{"id":2075,"date":"2018-05-14T10:00:52","date_gmt":"2018-05-14T09:00:52","guid":{"rendered":"https:\/\/blog.whogohost.com\/?p=2075"},"modified":"2025-10-13T08:47:51","modified_gmt":"2025-10-13T07:47:51","slug":"staying-safe-in-an-interconnected-world-pt-2","status":"publish","type":"post","link":"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/","title":{"rendered":"How To Stay Safe in an Interconnected World &#8211; PT. 2"},"content":{"rendered":"\n<p class=\"graf graf--p graf--leading\">In my&nbsp;<a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/blog.whogohost.com\/how-to-stay-safe-in-an-interconnected-world\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/medium.com\/@tobaniyi\/staying-safe-in-an-interconnected-world-part-1-e1baeaf82017\">previous article<\/a>,&nbsp;<em>How To Stay Safe in an Interconnected World &#8211; PT. 1<\/em> I introduced some of the threats that exist in today\u2019s interconnected world. In this article, I will show the different ways you can get compromised and what inspires hackers to do what they do.<\/p>\n\n\n\n<p class=\"graf graf--p graf-after--p\">You don\u2019t have to run a big multinational corporation to be a victim to hackers. The fact that you are connected to the Internet, have a website or social media profile, means you can be a victim.<\/p>\n\n\n\n<h3 id=\"c576\" class=\"graf graf--h3 graf-after--p wp-block-heading\">Why hackers&nbsp;hack.<\/h3>\n\n\n\n<p class=\"graf graf--p graf-after--h3\">A hacker is simply someone who gains unauthorized access to any device or data. Some hackers just follow some guide online that explains how to gain unauthorized access (you will be surprised how easy it can be). Others are however very skilled and take advantage of the fact that most people don\u2019t take the necessary steps to stay safe online. The big question is why?<\/p>\n\n\n\n<p class=\"graf graf--p graf-after--p\"><strong class=\"markup--strong markup--p-strong\">Profit.<\/strong>&nbsp;This is a no-brainer. Ransomware attacks are excellent examples of how hackers can make money from, well, hacking. A hacker could gain access to a device, encrypt important files such that the owner no longer has access to them, and they demand a ransom (hence the name) be paid to restore access to the files. You may read&nbsp;<a href=\"https:\/\/www.eojohnson.com\/article\/blog-wannacry\">this article<\/a> to understand how WannaCry, a recent ransomware, spread around the world.<\/p>\n\n\n\n<p class=\"graf graf--p graf-after--p\">Hackers also make a lot of money from spamming. Ever gotten a spam email selling stuff you never asked for? This is probably because a hacker somewhere harvested your email address, alongside several thousand and in some cases millions, and then blasted emails selling different things to them.<\/p>\n\n\n\n<p class=\"graf graf--p graf-after--p\">Email providers have several tools in place to detect and block attackers, especially the originating IP addresses. So hackers simply infect hundreds and thousands of devices and send spam from different locations, making it difficult for the emails to be blocked. Now you see how you may be a victim? Where does the money come from you ask? Well, the spam emails usually sell something on behalf of someone who pays to get his product\/service advertised. While many will identify spam and not even open the emails, there is still a small percentage of people who still open these emails.<\/p>\n\n\n\n<p class=\"graf graf--p graf-after--p\">Hackers also make money from gaining access to victims\u2019 bank accounts for instance. There are different ways this can be done, but once a hacker has access to a victims\u2019 account login details or card PIN, it is only a matter of time before the hacker withdraws funds from the accounts.<\/p>\n\n\n\n<p class=\"graf graf--p graf-after--p\">Whichever the method chosen, hackers can definitely make a good sum from this evil trade.<\/p>\n\n\n\n<p class=\"graf graf--p graf-after--p\"><strong class=\"markup--strong markup--p-strong\">Bragging rights.<\/strong>&nbsp;Some hackers hack sites just to prove that they can. A hacker could hack a website for instance and leave a message telling the site admin that the site is not secured enough. In these cases, hackers leave a tell-tale sign that they are responsible for hacking the website. These hackers usually are not interested in making money but to prove to themselves and maybe others that they can. See again how easily you can become a victim?<\/p>\n\n\n\n<p class=\"graf graf--p graf-after--p\">Software companies, such as&nbsp;<a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/technet.microsoft.com\/en-us\/security\/dn425055.aspx\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-href=\"https:\/\/technet.microsoft.com\/en-us\/security\/dn425055.aspx\">Microsoft<\/a>, knowing that these group of hackers exist, have created bounty programs that encourage hackers to try to gain access to secured facilities and get paid when they find vulnerabilities. This helps security companies to identify so called zero-day vulnerabilities, which are security vulnerabilities that they would not have been able to find otherwise.<\/p>\n\n\n\n<p class=\"graf graf--p graf-after--p\"><strong class=\"markup--strong markup--p-strong\">Competition.