{"id":974,"date":"2019-12-23T13:15:23","date_gmt":"2019-12-23T18:15:23","guid":{"rendered":"https:\/\/www.baronsoftware.com\/Blog\/?p=974"},"modified":"2019-12-23T13:15:30","modified_gmt":"2019-12-23T18:15:30","slug":"importance-of-cyber-security","status":"publish","type":"post","link":"https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/","title":{"rendered":"Importance of Cyber security"},"content":{"rendered":"\n<p>Data Security can no longer be a requirement of the IT Department.  It is vital that the entire company that are within the network be on their utmost watch. Cyber security rules and staff must be in place as of today.<\/p>\n\n\n\n<h2>Data Breaches<\/h2>\n\n\n\n<p>Watching current events there has been reports where ransomware took over the data center.  Freezing out the IT department by locking out the entire company from accessing data.   Cyber security measures tend to stop malware from destroying property.<\/p>\n\n\n\n<p>Users need to be aware that a simple click on an attachment can release malware onto the network.  Educating users on using safety first rules will help in protecting the environment. <\/p>\n\n\n\n<h2>Steps on handling internal security<\/h2>\n\n\n\n<p>Here are some steps on setting up cyber security within your environment:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Check that all machines have the latest anti-virus software.  Maintain updates daily for as you know hackers are working 24 hours a day.<\/li><li>Restrict the user from particular web sites they may go to during the business day.  Remember the user is not there to shop during work hours.<\/li><li>Install a <a href=\"https:\/\/www.barracuda.com\/products\/emailsecuritygateway\/models\">Barracuda email security device<\/a>.   Over 75% of targeted cyber-attacks start with an email. Barracuda has been in the business for years.  Barracuda protects you with multiple layers of protection that includes all aspects of your email infrastructure including gateway defense, email resiliency, fraud protection, and user security awareness. <\/li><li>Software that is purchased should be code signed and installed by the IT Department.  Code signing means that the company that wrote the software has been verified as a legit business.<\/li><li>Connecting personal equipment such as notebooks should not be allowed unless they are verified.<\/li><li>Internal Fire walls to protect possible software holes where hackers can breach.<\/li><\/ol>\n\n\n\n<p> There is nothing more important then having a secured environment. Having strict cyber security rules and staff will stop any hacker from attempting to cause harm.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data Security can no longer be a requirement of the IT Department. It is vital that the entire company that are within the network be on their utmost watch. Cyber security rules and staff must be in place as of today. Data Breaches Watching current events there has been reports where ransomware took over the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[5],"tags":[],"class_list":["post-974","post","type-post","status-publish","format-standard","hentry","category-rad-studio-embarcadero-delphi-development"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Importance of Cyber security - Baron Software<\/title>\n<meta name=\"description\" content=\"Security can no longer be a requirement of the IT Department. vital that the entire company always have strong cyber security rules in place.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Importance of Cyber security - Baron Software\" \/>\n<meta property=\"og:description\" content=\"Security can no longer be a requirement of the IT Department. vital that the entire company always have strong cyber security rules in place.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Baron Software\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-23T18:15:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-23T18:15:30+00:00\" \/>\n<meta name=\"author\" content=\"richard@baronsoftware.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Importance of cyber security\" \/>\n<meta name=\"twitter:description\" content=\"Data Security can no longer be a requirement of the IT Department. It is vital that the entire company that are within the network be on their utmost watch. The importance today of cyber security cannot be stressed enough.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2019\/08\/BaronSoftwareLogo_2020.fw_.png?fit=422%2C114&ssl=1\" \/>\n<meta name=\"twitter:creator\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:site\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"richard@baronsoftware.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/importance-of-cyber-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/importance-of-cyber-security\\\/\"},\"author\":{\"name\":\"richard@baronsoftware.com\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\"},\"headline\":\"Importance of Cyber security\",\"datePublished\":\"2019-12-23T18:15:23+00:00\",\"dateModified\":\"2019-12-23T18:15:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/importance-of-cyber-security\\\/\"},\"wordCount\":313,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"articleSection\":[\"Rad Studio Delphi Development\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/importance-of-cyber-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/importance-of-cyber-security\\\/\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/importance-of-cyber-security\\\/\",\"name\":\"Importance of Cyber security - Baron Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\"},\"datePublished\":\"2019-12-23T18:15:23+00:00\",\"dateModified\":\"2019-12-23T18:15:30+00:00\",\"description\":\"Security can no longer be a requirement of the IT Department. vital that the entire company always have strong cyber security rules in place.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/importance-of-cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/importance-of-cyber-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/importance-of-cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Importance of Cyber security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"name\":\"Baron Software\",\"description\":\"Highest Quality Software Developed.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\",\"name\":\"Baron Software\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"width\":1920,\"height\":400,\"caption\":\"Baron Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/Rbaroniunas\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\",\"name\":\"richard@baronsoftware.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"caption\":\"richard@baronsoftware.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Importance of Cyber security - Baron Software","description":"Security can no longer be a requirement of the IT Department. vital that the entire company always have strong cyber security rules in place.