{"id":13449,"date":"2020-10-09T11:43:03","date_gmt":"2020-10-09T15:43:03","guid":{"rendered":"https:\/\/southjerseytechies.net\/blog\/?p=13449"},"modified":"2021-09-08T16:59:38","modified_gmt":"2021-09-08T20:59:38","slug":"cyber-security-threats","status":"publish","type":"post","link":"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/","title":{"rendered":"Cyber Security Awareness"},"content":{"rendered":"<p>As school, socializing, and many aspects of life have moved online this year, it\u2019s more important than ever that you protect your digital devices and steer clear of cybercriminals. Computer security threats are relentlessly inventive. Masters of disguise and manipulation, these threats constantly evolve to find new ways to annoy, steal and harm. Arm yourself with information and resources to safeguard against complex and growing computer security threats and stay safe online.<\/p>\n<h2><em>Examples of Online Cybersecurity Threats<\/em><\/h2>\n<h3><strong>Computer Viruses<\/strong><\/h3>\n<p>Probably the most eminent computer security threat, a computer virus is a program written to alter the way a computer operates, <em>without the permission<\/em> <em>or knowledge<\/em> of the user. A virus replicates and executes itself, usually doing damage to your computer in the process.<\/p>\n<p><strong>What can you do to avoid computer viruses?<\/strong> Carefully evaluate free software, downloads from peer-to-peer file sharing sites, and emails from unknown senders. These things are critical to avoiding viruses. Most web browsers have security settings which can be configured for top defense against online threats. But, as we&#8217;ll say again and again, the single most-effective way of fending off viruses is up-to-date antivirus software and monitoring agent, like we include in our <a href=\"https:\/\/southjerseytechies.net\/managed-it-services\/\">Managed Service Plans.<\/a><\/p>\n<h3><strong>Spyware Threats<\/strong><\/h3>\n<p>A serious computer security threat, spyware is any program that monitors your online activities or installs programs <em>without your consent<\/em> for profit or to capture personal information.<\/p>\n<p>While many users won&#8217;t want to hear it, reading terms and conditions is a good way to build an understanding of how your activity is tracked online. As always, if a company you do not recognize is advertising for a deal that seems too good to be true, be sure you have an internet security solution in place and click with caution.<\/p>\n<h3><strong>Hackers and\u00a0Predators<\/strong><\/h3>\n<p>People, not computers, create computer security threats and malware. Hackers and predators are programmers who victimize others for their own gain by breaking into computer systems to steal, change, or destroy information as a form of <strong>cyber-terrorism.<\/strong>\u00a0These online predators can compromise credit card information, lock you out of your data, and steal your identity. As you may have guessed,\u00a0online security tools with identity theft protection\u00a0are one of the most effective ways to protect yourself from this brand of cybercriminal.<\/p>\n<h3><strong>Phishing<\/strong><\/h3>\n<p>Masquerading as a trustworthy person or business, phishers attempt to steal sensitive financial or personal information through fraudulent email or instant messages. Phishing attacks are some of the most successful methods for cybercriminals looking to pull off a data breach. Antivirus solutions with identity theft protection can be taught to recognize phishing threats in fractions of a second.<\/p>\n<h2>Cyber Safety Tips<a id=\"Cyber-Safety Tips\" title=\"Cyber Safety Tips\" contenteditable=\"false\"><\/a><\/h2>\n<ul>\n<li><span style=\"font-size: 14pt;\">Keep software systems up to date and use a good anti-virus program.<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Examine the email address and URLs in all correspondence. Scammers often mimic a legitimate site or email address by using a slight variation in spelling.<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">If an unsolicited text message, email, or phone call asks you to update, check, or verify your account information, <strong>do not<\/strong> follow the link provided in the message itself or call the phone numbers provided in the message. Go to the company\u2019s website to log into your account or call the phone number listed on the official website to see if something does in fact need your attention.<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Do not open any attachments unless you are expecting the file, document, or invoice and have verified the sender\u2019s email address.<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Scrutinize all electronic requests for a payment or transfer of funds.<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Be extra suspicious of any message that urges immediate action.<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Confirm requests for wire transfers or payment in person or over the phone as part of a two-factor authentication process. Do not verify these requests using the phone number listed in the request for payment.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3 style=\"text-align: center;\"><strong><em>If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990.<\/em><\/strong><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>As school, socializing, and many aspects of life have moved online this year, it\u2019s more important than ever that you protect your digital devices and steer clear of cybercriminals. Computer security threats are relentlessly inventive. Masters of disguise and manipulation, &hellip;<\/p>\n<p><a href=\"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/\">Continue Reading<span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":219,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[473,107,142,103,367],"tags":[136,577,2394,1464,2395],"class_list":["post-13449","post","type-post","status-publish","format-standard","hentry","category-internet-security","category-news","category-security","category-tips-info","category-virus-adware-spyware-removal","tag-antivirus","tag-cyber-security","tag-phishing-attempts","tag-security","tag-viruses"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security Awareness<\/title>\n<meta name=\"description\" content=\"Computer security threats\u00a0are relentlessly inventive. Masters of disguise and manipulation, these threats constantly evolve to find new ways to annoy, steal and harm. Arm yourself with information and resources to safeguard against complex and growing computer security threats and stay safe online.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Happy Cyber Security Awareness Month!\" \/>\n<meta property=\"og:description\" content=\"Computer security threats\u00a0are relentlessly inventive. Masters of disguise and manipulation, these threats constantly evolve to find new ways to annoy, steal and harm. Protect yourself with information and resources to safeguard against complex and growing computer security threats and stay safe online.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"South Jersey Techies\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sjtechies\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-09T15:43:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-08T20:59:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2020\/10\/Cyber_Security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"178\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Website Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Happy Cyber Security Awareness Month!