{"id":586,"date":"2020-02-24T16:50:52","date_gmt":"2020-02-24T16:50:52","guid":{"rendered":"https:\/\/www.limetreelabs.com\/blog\/?p=586"},"modified":"2020-02-24T16:50:57","modified_gmt":"2020-02-24T16:50:57","slug":"cybersecurity-for-dummies","status":"publish","type":"post","link":"https:\/\/www.limetreelabs.com\/blog\/cybersecurity-for-dummies\/","title":{"rendered":"Cybersecurity For Dummies"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img data-opt-id=985317682  fetchpriority=\"high\" decoding=\"async\" width=\"801\" height=\"520\" src=\"https:\/\/mlqqfyvmtktq.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.limetreelabs.com\/blog\/wp-content\/uploads\/2020\/02\/cybersecurity-for-dummies.png\" alt=\"cybersecurity-for-dummies\" class=\"wp-image-590\" srcset=\"https:\/\/mlqqfyvmtktq.i.optimole.com\/w:801\/h:520\/q:mauto\/f:best\/https:\/\/www.limetreelabs.com\/blog\/wp-content\/uploads\/2020\/02\/cybersecurity-for-dummies.png 801w, https:\/\/mlqqfyvmtktq.i.optimole.com\/w:300\/h:195\/q:mauto\/f:best\/https:\/\/www.limetreelabs.com\/blog\/wp-content\/uploads\/2020\/02\/cybersecurity-for-dummies.png 300w, https:\/\/mlqqfyvmtktq.i.optimole.com\/w:768\/h:499\/q:mauto\/f:best\/https:\/\/www.limetreelabs.com\/blog\/wp-content\/uploads\/2020\/02\/cybersecurity-for-dummies.png 768w\" sizes=\"(max-width: 801px) 100vw, 801px\" \/><\/figure>\n\n\n\n<p>Cybersecurity is the practice of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.<\/p>\n\n\n\n<p>Today, implementing effective cybersecurity measures is particularly challenging because there are more devices than people, and attackers and becoming more innovative.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">We&#8217;re Living In a Connected World<\/h2>\n\n\n\n<p>Before I lose you with techno-babble\u2014why is cybersecurity important? &#8220;&#8230;we&#8217;re living in a connected world. And I am just a connected girl.&#8221; Doesn&#8217;t have quite the same ring to it as Madonna, eh?<\/p>\n\n\n\n<p>Our banking is online. We sign important documents online. Life-saving healthcare devices are powered by the internet. Even our family photos are &#8220;in the cloud&#8221;!<\/p>\n\n\n\n<p>Technology is a wonderful thing, but new and emerging threats and cyber-attack strategies are surfacing each day. So\u2014how do you protect yourself from identity theft, extortion attempts, or loss of important data?<\/p>\n\n\n\n<p>First, let&#8217;s review the most common types of cybersecurity threats. To learn more, check out this article: <a href=\"https:\/\/www.limetreelabs.com\/blog\/it-and-cyber-security-terms-to-know-in-2019\/\">IT and Cyber Security Terms to Know in 2019<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Phishing<\/h2>\n\n\n\n<p>Phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ransomware<\/h2>\n\n\n\n<p>Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. Users are shown instructions on how to pay a fee to get the decryption key.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Malware<\/h2>\n\n\n\n<p>Malware is software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Social Engineering<\/h2>\n\n\n\n<p>Social Engineering is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.<\/p>\n\n\n\n<p>An example could be an email from a friend. If a criminal manages to hack one person&#8217;s email password, they have access to that person&#8217;s contact list. These messages will take advantage of your trust and curiosity and often times will contain a link or a download.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Take the Cybersecurity Secret Agent Quiz<\/h2>\n\n\n\n<p>Want to know how you rate with cybersecurity? Need some practical tips you can implement today? Take our Cybersecurity Secret Agent quiz!<\/p>\n\n\n\n\n\t\t<div id=\"interact-5d14fde04c655f0014f5badc85cc38eacc0278fbdf3e77390dd9fd69\" style=\"\"><\/div>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(){\t\t\t\t\n\t\t\t\twindow.addEventListener(\"load\", function(){\n\t\t\t\t\tvar app_id = \"5d14fde04c655f0014f5badc\";\n\t\t\t\t\tvar ref = \"5d14fde04c655f0014f5badc85cc38eacc0278fbdf3e77390dd9fd69\";\n\t\t\t\t\tvar w = \"800\";\n\t\t\t\t\tvar h = \"800\";\n\t\t\t\t\tvar host = \"quiz.tryinteract.com\";\n\t\t\t\t\tvar no_cover = false;\n\t\t\t\t\tvar mobile = true;\n\t\t\t\t\tvar redirect = \"false\";\n\t\t\t\t\tvar params = { \"ref\": ref, \"appId\": app_id, \"width\": w, \"height\": h, \"async\": true, \"host\": host, \"auto_resize\": true, \"mobile\":  mobile, \"no_cover\": no_cover };\n\t\t\t\t\tif(redirect === \"host\") { \n\t\t\t\t\t\tparams.redirect_host = true;\n\t\t\t\t\t}\n\t\t\t\t\twindow[ref] = new InteractApp(); \n\t\t\t\t\twindow[ref].initialize(params); \n\t\t\t\t\twindow[ref].display(); \n\t\t\t\t});\n\t\t\t})(window);\n\t\t<\/script>\n\t\n\n\n\n<p>So\u2014we&#8217;re dying to know, what type of agent did you get? <\/p>\n\n\n\n<p>If you&#8217;re ready to protect your business from cyberattacks, give <a href=\"https:\/\/limetreelabs.com\/\">Limetree Labs<\/a> a call at 208-901-3350 or email us at hello@limetreelabs.com.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is the practice of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Today, implementing effective cybersecurity measures is particularly challenging because there are more devices [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":590,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[45],"tags":[72],"class_list":{"0":"post-586","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"tag-cybersecurity","9":"entry"},"_links":{"self":[{"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/posts\/586","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/comments?post=586"}],"version-history":[{"count":4,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/posts\/586\/revisions"}],"predecessor-version":[{"id":591,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/posts\/586\/revisions\/591"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/media\/590"}],"wp:attachment":[{"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/media?parent=586"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/categories?post=586"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/tags?post=586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}