{"id":657,"date":"2018-01-07T22:51:50","date_gmt":"2018-01-08T03:51:50","guid":{"rendered":"https:\/\/www.baronsoftware.com\/Blog\/?p=657"},"modified":"2018-01-07T22:51:50","modified_gmt":"2018-01-08T03:51:50","slug":"protect-home-router-attacks","status":"publish","type":"post","link":"https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/","title":{"rendered":"How to Protect Your Home Router from Attacks"},"content":{"rendered":"<h1 class=\"hed-xxl article__title article__title--video\" style=\"text-align: center;\">How to Protect Your Home Router from Attacks<\/h1>\n<p>Protecting everything at your home is essential to your daily life at this point.\u00a0 You are now using a router in your home for everything from smart devices (ipads, iphones, android devices), printers and workstations. Now is the time to follow these simple instructions.<\/p>\n<p><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" data-attachment-id=\"658\" data-permalink=\"https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/image\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/Image.jpg?fit=268%2C188&amp;ssl=1\" data-orig-size=\"268,188\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Image\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/Image.jpg?fit=268%2C188&amp;ssl=1\" class=\"aligncenter size-full wp-image-658\" src=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/Image.jpg?resize=268%2C188&#038;ssl=1\" alt=\"\" width=\"268\" height=\"188\" \/><\/p>\n<h2 style=\"text-align: center;\">Choosing a router<\/h2>\n<p>You get what you paid for.\u00a0 Simple term for simple things, you go cheap and you can expect anybody on the outside to attack your internal structure.\u00a0 Keep in mind you want a solid piece of equipment that provides you with the utmost security and closing down users from the outside.<\/p>\n<h2 style=\"text-align: center;\"><b>Change the default admin password<\/b><\/h2>\n<p>Everybody makes the mistake of not changing a default password when installing a new router.\u00a0 Big mistake.\u00a0 Keeping the default password simply allows outside attackers to log into your router and inflect damage.\u00a0\u00a0Choose a strong password and, if given the option, also change the username for the default administrative account.<\/p>\n<h2 style=\"text-align: center;\"><b>Secure the administrative interface<\/b><\/h2>\n<p>Many routers allow users to expose the admin interface to the internet for remote administration and some older devices even have it configured this way by default. This is a very bad idea even if the admin password is changed, because many of the vulnerabilities found in routers are located in their web-based management interfaces.<\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: center;\"><b>Shutting down services not needed<\/b><\/h2>\n<p>Services like Telnet and SSH (Secure Shell) that provide command-line access to devices should never be exposed to the internet and should also be disabled on the local network unless they&#8217;re actually needed.\u00a0UPnP service should never be exposed to the internet as well.\u00a0 In simple terms, keep only the services you need open otherwise close them down.<\/p>\n<h2 style=\"text-align: center;\">Secure, Secure and Secure more<\/h2>\n<p>Make sure you set up your router with a robust password that is difficult to crack but easy enough for you to remember.\u00a0 Use alphanumeric characters as well as special characters and finally upper and lower case mix.\u00a0 If you do not need the guest account to be open then close it.<\/p>\n<p>Additional information can be <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/9kn3g7\/how-to-protect-your-home-router-from-attacks\" target=\"_blank\" rel=\"noopener\">located here<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to Protect Your Home Router from Attacks Protecting everything at your home is essential to your daily life at this point.\u00a0 You are now using a router in your home for everything from smart devices (ipads, iphones, android devices), printers and workstations. Now is the time to follow these simple instructions. Choosing a router [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[11,153],"tags":[],"class_list":["post-657","post","type-post","status-publish","format-standard","hentry","category-pc-tips-bits-bytes","category-news-items"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Protect Your Home Router from Attacks - Baron Software<\/title>\n<meta name=\"description\" content=\"Protecting everything at your home is essential to your daily life at this point.\u00a0 You are now using a router in your home for everything from smart devices (ipads, iphones, android devices), printers and workstations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Your Home Router from Attacks\" \/>\n<meta property=\"og:description\" content=\"Protecting everything at your home is essential to your daily life at this point.\u00a0 You are now using a router in your home for everything from smart devices (ipads, iphones, android devices), printers and workstations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Baron Software\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-08T03:51:50+00:00\" \/>\n<meta name=\"author\" content=\"richard@baronsoftware.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How to Protect Your Home Router from Attacks\" \/>\n<meta name=\"twitter:description\" content=\"Protecting everything at your home is essential to your daily life at this point.\u00a0 You are now using a router in your home for everything from smart devices (ipads, iphones, android devices), printers and workstations.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:site\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"richard@baronsoftware.