{"id":11270,"date":"2019-06-24T19:30:30","date_gmt":"2019-06-24T19:30:30","guid":{"rendered":"https:\/\/igotoffer.com\/blog\/?p=11270"},"modified":"2023-11-17T03:28:56","modified_gmt":"2023-11-17T03:28:56","slug":"cyber-security-online-behaviors","status":"publish","type":"post","link":"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors","title":{"rendered":"Cyber Security: Twelve Online Behaviors That Put You at Risk"},"content":{"rendered":"<h2>Cyber Security In 7 Minutes | What Is Cyber Security: How It Works? | Cyber Security [Video]<\/h2>\r\n<div class=\"ytb\"><p style=\"text-align: center;\"><iframe title=\"Cyber Security In 7 Minutes | What Is Cyber Security: How It Works? | Cyber Security | Simplilearn\" width=\"620\" height=\"349\" src=\"https:\/\/www.youtube.com\/embed\/inWWhr5tnEA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\r\n<\/p><\/div>\r\n<p style=\"text-align:center\">Video uploaded by <a class=\"yt-simple-endpoint style-scope yt-formatted-string\" rel=\"noopener noreferrer\" href=\"https:\/\/www.youtube.com\/@SimplilearnOfficial\" target=\"_blank\">Simplilearn<\/a> on <strong class=\"watch-time-text\">June 10, 2020<\/strong><\/p>\r\n\r\n\r\n<h2>12 Online Behaviors That Sabotage Your Cyber Security<\/h2>\r\n\r\n<p>Even experienced web surfers are prone to overlook online security. Most of them think they are too insignificant to fall victim to hackers or web stalkers, but they\u2019re wrong. Cyber criminals use robots that suck in data from millions of users, regardless of income, social class, or personal preferences.<\/p>\r\n\r\n\r\n\r\n<p>So here\u2019s our list of bad online habits you should ditch for greater safety:<\/p>\r\n\r\n\r\n\r\n<h3>1. Using the Same Password<\/h3>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image\">\r\n<div id=\"attachment_11848\" style=\"width: 660px\" class=\"wp-caption alignnone\"><img aria-describedby=\"caption-attachment-11848\" loading=\"lazy\" class=\"wp-image-11848\" title=\"Don't use the same password on different websites.\" src=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-same-password.png\" alt=\"Don't use the same password on different websites.\" width=\"650\" height=\"400\" srcset=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-same-password.png 650w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-same-password-300x185.png 300w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-same-password-620x382.png 620w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-same-password-244x150.png 244w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-same-password-600x369.png 600w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-same-password-244x150@2x.png 488w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><p id=\"caption-attachment-11848\" class=\"wp-caption-text\">Don&#8217;t use the same password on different websites.<\/p><\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>Never use the same password for computers, phones, tablets, forums, online stores, and social media accounts, even if it\u2019s 18 symbols long and contains letters and digits. If one of your accounts is cracked, then every single one of them is spawned.<\/p>\r\n\r\n\r\n\r\n<p>Some users have three passwords: one for all the devices, one for shopping, and one for chats or social media. It\u2019s ultimately wrong.<\/p>\r\n\r\n\r\n\r\n<p>Use password generators and managers to create and store all your passcodes.<\/p>\r\n\r\n\r\n\r\n<p>One device\/account should equal one password. Think of it as a driving license: you can\u2019t share it with other people, can you?<\/p>\r\n\r\n\r\n\r\n<h3>2. No-Password PC or Laptop Waking<\/h3>\r\n\r\n\r\n\r\n<p>You need a password to access your computer when you start it, but what about after waking it from hibernation? Apply the smartphone principle to your computer\u2014your computer or laptop should ask for a password every time you wake it. No exceptions!<\/p>\r\n\r\n\r\n\r\n<h3>3. Adding Other Peoples\u2019 Fingerprints<\/h3>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image\">\r\n<div id=\"attachment_11849\" style=\"width: 660px\" class=\"wp-caption alignnone\"><img aria-describedby=\"caption-attachment-11849\" loading=\"lazy\" class=\"wp-image-11849\" title=\"Don't add other peoples\u2019 fingerprints.\" src=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-same-fingerprints.png\" alt=\"Don't add other peoples\u2019 fingerprints.\" width=\"650\" height=\"400\" srcset=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-same-fingerprints.png 650w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-same-fingerprints-300x185.png 300w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-same-fingerprints-620x382.png 620w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-same-fingerprints-244x150.png 244w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-same-fingerprints-600x369.png 600w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-same-fingerprints-244x150@2x.png 488w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><p id=\"caption-attachment-11849\" class=\"wp-caption-text\">Don&#8217;t add other peoples\u2019 fingerprints.<\/p><\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>Thank God phone makers and OS developers require users to use a passcode to activate their devices, be it a password, a draw-based graphical password, or some biometric ID. The most common biometric ID is a fingerprint. MobileSoft allows adding up to five fingerprints to a database. It can sense an emergency situation, like if you cut or fractured your identification finger and used another finger. However, many people also add fingerprints of their partners, spouses, and even kids. Never do that! Use alternative means of identification, like passcodes and graphic keys.<\/p>\r\n\r\n\r\n\r\n<h3>4. Using Z as a Draw-Based Graphical Password<\/h3>\r\n\r\n\r\n\r\n<p>Try to avoid Z or mirrored Z as a draw-based graphical password. It\u2019s the easiest draw pattern, but also the most common.