{"id":419,"date":"2017-02-10T13:11:52","date_gmt":"2017-02-10T18:11:52","guid":{"rendered":"https:\/\/www.baronsoftware.com\/Blog\/?p=419"},"modified":"2017-02-10T13:11:52","modified_gmt":"2017-02-10T18:11:52","slug":"cybersecurity-risks-expected-increase-2017","status":"publish","type":"post","link":"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/","title":{"rendered":"Cybersecurity risks expected to increase in 2017"},"content":{"rendered":"<h1 style=\"text-align: center;\"><a href=\"https:\/\/www.baronsoftware.com\"><img data-recalc-dims=\"1\" decoding=\"async\" data-attachment-id=\"7\" data-permalink=\"https:\/\/www.baronsoftware.com\/Blog\/delphi-create-a-process-or-shelling-to-start-up-an-external-application\/logo\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo-e1515620410626.jpg?fit=200%2C36&amp;ssl=1\" data-orig-size=\"200,36\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"logo\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo-e1515620410626.jpg?fit=200%2C36&amp;ssl=1\" class=\"aligncenter size-medium wp-image-7\" src=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo.jpg?resize=300%2C53&#038;ssl=1\" alt=\"Baron Software\" width=\"300\" height=\"53\" \/><\/a><\/h1>\n<h1 style=\"text-align: center;\">Cybersecurity risks expected to increase in 2017<\/h1>\n<p>The year 2016 saw a rise in cyber-attacks, both ransomware and distributed denial-of-service (DDoS) on small and large corporations globally. \u00a0Close to 50 percent of companies were subjected to some form of cyber-ransom attack in 2016. \u00a0Whether the ransom was medical records or street lamps, the threat is real. \u00a0Major DDoS attacks compromised many websites including prominent ones such as Twitter, Netflix, PayPal, and Pinterest. Yahoo was hit with the biggest data breach in history with information being stolen from 500 million user accounts.<\/p>\n<h2 style=\"text-align: center;\">Company concerns should focus on these items<\/h2>\n<ul>\n<li>Data loss.<\/li>\n<li>Service Outage.<\/li>\n<li>Damaged Reputation.<\/li>\n<li>Customers or partners loss.\n<p>According to a recent report by Forbes on cybersecurity risks in Asia-pacific in 2017, DDoS attacks will be an increasing threat to businesses in Singapore. In October 2016, local Telco StarHub was hit by a DDoS attack which led to an outage in broadband services of the customers. \u00a0Those are only the few that the news actually was released. \u00a0As with the United States, secure servers must be on everyone&#8217;s mind. \u00a0 The Democratic party was hacked over the election cycle releasing countless emails.<\/li>\n<\/ul>\n<h2 style=\"text-align: center;\">Companies must <strong>formulate<\/strong> a response plan<\/h2>\n<p>&nbsp;<\/p>\n<p>Though the attacks are increasing, 40% of businesses do not have an incident response plan in place. While all attacks cannot be prevented, it is important to implement systems to notify internal and external stakeholders immediately to minimize disruption in case of unplanned system downtime. Failure to respond quickly can result in the loss of costly investments, opportunities as well as the reputation and customer loss.<\/p>\n<p>Baron Software has provided the implementation plan for all companies to invest a strategic plan to educate the staff as well as securing the equipment from outside threats. \u00a0This is reality for anyone who has access to internal systems whether they are email or data servers, defense must be the plan of attack. \u00a0You can always request information on how Baron Software can assist in devising that response plan.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity risks expected to increase in 2017 The year 2016 saw a rise in cyber-attacks, both ransomware and distributed denial-of-service (DDoS) on small and large corporations globally. \u00a0Close to 50 percent of companies were subjected to some form of cyber-ransom attack in 2016. \u00a0Whether the ransom was medical records or street lamps, the threat is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[11,3],"tags":[21,79,80,7,22,47,40,29,28,15,51,38,36],"class_list":["post-419","post","type-post","status-publish","format-standard","hentry","category-pc-tips-bits-bytes","category-software-events","tag-computers","tag-cybersecurity","tag-ddos","tag-development","tag-google","tag-idera","tag-imac","tag-linux","tag-mac","tag-microsoft","tag-microsoft-office","tag-powerstudio","tag-sql-server"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity risks expected to increase in 2017 - Baron Software<\/title>\n<meta name=\"description\" content=\"The year 2016 saw a rise in cyber-attacks, both ransomware and distributed denial-of-service, begin the process of protecting your investments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity risks expected to increase in 2017\" \/>\n<meta property=\"og:description\" content=\"The year 2016 saw a rise in cyber-attacks, both ransomware and distributed denial-of-service, begin the process of protecting your investments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"Baron Software\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-10T18:11:52+00:00\" \/>\n<meta name=\"author\" content=\"richard@baronsoftware.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cybersecurity risks expected to increase in 2017\" \/>\n<meta name=\"twitter:description\" content=\"The year 2016 saw a rise in cyber-attacks, both ransomware and distributed denial-of-service, begin the process of protecting your investments.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:site\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"richard@baronsoftware.