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/protect-home-router-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/protect-home-router-attacks\\\/\"},\"author\":{\"name\":\"richard@baronsoftware.com\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\"},\"headline\":\"How to Protect Your Home Router from Attacks\",\"datePublished\":\"2018-01-08T03:51:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/protect-home-router-attacks\\\/\"},\"wordCount\":360,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/protect-home-router-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/Image.jpg\",\"articleSection\":[\"Computer PC Tips - bits and bytes\",\"News Items\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/protect-home-router-attacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/protect-home-router-attacks\\\/\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/protect-home-router-attacks\\\/\",\"name\":\"How to Protect Your Home Router from Attacks - Baron Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/protect-home-router-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/protect-home-router-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/Image.jpg\",\"datePublished\":\"2018-01-08T03:51:50+00:00\",\"description\":\"Protecting everything at your home is essential to your daily life at this point.\u00a0 You are now using a router in your home for everything from smart devices (ipads, iphones, android devices), printers and workstations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/protect-home-router-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/protect-home-router-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/protect-home-router-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/Image.jpg?fit=268%2C188&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/Image.jpg?fit=268%2C188&ssl=1\",\"width\":268,\"height\":188},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/protect-home-router-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Protect Your Home Router from Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"name\":\"Baron Software\",\"description\":\"Highest Quality Software Developed.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\",\"name\":\"Baron Software\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"width\":1920,\"height\":400,\"caption\":\"Baron Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/Rbaroniunas\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\",\"name\":\"richard@baronsoftware.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"caption\":\"richard@baronsoftware.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Your Home Router from Attacks - Baron Software","description":"Protecting everything at your home is essential to your daily life at this point.\u00a0 You are now using a router in your home for everything from smart devices (ipads, iphones, android devices), printers and workstations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/","og_locale":"en_US","og_type":"article","og_title":"How to Protect Your Home Router from Attacks","og_description":"Protecting everything at your home is essential to your daily life at this point.\u00a0 You are now using a router in your home for everything from smart devices (ipads, iphones, android devices), printers and workstations.","og_url":"https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/","og_site_name":"Baron Software","article_published_time":"2018-01-08T03:51:50+00:00","author":"richard@baronsoftware.com","twitter_card":"summary_large_image","twitter_title":"How to Protect Your Home Router from Attacks","twitter_description":"Protecting everything at your home is essential to your daily life at this point.\u00a0 You are now using a router in your home for everything from smart devices (ipads, iphones, android devices), printers and workstations.","twitter_image":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo.jpg","twitter_creator":"@Rbaroniunas","twitter_site":"@Rbaroniunas","twitter_misc":{"Written by":"richard@baronsoftware.com","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/#article","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/"},"author":{"name":"richard@baronsoftware.com","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd"},"headline":"How to Protect Your Home Router from Attacks","datePublished":"2018-01-08T03:51:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/"},"wordCount":360,"commentCount":0,"publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/Image.jpg","articleSection":["Computer PC Tips - bits and bytes","News Items"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/","url":"https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/","name":"How to Protect Your Home Router from Attacks - Baron Software","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/Image.jpg","datePublished":"2018-01-08T03:51:50+00:00","description":"Protecting everything at your home is essential to your daily life at this point.\u00a0 You are now using a router in your home for everything from smart devices (ipads, iphones, android devices), printers and workstations.","breadcrumb":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/#primaryimage","url":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/Image.jpg?fit=268%2C188&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/Image.jpg?fit=268%2C188&ssl=1","width":268,"height":188},{"@type":"BreadcrumbList","@id":"https:\/\/www.baronsoftware.com\/Blog\/protect-home-router-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.baronsoftware.com\/Blog\/"},{"@type":"ListItem","position":2,"name":"How to Protect Your Home Router from Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.baronsoftware.com\/Blog\/#website","url":"https:\/\/www.baronsoftware.com\/Blog\/","name":"Baron Software","description":"Highest Quality Software Developed.","publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.baronsoftware.com\/Blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization","name":"Baron Software","url":"https:\/\/www.baronsoftware.com\/Blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","contentUrl":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","width":1920,"height":400,"caption":"Baron Software"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Rbaroniunas"]},{"@type":"Person","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd","name":"richard@baronsoftware.