\" \/>\n<meta name=\"twitter:description\" content=\"Computer security threats\u00a0are relentlessly inventive. Masters of disguise and manipulation, these threats constantly evolve to find new ways to annoy, steal and harm. Protect yourself with information and resources to safeguard against complex and growing computer security threats and stay safe online.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2020\/10\/Cyber_Security.png\" \/>\n<meta name=\"twitter:creator\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:site\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Website Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/\"},\"author\":{\"name\":\"Website Admin\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\"},\"headline\":\"Cyber Security Awareness\",\"datePublished\":\"2020-10-09T15:43:03+00:00\",\"dateModified\":\"2021-09-08T20:59:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/\"},\"wordCount\":645,\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"keywords\":[\"Antivirus\",\"Cyber Security\",\"Phishing Attempts\",\"Security\",\"Viruses\"],\"articleSection\":[\"Internet Security\",\"News\",\"Security\",\"Tips &amp; Info\",\"Virus \/ Adware \/ Spyware Removal\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/\",\"name\":\"Cyber Security Awareness\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\"},\"datePublished\":\"2020-10-09T15:43:03+00:00\",\"dateModified\":\"2021-09-08T20:59:38+00:00\",\"description\":\"Computer security threats\u00a0are relentlessly inventive. Masters of disguise and manipulation, these threats constantly evolve to find new ways to annoy, steal and harm. Arm yourself with information and resources to safeguard against complex and growing computer security threats and stay safe online.\",\"breadcrumb\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/southjerseytechies.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Awareness\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"name\":\"South Jersey Techies\",\"description\":\"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP\",\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\",\"name\":\"South Jersey Techies, LLC\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"contentUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"width\":291,\"height\":201,\"caption\":\"South Jersey Techies, LLC\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/sjtechies\",\"https:\/\/x.com\/sjtechies\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\",\"name\":\"Website Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"caption\":\"Website Admin\"},\"sameAs\":[\"http:\/\/www.southjerseytechies.net\"],\"url\":\"https:\/\/southjerseytechies.net\/blog\/author\/support\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Awareness","description":"Computer security threats\u00a0are relentlessly inventive. Masters of disguise and manipulation, these threats constantly evolve to find new ways to annoy, steal and harm. Arm yourself with information and resources to safeguard against complex and growing computer security threats and stay safe online.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/","og_locale":"en_US","og_type":"article","og_title":"Happy Cyber Security Awareness Month!","og_description":"Computer security threats\u00a0are relentlessly inventive. Masters of disguise and manipulation, these threats constantly evolve to find new ways to annoy, steal and harm. Protect yourself with information and resources to safeguard against complex and growing computer security threats and stay safe online.","og_url":"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/","og_site_name":"South Jersey Techies","article_publisher":"https:\/\/www.facebook.com\/sjtechies","article_published_time":"2020-10-09T15:43:03+00:00","article_modified_time":"2021-09-08T20:59:38+00:00","og_image":[{"width":400,"height":178,"url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2020\/10\/Cyber_Security.png","type":"image\/png"}],"author":"Website Admin","twitter_card":"summary_large_image","twitter_title":"Happy Cyber Security Awareness Month!","twitter_description":"Computer security threats\u00a0are relentlessly inventive. Masters of disguise and manipulation, these threats constantly evolve to find new ways to annoy, steal and harm. Protect yourself with information and resources to safeguard against complex and growing computer security threats and stay safe online.","twitter_image":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2020\/10\/Cyber_Security.png","twitter_creator":"@sjtechies","twitter_site":"@sjtechies","twitter_misc":{"Written by":"Website Admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/#article","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/"},"author":{"name":"Website Admin","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f"},"headline":"Cyber Security Awareness","datePublished":"2020-10-09T15:43:03+00:00","dateModified":"2021-09-08T20:59:38+00:00","mainEntityOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/"},"wordCount":645,"publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"keywords":["Antivirus","Cyber Security","Phishing Attempts","Security","Viruses"],"articleSection":["Internet Security","News","Security","Tips &amp; Info","Virus \/ Adware \/ Spyware Removal"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/","url":"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/","name":"Cyber Security Awareness","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/#website"},"datePublished":"2020-10-09T15:43:03+00:00","dateModified":"2021-09-08T20:59:38+00:00","description":"Computer security threats\u00a0are relentlessly inventive. Masters of disguise and manipulation, these threats constantly evolve to find new ways to annoy, steal and harm. Arm yourself with information and resources to safeguard against complex and growing computer security threats and stay safe online.","breadcrumb":{"@id":"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/southjerseytechies.net\/blog\/cyber-security-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/southjerseytechies.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Awareness"}]},{"@type":"WebSite","@id":"https:\/\/southjerseytechies.net\/blog\/#website","url":"https:\/\/southjerseytechies.net\/blog\/","name":"South Jersey Techies","description":"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP","publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/southjerseytechies.net\/blog\/#organization","name":"South Jersey Techies, LLC","url":"https:\/\/southjerseytechies.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","contentUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","width":291,"height":201,"caption":"South Jersey Techies, LLC"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sjtechies","https:\/\/x.com\/sjtechies"]},{"@type":"Person","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f","name":"Website Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","caption":"Website Admin"},"sameAs":["http:\/\/www.southjerseytechies.net"],"url":"https:\/\/southjerseytechies.net\/blog\/author\/support\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8eT50-3uV","_links":{"self":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/13449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/users\/219"}],"replies":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/comments?post=13449"}],"version-history":[{"count":5,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/13449\/revisions"}],"predecessor-version":[{"id":13463,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/13449\/revisions\/13463"}],"wp:attachment":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/media?parent=13449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/categories?post=13449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/tags?post=13449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}