{"id":23657,"date":"2016-03-14T17:25:56","date_gmt":"2016-03-14T21:25:56","guid":{"rendered":"http:\/\/www.andysowards.com\/blog\/?p=23657"},"modified":"2017-06-27T16:48:32","modified_gmt":"2017-06-27T20:48:32","slug":"cyber-attack-prevention","status":"publish","type":"post","link":"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/","title":{"rendered":"Cyber Attack Prevention"},"content":{"rendered":"<p>The Internet is full of threats. Phishers, malware, Trojan horses and other sneaky cyber crime techniques can devastate a business or an individual. While there are steps you can take if your data and identity is stolen, the best protection prevents attacks before your business or reputation is ruined. But what are the best preventative measures you can take so your data stays safe from cyber attacks? Here are some tips.<\/p>\n<h2>Emails:<\/h2>\n<p><a href=\"http:\/\/techcrunch.com\/2014\/12\/12\/the-founders-guide-to-email-security\/\" target=\"_blank\"><img decoding=\"async\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/founders-guide-to-email-security-680x443.png\" alt=\"founders-guide-to-email-security\" width=\"680\" height=\"443\" class=\"alignnone size-large wp-image-23660 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 680px; --smush-placeholder-aspect-ratio: 680\/443;\" \/><\/a><br \/>\n<em>The Founder\u2019s Guide To Email Security<\/em><\/p>\n<p>Email viruses and malware were one of the first forms of cyber attacks, and though most people have become good at identifying them, email attacks still exist. Tips from the Department of Homeland Security on cyber attacks specifically instruct users not to click on any links within an email. Even if you think the link could be legitimate, one that promotes an offer or sale from a retailer, simply open a new tab on your web browser and visit the site directly. If you think the email is malicious, don&#8217;t open it at all.<\/p>\n<h2>Antivirus:<\/h2>\n<p><a href=\"http:\/\/www.theregister.co.uk\/2015\/02\/09\/dont_count_on_antivirus_alone_to_protect_your_data\/\" target=\"_blank\"><img decoding=\"async\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/dont_count_on_antivirus_alone_to_protect_your_data.jpg\" alt=\"dont_count_on_antivirus_alone_to_protect_your_data\" width=\"640\" height=\"375\" class=\"alignnone size-full wp-image-23662 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 640px; --smush-placeholder-aspect-ratio: 640\/375;\" \/><\/a><br \/>\n<em>Don&#8217;t count on antivirus software alone to keep your data safe<\/em><\/p>\n<p>One of the most powerful lines of defense against cyber attacks is a reputable antivirus and firewall. Antiviruses like Webroot, ESET and Bitdefender constantly monitor and filter threats from the net. A good antivirus like these ones will block email viruses and malware, monitor your online activity and even notify you when you attempt to enter unsecured sites. A reputable antivirus detects and flags threats before they are an issue. All the antiviruses above come in individual subscriptions or business subscriptions for multiple seats. If a business uses mobile devices such as tablets or 2-in-1 hybrids, many cyber security systems, like ESET even support a theft prevention service whereby a phantom account is provided for thieves. Once the phantom account is opened the camera on the device takes a picture of the thief. On the antivirus&#8217;s website you can <a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2372364,00.asp\" target=\"_blank\">report your computer stolen<\/a> and locate it if the thief has accessed the phantom account.<\/p>\n<h2>Authentication:<\/h2>\n<p><a href=\"http:\/\/www.entrepreneur.com\/article\/225468\" target=\"_blank\"><img decoding=\"async\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/protect-small-business-cyber-attack-680x382.jpg\" alt=\"protect-small-business-cyber-attack\" width=\"680\" height=\"382\" class=\"alignnone size-large wp-image-23663 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 680px; --smush-placeholder-aspect-ratio: 680\/382;\" \/><\/a><br \/>\n<em>How to Protect Your Small Business Against a Cyber Attack<\/em><\/p>\n<p>Two-factor authentication is one of the most effective ways to secure your accounts. When enabled on a site or account, when you enter your username and password, the site will redirect and ask for an authentication code. The <a href=\"https:\/\/en.wikipedia.org\/wiki\/Multi-factor_authentication\" target=\"_blank\">authentication code<\/a> is sent to your email, texted via smartphone or shows up on the authentication app. Of course it depends on which authentication services you use. Google provides an app, as does Apple. A third party authenticator, Authy, is also a trusted alternative.<\/p>\n<h2>For Businesses:<\/h2>\n<p><a href=\"http:\/\/www.inc.com\/magazine\/201312\/john-brandon\/ways-hackers-can-get-into-your-business.html\" target=\"_blank\"><img decoding=\"async\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/ways-hackers-can-get-into-your-business-680x315.jpg\" alt=\"ways-hackers-can-get-into-your-business\" width=\"680\" height=\"315\" class=\"alignnone size-large wp-image-23661 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 680px; --smush-placeholder-aspect-ratio: 680\/315;\" \/><\/a><br \/>\n<em>5 Ways Hackers Can Get Into Your Business<\/em><\/p>\n<p>Businesses face unique challenges in the cyber security market. Much of the time, even small companies react slowly while hackers change their strategies constantly for desired results. Many businesses are shocked that their weakest point is their employees. Many security breaches occur because employees partake in activities that are not work related while on company computers. Whether they use a weak password, click on an email link or enter information into a fraudulent site from a work computer, there are many risks. Businesses can eliminate these risks with company policies that discourage employees from personal activities on work computers and servers. If a business utilizes cloud servers, the security around them is commonly more robust than what could be found for localized servers. While security experts are costly for small businesses, a good one can save a business the hassle and heart ache of a cyber attack.