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/cybersecurity-risks-expected-increase-2017\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/cybersecurity-risks-expected-increase-2017\\\/\"},\"author\":{\"name\":\"richard@baronsoftware.com\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\"},\"headline\":\"Cybersecurity risks expected to increase in 2017\",\"datePublished\":\"2017-02-10T18:11:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/cybersecurity-risks-expected-increase-2017\\\/\"},\"wordCount\":331,\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/cybersecurity-risks-expected-increase-2017\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2014\\\/12\\\/logo-300x53.jpg\",\"keywords\":[\"computers\",\"cybersecurity\",\"DDoS\",\"Development\",\"Google\",\"Idera\",\"iMac\",\"Linux\",\"Mac\",\"Microsoft\",\"Microsoft Office\",\"Powerstudio\",\"SQL Server\"],\"articleSection\":[\"Computer PC Tips - bits and bytes\",\"Software Events\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/cybersecurity-risks-expected-increase-2017\\\/\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/cybersecurity-risks-expected-increase-2017\\\/\",\"name\":\"Cybersecurity risks expected to increase in 2017 - Baron Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/cybersecurity-risks-expected-increase-2017\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/cybersecurity-risks-expected-increase-2017\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2014\\\/12\\\/logo-300x53.jpg\",\"datePublished\":\"2017-02-10T18:11:52+00:00\",\"description\":\"The year 2016 saw a rise in cyber-attacks, both ransomware and distributed denial-of-service, begin the process of protecting your investments.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/cybersecurity-risks-expected-increase-2017\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/cybersecurity-risks-expected-increase-2017\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/cybersecurity-risks-expected-increase-2017\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2014\\\/12\\\/logo-300x53.jpg\",\"contentUrl\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2014\\\/12\\\/logo-300x53.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/cybersecurity-risks-expected-increase-2017\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity risks expected to increase in 2017\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"name\":\"Baron Software\",\"description\":\"Highest Quality Software Developed.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\",\"name\":\"Baron Software\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"width\":1920,\"height\":400,\"caption\":\"Baron Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/Rbaroniunas\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\",\"name\":\"richard@baronsoftware.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"caption\":\"richard@baronsoftware.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity risks expected to increase in 2017 - Baron Software","description":"The year 2016 saw a rise in cyber-attacks, both ransomware and distributed denial-of-service, begin the process of protecting your investments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity risks expected to increase in 2017","og_description":"The year 2016 saw a rise in cyber-attacks, both ransomware and distributed denial-of-service, begin the process of protecting your investments.","og_url":"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/","og_site_name":"Baron Software","article_published_time":"2017-02-10T18:11:52+00:00","author":"richard@baronsoftware.com","twitter_card":"summary_large_image","twitter_title":"Cybersecurity risks expected to increase in 2017","twitter_description":"The year 2016 saw a rise in cyber-attacks, both ransomware and distributed denial-of-service, begin the process of protecting your investments.","twitter_image":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo.jpg","twitter_creator":"@Rbaroniunas","twitter_site":"@Rbaroniunas","twitter_misc":{"Written by":"richard@baronsoftware.com","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/#article","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/"},"author":{"name":"richard@baronsoftware.com","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd"},"headline":"Cybersecurity risks expected to increase in 2017","datePublished":"2017-02-10T18:11:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/"},"wordCount":331,"publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo-300x53.jpg","keywords":["computers","cybersecurity","DDoS","Development","Google","Idera","iMac","Linux","Mac","Microsoft","Microsoft Office","Powerstudio","SQL Server"],"articleSection":["Computer PC Tips - bits and bytes","Software Events"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/","url":"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/","name":"Cybersecurity risks expected to increase in 2017 - Baron Software","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/#primaryimage"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo-300x53.jpg","datePublished":"2017-02-10T18:11:52+00:00","description":"The year 2016 saw a rise in cyber-attacks, both ransomware and distributed denial-of-service, begin the process of protecting your investments.","breadcrumb":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/#primaryimage","url":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo-300x53.jpg","contentUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo-300x53.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.baronsoftware.com\/Blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity risks expected to increase in 2017"}]},{"@type":"WebSite","@id":"https:\/\/www.baronsoftware.com\/Blog\/#website","url":"https:\/\/www.baronsoftware.com\/Blog\/","name":"Baron Software","description":"Highest Quality Software Developed.","publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.baronsoftware.com\/Blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization","name":"Baron Software","url":"https:\/\/www.baronsoftware.com\/Blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","contentUrl":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","width":1920,"height":400,"caption":"Baron Software"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Rbaroniunas"]},{"@type":"Person","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd","name":"richard@baronsoftware.