<\/strong>&nbsp;Some companies have been rumored to employ the services of hackers, in-house or otherwise, to take down their competition or gain access to proprietary information. If you are a Sci-Fi movie fan, this concept shouldn\u2019t be strange to you. This, however, gets worse as countries like the United States have accused other countries such as Russia and China of attempting to hack U.S. companies and in some case government infrastructure. Many also believe that the next World War may possibly be a Cyberwar, and countries are arming themselves for this possibility. In a&nbsp;<a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/www.theregister.co.uk\/2017\/08\/15\/us_government_wants_to_reverseengineer_malware_to_fight_back\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-href=\"https:\/\/www.theregister.co.uk\/2017\/08\/15\/us_government_wants_to_reverseengineer_malware_to_fight_back\/\">recent post<\/a>, the U.S. military vowed to weaponize any malware used to attack the U.S. and turn such malware against the attacker. There have also been counterclaims that the U.S. has also been responsible for some malware attacks.<\/p>\n\n\n\n<p class=\"graf graf--p graf-after--p\">No matter the side of the divide you belong to, it is clear that there is a cyber war brewing. While I am not a prophet of doom, I must say it doesn\u2019t look like it is stopping anytime soon. One thing that is sure is that there will be many unintended victims.<\/p>\n\n\n\n<p class=\"graf graf--p graf-after--p\">Regardless of the motive, hackers are everywhere and growing by the minute and you need to stay safe. In my next article, I will explain some ways you may become a victim.<\/p>\n\n\n\n<p class=\"graf graf--p graf-after--p graf--trailing\">Got any questions? Feel free to leave a comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In my&nbsp;previous article,&nbsp;How To Stay Safe in an Interconnected World &#8211; PT. 1 I introduced some of the threats that exist in today\u2019s interconnected world. In this article, I will show the different ways you can get compromised and what inspires hackers to do what they do. You don\u2019t have to run a big multinational [&hellip;]<\/p>\n","protected":false},"author":157,"featured_media":2946,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[135,1],"tags":[98,97,228,99],"class_list":["post-2075","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-tos","category-security","tag-online-security","tag-security","tag-stay-safe-online","tag-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How To Stay Safe in an Interconnected World - PT. 2<\/title>\n<meta name=\"description\" content=\"In this article, &quot;How To Stay Safe in an Interconnected World&quot; I will show the different ways you can get compromised and what inspires hackers...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Stay Safe in an Interconnected World - PT. 2\" \/>\n<meta property=\"og:description\" content=\"In this article, &quot;How To Stay Safe in an Interconnected World&quot; I will show the different ways you can get compromised and what inspires hackers...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Go54 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-14T09:00:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-13T07:47:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/credit-card-.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"682\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"GO54\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GO54\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/\",\"url\":\"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/\",\"name\":\"How To Stay Safe in an Interconnected World - PT. 2\",\"isPartOf\":{\"@id\":\"https:\/\/go54.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/credit-card-.jpg\",\"datePublished\":\"2018-05-14T09:00:52+00:00\",\"dateModified\":\"2025-10-13T07:47:51+00:00\",\"author\":{\"@id\":\"https:\/\/go54.com\/blog\/#\/schema\/person\/2d52a7680bd0e9cbd40a2f67d63db343\"},\"description\":\"In this article, \\\"How To Stay Safe in an Interconnected World\\\" I will show the different ways you can get compromised and what inspires hackers...\",\"breadcrumb\":{\"@id\":\"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/#primaryimage\",\"url\":\"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/credit-card-.jpg\",\"contentUrl\":\"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/credit-card-.jpg\",\"width\":960,\"height\":682,\"caption\":\"staying-safe-in-an-interconnected-world\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/go54.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Stay Safe in an Interconnected World &#8211; PT. 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/go54.com\/blog\/#website\",\"url\":\"https:\/\/go54.com\/blog\/\",\"name\":\"Go54 Blog\",\"description\":\"The Go54 Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/go54.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/go54.com\/blog\/#\/schema\/person\/2d52a7680bd0e9cbd40a2f67d63db343\",\"name\":\"GO54\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/go54.