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","caption":"richard@baronsoftware.com"}}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2e6qU-aB","jetpack-related-posts":[{"id":382,"url":"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/","url_meta":{"origin":657,"position":0},"title":"Learning from the Yahoo hack and how to protect yourself","author":"richard@baronsoftware.com","date":"December 16, 2016","format":false,"excerpt":"Learning from the Yahoo hack and how to protect yourself How and what can you do to protect yourself or your company from being hacked from malware or virus ?\u00a0 Some of this are very simple steps that you can do on a daily basis. Safe steps to protect yourself\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"Yahoo Hack","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1027,"url":"https:\/\/www.baronsoftware.com\/Blog\/purchase-a-western-digitial-my-cloud-nas-server\/","url_meta":{"origin":657,"position":1},"title":"Purchase a Western Digitial My Cloud NAS Server","author":"richard@baronsoftware.com","date":"July 31, 2020","format":false,"excerpt":"The WD 8 TB My Cloud EX2 Ultra NAS Server is a fantastic device to place in your work or home environment. Once connected a user can access the device from all of the internal machines within the office. They can also access the NAS server from the outside world\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/07\/MyCloudEX2Ultra-Hero.jpg.thumb_.1280.1280.jpg?fit=1200%2C586&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/07\/MyCloudEX2Ultra-Hero.jpg.thumb_.1280.1280.jpg?fit=1200%2C586&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/07\/MyCloudEX2Ultra-Hero.jpg.thumb_.1280.1280.jpg?fit=1200%2C586&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/07\/MyCloudEX2Ultra-Hero.jpg.thumb_.1280.1280.jpg?fit=1200%2C586&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/07\/MyCloudEX2Ultra-Hero.jpg.thumb_.1280.1280.jpg?fit=1200%2C586&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1228,"url":"https:\/\/www.baronsoftware.com\/Blog\/important-cybersecurity-tips-to-help-protect-your-financial-accounts\/","url_meta":{"origin":657,"position":2},"title":"Important Cybersecurity Tips to Help Protect Your Financial Accounts","author":"richard@baronsoftware.com","date":"July 23, 2025","format":false,"excerpt":"Help Protect Your Finances with these 5 Quick cybersecurity Tips \u00a0 Help stay ahead of cyber threats with these simple tips to help keep your financial information safeUse Strong Passwords Create unique passwords that are difficult to guess by using strong password suggestions or a password manager. Be sure to\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/cybersecurity\/"},"img":{"alt_text":"Cybersecurity Tips","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/image-1.png?fit=1024%2C768&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/image-1.png?fit=1024%2C768&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/image-1.png?fit=1024%2C768&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/image-1.png?fit=1024%2C768&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1205,"url":"https:\/\/www.baronsoftware.com\/Blog\/cybersecure-cyberdefense-securityhub-protectonline-cyberguard\/","url_meta":{"origin":657,"position":3},"title":"Essential Cybersecurity Tips to Protect Your Personal Information","author":"richard@baronsoftware.com","date":"December 24, 2024","format":false,"excerpt":"It is one thing to lose your credit card but having information stolen from your electronic devise is worse. Stolen personal information can be used for financial fraud, identity theft, and cause privacy issues. If you suspect that your payment card details have been stolen, these are the recommended actions:\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/Hacking.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/Hacking.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/Hacking.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/Hacking.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/Hacking.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2024\/12\/Hacking.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":1252,"url":"https:\/\/www.baronsoftware.com\/Blog\/malwarebytes-instagram\/","url_meta":{"origin":657,"position":4},"title":"Malwarebytes reports Instagram security breach","author":"richard@baronsoftware.com","date":"January 10, 2026","format":false,"excerpt":"This week, Malwarebytes discovered that hackers stole the sensitive information of 17.5 million Instagram accounts. This data includes usernames, physical addresses, phone numbers, and email addresses. Cybercriminals can abuse this information to impersonate trusted brands. They can trick users and steal their passwords. Critically, this data is already being offered\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2026\/01\/Instagram.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":887,"url":"https:\/\/www.baronsoftware.com\/Blog\/avast-claims-its-secure-browser-is-30-percent-faster-than-yours\/","url_meta":{"origin":657,"position":5},"title":"Avast claims its secure browser is 30 percent faster than yours","author":"richard@baronsoftware.com","date":"April 8, 2018","format":false,"excerpt":"Avast claims its secure browser is 30 percent faster than yours Avast\u00a0has updated its browser to give users greater control over their online privacy. According to the company, its renamed Avast Secure Browser (formerly SafeZone) is designed to plug the security gaps that result from users' misplaced protection expectations. Features\u2026","rel":"","context":"In &quot;News Items&quot;","block_context":{"text":"News Items","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/news-items\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1-300x60.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/657","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/comments?post=657"}],"version-history":[{"count":1,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/657\/revisions"}],"predecessor-version":[{"id":659,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/657\/revisions\/659"}],"wp:attachment":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/media?parent=657"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/categories?post=657"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/tags?post=657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}