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Importance of Cyber security - Baron Software","og_description":"Security can no longer be a requirement of the IT Department. vital that the entire company always have strong cyber security rules in place.","og_url":"https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/","og_site_name":"Baron Software","article_published_time":"2019-12-23T18:15:23+00:00","article_modified_time":"2019-12-23T18:15:30+00:00","author":"richard@baronsoftware.com","twitter_card":"summary_large_image","twitter_title":"Importance of cyber security","twitter_description":"Data Security can no longer be a requirement of the IT Department. It is vital that the entire company that are within the network be on their utmost watch. The importance today of cyber security cannot be stressed enough.","twitter_image":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2019\/08\/BaronSoftwareLogo_2020.fw_.png?fit=422%2C114&ssl=1","twitter_creator":"@Rbaroniunas","twitter_site":"@Rbaroniunas","twitter_misc":{"Written by":"richard@baronsoftware.com","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/#article","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/"},"author":{"name":"richard@baronsoftware.com","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd"},"headline":"Importance of Cyber security","datePublished":"2019-12-23T18:15:23+00:00","dateModified":"2019-12-23T18:15:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/"},"wordCount":313,"commentCount":0,"publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"articleSection":["Rad Studio Delphi Development"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/","url":"https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/","name":"Importance of Cyber security - Baron Software","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#website"},"datePublished":"2019-12-23T18:15:23+00:00","dateModified":"2019-12-23T18:15:30+00:00","description":"Security can no longer be a requirement of the IT Department. vital that the entire company always have strong cyber security rules in place.","breadcrumb":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.baronsoftware.com\/Blog\/"},{"@type":"ListItem","position":2,"name":"Importance of Cyber security"}]},{"@type":"WebSite","@id":"https:\/\/www.baronsoftware.com\/Blog\/#website","url":"https:\/\/www.baronsoftware.com\/Blog\/","name":"Baron Software","description":"Highest Quality Software Developed.","publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.baronsoftware.com\/Blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization","name":"Baron Software","url":"https:\/\/www.baronsoftware.com\/Blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","contentUrl":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","width":1920,"height":400,"caption":"Baron Software"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Rbaroniunas"]},{"@type":"Person","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd","name":"richard@baronsoftware.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","caption":"richard@baronsoftware.com"}}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2e6qU-fI","jetpack-related-posts":[{"id":891,"url":"https:\/\/www.baronsoftware.com\/Blog\/mcafee-finds-that-gamers-can-work-cyber-security-jobs\/","url_meta":{"origin":974,"position":0},"title":"McAfee finds that gamers can work cyber security jobs","author":"richard@baronsoftware.com","date":"April 10, 2018","format":false,"excerpt":"McAfee finds that gamers can work cyber security jobs The Santa Clara, California-based cyber security company said it did a survey of 300 senior security\u00a0managers and 650 security professionals at major corporations. And 78 percent of respondents said that the current generation entering the work force \u2014 those that grew\u2026","rel":"","context":"In &quot;News Items&quot;","block_context":{"text":"News Items","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/news-items\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1-300x60.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":382,"url":"https:\/\/www.baronsoftware.com\/Blog\/learning-yahoo-hack-protect\/","url_meta":{"origin":974,"position":1},"title":"Learning from the Yahoo hack and how to protect yourself","author":"richard@baronsoftware.com","date":"December 16, 2016","format":false,"excerpt":"Learning from the Yahoo hack and how to protect yourself How and what can you do to protect yourself or your company from being hacked from malware or virus ?\u00a0 Some of this are very simple steps that you can do on a daily basis. Safe steps to protect yourself\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"Yahoo Hack","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/Yahoohacked.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":828,"url":"https:\/\/www.baronsoftware.com\/Blog\/how-to-secure-your-wordpress-blog\/","url_meta":{"origin":974,"position":2},"title":"How to Secure and increase performance on your WordPress Blog","author":"richard@baronsoftware.com","date":"March 7, 2018","format":false,"excerpt":"How to Secure and increase performance on your WordPress Blog To secure your wordpress blog it is an extremely good idea to follow some of the steps located below as well as increasing performance for your readers. SSD-Powered Storage Delivers Content Up to 20x Faster Hosting providers that include high-performance,\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1-300x62.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":893,"url":"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/","url_meta":{"origin":974,"position":3},"title":"One-Third of Internal User Accounts Are &#8216;Ghost Users&#8217;","author":"richard@baronsoftware.com","date":"April 10, 2018","format":false,"excerpt":"One-Third of Internal User Accounts Are 'Ghost Users' Due to inadequate access controls on various systems attackers and malware can easily move laterally through an organization destroying content. \u00a0Meager access controls on folders and file systems are leaving organizations wide open to the lateral movement of attackers and malware, according\u2026","rel":"","context":"In &quot;News Items&quot;","block_context":{"text":"News Items","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/news-items\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1-300x60.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":501,"url":"https:\/\/www.baronsoftware.com\/Blog\/half-windows-7-machines-dont-run-av-microsoft\/","url_meta":{"origin":974,"position":4},"title":"Half of Windows 7 machines do not run AV software","author":"richard@baronsoftware.com","date":"August 24, 2017","format":false,"excerpt":"Half of Windows 7 machines do not run AV software It has been disclosed by Microsoft that Windows older desktop operating systems remains more vulnerable to malware as of today. \u00a0The majority of users are still running older versions of Windows, without necessarily using up to date security software which\u2026","rel":"","context":"In &quot;Microsoft Development&quot;","block_context":{"text":"Microsoft Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/microsoft-development\/"},"img":{"alt_text":"AV","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/10\/microsofts-logo-gets-a-makeover-300x225.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":591,"url":"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/","url_meta":{"origin":974,"position":5},"title":"Hackers hid malware in CCleaner software","author":"richard@baronsoftware.com","date":"September 20, 2017","format":false,"excerpt":"Hackers hid malware in CCleaner software Hackers have successfully breached CCleaner\u2019s security to inject malware into the app and distribute it to millions of users.\u00a0Security researchers at Cisco Talos discovered\u00a0that download servers used by Avast (the company that owns CCleaner) were compromised to distribute malware inside CCleaner. CCleaner Version 5.33\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2017\/09\/cc_128.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/comments?post=974"}],"version-history":[{"count":2,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/974\/revisions"}],"predecessor-version":[{"id":976,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/974\/revisions\/976"}],"wp:attachment":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/media?parent=974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/categories?post=974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/tags?post=974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}