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/20d4f7874acacffa669d6683063c71a758b375bf78de103c9595795b03b9f17a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/20d4f7874acacffa669d6683063c71a758b375bf78de103c9595795b03b9f17a?s=96&d=mm&r=g\",\"caption\":\"GO54\"},\"url\":\"https:\/\/go54.com\/blog\/author\/ifeoluwao\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Stay Safe in an Interconnected World - PT. 2","description":"In this article, \"How To Stay Safe in an Interconnected World\" I will show the different ways you can get compromised and what inspires hackers...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/","og_locale":"en_GB","og_type":"article","og_title":"How To Stay Safe in an Interconnected World - PT. 2","og_description":"In this article, \"How To Stay Safe in an Interconnected World\" I will show the different ways you can get compromised and what inspires hackers...","og_url":"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/","og_site_name":"Go54 Blog","article_published_time":"2018-05-14T09:00:52+00:00","article_modified_time":"2025-10-13T07:47:51+00:00","og_image":[{"width":960,"height":682,"url":"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/credit-card-.jpg","type":"image\/jpeg"}],"author":"GO54","twitter_card":"summary_large_image","twitter_misc":{"Written by":"GO54","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/","url":"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/","name":"How To Stay Safe in an Interconnected World - PT. 2","isPartOf":{"@id":"https:\/\/go54.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/#primaryimage"},"image":{"@id":"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/#primaryimage"},"thumbnailUrl":"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/credit-card-.jpg","datePublished":"2018-05-14T09:00:52+00:00","dateModified":"2025-10-13T07:47:51+00:00","author":{"@id":"https:\/\/go54.com\/blog\/#\/schema\/person\/2d52a7680bd0e9cbd40a2f67d63db343"},"description":"In this article, \"How To Stay Safe in an Interconnected World\" I will show the different ways you can get compromised and what inspires hackers...","breadcrumb":{"@id":"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/#primaryimage","url":"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/credit-card-.jpg","contentUrl":"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/credit-card-.jpg","width":960,"height":682,"caption":"staying-safe-in-an-interconnected-world"},{"@type":"BreadcrumbList","@id":"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/go54.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How To Stay Safe in an Interconnected World &#8211; PT. 2"}]},{"@type":"WebSite","@id":"https:\/\/go54.com\/blog\/#website","url":"https:\/\/go54.com\/blog\/","name":"Go54 Blog","description":"The Go54 Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/go54.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/go54.com\/blog\/#\/schema\/person\/2d52a7680bd0e9cbd40a2f67d63db343","name":"GO54","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/go54.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/20d4f7874acacffa669d6683063c71a758b375bf78de103c9595795b03b9f17a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/20d4f7874acacffa669d6683063c71a758b375bf78de103c9595795b03b9f17a?s=96&d=mm&r=g","caption":"GO54"},"url":"https:\/\/go54.com\/blog\/author\/ifeoluwao\/"}]}},"jetpack_featured_media_url":"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/credit-card-.jpg","jetpack_shortlink":"https:\/\/wp.me\/p9PSw1-xt","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2069,"url":"https:\/\/go54.com\/blog\/how-to-stay-safe-in-an-interconnected-world\/","url_meta":{"origin":2075,"position":0},"title":"How To Stay Safe in an Interconnected World &#8211; PT. 1","author":"GO54","date":"8 May 2018","format":false,"excerpt":"The Internet has made everything easier for most of us. You can now buy almost anything using your credit\/debit card and it is delivered to your doorstep. With the introduction of Internet of Things (IoT), your CWAY dispenser unit may soon purchase water just before it is exhausted without you\u2026","rel":"","context":"In &quot;How Tos&quot;","block_context":{"text":"How Tos","link":"https:\/\/go54.com\/blog\/section\/how-tos\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/inter.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/inter.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/inter.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/inter.jpeg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1383,"url":"https:\/\/go54.com\/blog\/ssl-certificate-website\/","url_meta":{"origin":2075,"position":1},"title":"What Does An SSL Certificate Do For Your Website?","author":"GO54","date":"16 March 2017","format":false,"excerpt":"If you have been following our blog posts on SSL certificates, by now, you know what an SSL certificate is and how it works BUT do you know what it does for your website? It provides a secure connection between internet browsers and your website, allowing you to transmit private\u2026","rel":"","context":"In &quot;Our Products&quot;","block_context":{"text":"Our Products","link":"https:\/\/go54.com\/blog\/section\/our-products\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2017\/05\/201402NIST-Cybersecurity-Framework-its-future-and-what-it-means-to-you.