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","caption":"richard@baronsoftware.com"}}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2e6qU-6L","jetpack-related-posts":[{"id":832,"url":"https:\/\/www.baronsoftware.com\/Blog\/github-ddos-attack-put-them-offline-for-10-minutes\/","url_meta":{"origin":419,"position":0},"title":"GitHub DDoS attack put them offline for 10 minutes","author":"richard@baronsoftware.com","date":"March 8, 2018","format":false,"excerpt":"GitHub DDoS attack put them offline for 10 minutes GitHub recently revealed that the web site was crippled for a full 10 minutes forcing it to be offline for 10 minutes while the engineers recovered the systems.\u00a0 This is one of the\u00a0largest-known DDoS attack in history. DDoS or distributed denial\u2026","rel":"","context":"In &quot;News Items&quot;","block_context":{"text":"News Items","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/news-items\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1-300x62.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1228,"url":"https:\/\/www.baronsoftware.com\/Blog\/important-cybersecurity-tips-to-help-protect-your-financial-accounts\/","url_meta":{"origin":419,"position":1},"title":"Important Cybersecurity Tips to Help Protect Your Financial Accounts","author":"richard@baronsoftware.com","date":"July 23, 2025","format":false,"excerpt":"Help Protect Your Finances with these 5 Quick cybersecurity Tips \u00a0 Help stay ahead of cyber threats with these simple tips to help keep your financial information safeUse Strong Passwords Create unique passwords that are difficult to guess by using strong password suggestions or a password manager. Be sure to\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/cybersecurity\/"},"img":{"alt_text":"Cybersecurity Tips","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/image-1.png?fit=1024%2C768&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/image-1.png?fit=1024%2C768&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/image-1.png?fit=1024%2C768&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/image-1.png?fit=1024%2C768&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":891,"url":"https:\/\/www.baronsoftware.com\/Blog\/mcafee-finds-that-gamers-can-work-cyber-security-jobs\/","url_meta":{"origin":419,"position":2},"title":"McAfee finds that gamers can work cyber security jobs","author":"richard@baronsoftware.com","date":"April 10, 2018","format":false,"excerpt":"McAfee finds that gamers can work cyber security jobs The Santa Clara, California-based cyber security company said it did a survey of 300 senior security\u00a0managers and 650 security professionals at major corporations. And 78 percent of respondents said that the current generation entering the work force \u2014 those that grew\u2026","rel":"","context":"In &quot;News Items&quot;","block_context":{"text":"News Items","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/news-items\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1-300x60.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":497,"url":"https:\/\/www.baronsoftware.com\/Blog\/kaspersky-lab-working-russian-intelligence\/","url_meta":{"origin":419,"position":3},"title":"Kaspersky Lab Has Been Working With Russian Intelligence","author":"richard@baronsoftware.com","date":"August 23, 2017","format":false,"excerpt":"Kaspersky Lab Has Been Working With Russian Intelligence U.S.\u00a0\u00a0intelligence agencies have turned up the heat in recent days on Kaspersky Lab. \u00a0The Moscow-based cybersecurity giant long suspected of ties to Russia\u2019s spying apparatus. It has been announced that\u00a0Russian cybersecurity company\u00a0Kaspersky Lab\u00a0boasts 400 million users worldwide. As many as 200 million\u2026","rel":"","context":"In &quot;Software Events&quot;","block_context":{"text":"Software Events","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/software-events\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1252,"url":"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/","url_meta":{"origin":419,"position":4},"title":"Malwarebytes reports Instagram security breach","author":"richard@baronsoftware.com","date":"January 10, 2026","format":false,"excerpt":"This week, Malwarebytes discovered that hackers stole the sensitive information of 17.5 million Instagram accounts. This data includes usernames, physical addresses, phone numbers, and email addresses. Cybercriminals can abuse this information to impersonate trusted brands. They can trick users and steal their passwords. Critically, this data is already being offered\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2026\/01\/Instagram.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":974,"url":"https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/","url_meta":{"origin":419,"position":5},"title":"Importance of Cyber security","author":"richard@baronsoftware.com","date":"December 23, 2019","format":false,"excerpt":"Data Security can no longer be a requirement of the IT Department. It is vital that the entire company that are within the network be on their utmost watch. Cyber security rules and staff must be in place as of today. Data Breaches Watching current events there has been reports\u2026","rel":"","context":"In &quot;Rad Studio Delphi Development&quot;","block_context":{"text":"Rad Studio Delphi Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/rad-studio-embarcadero-delphi-development\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/comments?post=419"}],"version-history":[{"count":1,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/419\/revisions"}],"predecessor-version":[{"id":420,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/419\/revisions\/420"}],"wp:attachment":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/media?parent=419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/categories?post=419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/tags?post=419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}