steps located below as well as increasing performance for your readers. SSD-Powered Storage Delivers Content Up to 20x Faster Hosting providers that include high-performance,\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1-300x62.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":887,"url":"https:\/\/www.baronsoftware.com\/Blog\/avast-claims-its-secure-browser-is-30-percent-faster-than-yours\/","url_meta":{"origin":382,"position":4},"title":"Avast claims its secure browser is 30 percent faster than yours","author":"richard@baronsoftware.com","date":"April 8, 2018","format":false,"excerpt":"Avast claims its secure browser is 30 percent faster than yours Avast\u00a0has updated its browser to give users greater control over their online privacy. According to the company, its renamed Avast Secure Browser (formerly SafeZone) is designed to plug the security gaps that result from users' misplaced protection expectations. Features\u2026","rel":"","context":"In &quot;News Items&quot;","block_context":{"text":"News Items","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/news-items\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1-300x60.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":853,"url":"https:\/\/www.baronsoftware.com\/Blog\/google-believes-android-is-as-secure-as-ios\/","url_meta":{"origin":382,"position":5},"title":"Google believes Android is as secure as iOS","author":"richard@baronsoftware.com","date":"March 21, 2018","format":false,"excerpt":"Google believes Android is as secure as iOS Google recently published its fourth annual year in review for Android's security and looking\u00a0 through the comprehensive,\u00a056-page report\u00a0yourself there are various items you can see and determine whether they are legit. Machine learning is playing a huge role in securing Android devices.\u2026","rel":"","context":"In &quot;Software Events&quot;","block_context":{"text":"Software Events","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/software-events\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1-300x62.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/comments?post=382"}],"version-history":[{"count":1,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/382\/revisions"}],"predecessor-version":[{"id":384,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/382\/revisions\/384"}],"wp:attachment":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/media?parent=382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/categories?post=382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/tags?post=382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}