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2017\/05\/201402NIST-Cybersecurity-Framework-its-future-and-what-it-means-to-you.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2017\/05\/201402NIST-Cybersecurity-Framework-its-future-and-what-it-means-to-you.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1326,"url":"https:\/\/go54.com\/blog\/surf-web-stay-secure\/","url_meta":{"origin":2075,"position":2},"title":"Surf The Web And Stay Secure","author":"GO54","date":"21 February 2017","format":false,"excerpt":"In an age where there are cyber criminals on the prowl, it is important for you to learn how to secure your private details when surfing the web. After reading this article, you will be more informed about how to surf the web securely. When you open your web browser\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/go54.com\/blog\/section\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2015\/07\/site-img221.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1134,"url":"https:\/\/go54.com\/blog\/get-25-off-protect-website-information\/","url_meta":{"origin":2075,"position":3},"title":"Get 25% Off! Protect Your Website Information","author":"GO54","date":"6 October 2016","format":false,"excerpt":"A Website is no longer a place to just blog your thoughts,share your opinions on political issues or put basic information. A Website has become a source of revenue for people and businesses. With the increase in success of ecommerce in Nigeria, many businesses have learned that having their businesses\u2026","rel":"","context":"In &quot;Design&quot;","block_context":{"text":"Design","link":"https:\/\/go54.com\/blog\/section\/design\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2016\/09\/side.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":3538,"url":"https:\/\/go54.com\/blog\/how-to-protect-your-virtual-meetings-from-a-brute-force-login-attack\/","url_meta":{"origin":2075,"position":4},"title":"How to Protect Your Virtual Meetings from a Brute Force Login Attack","author":"GO54","date":"16 April 2020","format":false,"excerpt":"Businesses of all sizes are rushing to respond to the COVID-19 pandemic, making use of new tools and ways of working to limit the impact of global lockdowns, calls for remote working, and quarantined staff. Many have begun to use virtual meeting software to move their meetings online. Virtual meetings\u2026","rel":"","context":"In &quot;Business&quot;","block_context":{"text":"Business","link":"https:\/\/go54.com\/blog\/section\/business\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/04\/WhatsApp-Image-2020-04-16-at-14.24.36.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/04\/WhatsApp-Image-2020-04-16-at-14.24.36.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/04\/WhatsApp-Image-2020-04-16-at-14.24.36.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/04\/WhatsApp-Image-2020-04-16-at-14.24.36.jpeg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/04\/WhatsApp-Image-2020-04-16-at-14.24.36.jpeg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":3589,"url":"https:\/\/go54.com\/blog\/how-to-protect-your-business-from-coronavirus-malware-and-phishing-attacks\/","url_meta":{"origin":2075,"position":5},"title":"How to protect your business from coronavirus malware and phishing attacks","author":"GO54","date":"14 May 2020","format":false,"excerpt":"Misinformation is one of the most essential tools of a hacker, and capitalizing on mass fear or hysteria is a typical form of attack. This is because using current, headline-grabbing events can camouflage their attacks as more credible - which is why with the COVID-19 outbreak, these attacks are becoming\u2026","rel":"","context":"In &quot;How Tos&quot;","block_context":{"text":"How Tos","link":"https:\/\/go54.com\/blog\/section\/how-tos\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/05\/cyber-security.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/05\/cyber-security.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/05\/cyber-security.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/05\/cyber-security.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/05\/cyber-security.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/05\/cyber-security.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"jetpack_likes_enabled":true,"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/posts\/2075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/users\/157"}],"replies":[{"embeddable":true,"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/comments?post=2075"}],"version-history":[{"count":2,"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/posts\/2075\/revisions"}],"predecessor-version":[{"id":2945,"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/posts\/2075\/revisions\/2945"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/media\/2946"}],"wp:attachment":[{"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/media?parent=2075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/categories?post=2075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/tags?post=2075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}