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet is full of threats. Phishers, malware, Trojan horses and other sneaky cyber crime techniques can devastate a business or an individual. While there are steps you can take<\/p>\n","protected":false},"author":1,"featured_media":23661,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[109,4206,5695,225,1,5633,107],"tags":[4762,5844,5891,1189,974,4368,988,2464,425,5088,177,5879,21,2896,5890,677,2457,2459],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Attack Prevention<\/title>\n<meta name=\"description\" content=\"The Internet is full of threats. Phishers, malware, Trojan horses and other sneaky cyber crime techniques can devastate a business or an individual. While\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Attack Prevention\" \/>\n<meta property=\"og:description\" content=\"The Internet is full of threats. Phishers, malware, Trojan horses and other sneaky cyber crime techniques can devastate a business or an individual. While\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/\" \/>\n<meta property=\"og:site_name\" content=\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/andysowardsfan\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-14T21:25:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-06-27T20:48:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.andysowards.com\/blog\/assets\/ways-hackers-can-get-into-your-business.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"970\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andy Sowards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andysowards\" \/>\n<meta name=\"twitter:site\" content=\"@andysowards\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Sowards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/\",\"url\":\"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/\",\"name\":\"Cyber Attack Prevention\",\"isPartOf\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/ways-hackers-can-get-into-your-business.jpg\",\"datePublished\":\"2016-03-14T21:25:56+00:00\",\"dateModified\":\"2017-06-27T20:48:32+00:00\",\"author\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\"},\"description\":\"The Internet is full of threats. Phishers, malware, Trojan horses and other sneaky cyber crime techniques can devastate a business or an individual. While\",\"breadcrumb\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/#primaryimage\",\"url\":\"https:\/\/www.andysowards.com\/blog\/assets\/ways-hackers-can-get-into-your-business.jpg\",\"contentUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/ways-hackers-can-get-into-your-business.jpg\",\"width\":970,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.andysowards.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Attack Prevention\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\",\"url\":\"https:\/\/www.andysowards.com\/blog\/\",\"name\":\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\",\"description\":\"Design Inspiration &amp; Business Resources for Creatives\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\",\"name\":\"Andy Sowards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"caption\":\"Andy Sowards\"},\"description\":\"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards\",\"sameAs\":[\"https:\/\/www.andysowards.com\"],\"url\":\"https:\/\/www.andysowards.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Attack Prevention","description":"The Internet is full of threats. Phishers, malware, Trojan horses and other sneaky cyber crime techniques can devastate a business or an individual. While","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Attack Prevention","og_description":"The Internet is full of threats. Phishers, malware, Trojan horses and other sneaky cyber crime techniques can devastate a business or an individual. While","og_url":"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/","og_site_name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","article_publisher":"http:\/\/facebook.com\/andysowardsfan","article_published_time":"2016-03-14T21:25:56+00:00","article_modified_time":"2017-06-27T20:48:32+00:00","og_image":[{"width":970,"height":450,"url":"https:\/\/www.andysowards.com\/blog\/assets\/ways-hackers-can-get-into-your-business.jpg","type":"image\/jpeg"}],"author":"Andy Sowards","twitter_card":"summary_large_image","twitter_creator":"@andysowards","twitter_site":"@andysowards","twitter_misc":{"Written by":"Andy Sowards","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/","url":"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/","name":"Cyber Attack Prevention","isPartOf":{"@id":"https:\/\/www.andysowards.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/#primaryimage"},"image":{"@id":"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/www.andysowards.com\/blog\/assets\/ways-hackers-can-get-into-your-business.jpg","datePublished":"2016-03-14T21:25:56+00:00","dateModified":"2017-06-27T20:48:32+00:00","author":{"@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415"},"description":"The Internet is full of threats. Phishers, malware, Trojan horses and other sneaky cyber crime techniques can devastate a business or an individual. While","breadcrumb":{"@id":"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/#primaryimage","url":"https:\/\/www.andysowards.com\/blog\/assets\/ways-hackers-can-get-into-your-business.jpg","contentUrl":"https:\/\/www.andysowards.com\/blog\/assets\/ways-hackers-can-get-into-your-business.jpg","width":970,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.andysowards.com\/blog\/2016\/cyber-attack-prevention\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.andysowards.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Attack Prevention"}]},{"@type":"WebSite","@id":"https:\/\/www.andysowards.com\/blog\/#website","url":"https:\/\/www.andysowards.com\/blog\/","name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","description":"Design Inspiration &amp; Business Resources for Creatives","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415","name":"Andy Sowards","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","caption":"Andy Sowards"},"description":"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards","sameAs":["https:\/\/www.andysowards.com"],"url":"https:\/\/www.andysowards.com\/blog\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/23657"}],"collection":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/comments?post=23657"}],"version-history":[{"count":2,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/23657\/revisions"}],"predecessor-version":[{"id":27215,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/23657\/revisions\/27215"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media\/23661"}],"wp:attachment":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media?parent=23657"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/categories?post=23657"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/tags?post=23657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}