<\/p>\r\n\r\n\r\n\r\n<h3>5. Skipping Two-Step Authentication<\/h3>\r\n\r\n\r\n\r\n<p>2FA is the most secure access to private files and emails. Leading account-based services, including Gmail, Google Drive, iCloud, Twitter, and Facebook, insist on two-factor authentication, and randomly check phone numbers to add an extra layer of protection. Be patient, and wait for a passcode text to be sent to your phone!<\/p>\r\n\r\n\r\n\r\n<h3>6. No Lock Screen Protection<\/h3>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image\">\r\n<div id=\"attachment_11850\" style=\"width: 660px\" class=\"wp-caption alignnone\"><img aria-describedby=\"caption-attachment-11850\" loading=\"lazy\" class=\"wp-image-11850\" title=\"Always lock your phone, tablet, or PC screen and turn off notifications on the lock screen.\" src=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-lock-screen.png\" alt=\"Always lock your phone, tablet, or PC screen and turn off notifications on the lock screen.\" width=\"650\" height=\"400\" srcset=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-lock-screen.png 650w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-lock-screen-300x185.png 300w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-lock-screen-620x382.png 620w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-lock-screen-244x150.png 244w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-lock-screen-600x369.png 600w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-lock-screen-244x150@2x.png 488w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><p id=\"caption-attachment-11850\" class=\"wp-caption-text\">Always lock your phone, tablet, or PC screen and turn off notifications on the lock screen.<\/p><\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>Always lock your phone, tablet, or PC screen and turn off notifications on the lock screen. Other people should see just wallpapers. Locking the screen or sending a laptop into hibernation mode should become an automatic routine, like locking your car or house when you leave.<\/p>\r\n\r\n\r\n\r\n<h3>6. Turning Off Anti-Virus Updates<\/h3>\r\n\r\n\r\n\r\n<p>Many nonchalant users turn off antivirus updates because they lack free disk space or memory. You can delete any other software and save your files to an external drive to save space, but ALWAYS let your AV update its database, because unprotected data is everyone\u2019s data.<\/p>\r\n\r\n\r\n\r\n<h3>7. Ignoring System Checkup Routines<\/h3>\r\n\r\n\r\n\r\n<p>Every decent antivirus offers a regular system check-up by default. Unfortunately, these routines slow down a PC\u2019s overall performance, which is why many users turn them off. Users rely on AV background monitoring and hope that the software will alert them if it detects suspicious activity. Activity is the key word here. If malware is active, it means the computer was infested, and data may have leaked or become corrupted.<\/p>\r\n\r\n\r\n\r\n<p>Schedule a regular checkup for nighttime, or a time when you\u2019re away from your PC.<\/p>\r\n\r\n\r\n\r\n<h3>8. Having Too Many Browser Extensions<\/h3>\r\n\r\n\r\n\r\n<p>Browser extensions are numerous and ubiquitous. Some come by default with a browser. They are advertised as helpful softwares, but they mostly slow down your web surfing speed and can act as worms or backdoors. Sit down and count how many browser extensions you use more or less regularly. We bet it will be two or three, at most. Turn the others off or uninstall them and run an AV system checkup.<\/p>\r\n\r\n\r\n\r\n<h3>9. Clicking on Strange-Looking Links in Emails or Messages From Unknown Senders<\/h3>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image\">\r\n<div id=\"attachment_11851\" style=\"width: 660px\" class=\"wp-caption alignnone\"><img aria-describedby=\"caption-attachment-11851\" loading=\"lazy\" class=\"wp-image-11851\" title=\"Clicking on a strange-looking link is like opening Pandora\u2019s box.\" src=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-links.png\" alt=\"Clicking on a strange-looking link is like opening Pandora\u2019s box.\" width=\"650\" height=\"450\" srcset=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-links.png 650w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-links-300x208.png 300w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-links-620x429.png 620w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-links-217x150.png 217w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-links-600x415.png 600w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/06\/cyber-security-twelve-online-behaviors-that-put-you-at-risk-links-217x150@2x.png 434w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><p id=\"caption-attachment-11851\" class=\"wp-caption-text\">Clicking on a strange-looking link is like opening Pandora\u2019s box.<\/p><\/div>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>Clicking on a strange-looking link is like opening Pandora\u2019s box. Pandora was a very curious ancient Greek goddess who was told never to open a box that Zeus gave her. She disobeyed and unleashed maladies, disasters, and death. Don\u2019t be like Pandora! A single long link without a preview should alert you. If it happens to come from one of your contacts, reach out to them and ask what it means. A spoofed account never answers.<\/p>\r\n\r\n\r\n\r\n<h3>10. Using Pre-installed Factory Passwords for Routers and Other Connected Smart Devices<\/h3>\r\n\r\n\r\n\r\n<p>Never use a password from a sticker on your router or from a connected smart device. Factory databases are always under attack, and they leak. When activating a device for the first time, the first thing you should do is change the default password.<\/p>\r\n\r\n\r\n\r\n<h3>11. Using Public Wi-Fi For Access to Cloud and Bank Accounts<\/h3>\r\n\r\n\r\n\r\n<p>If you\u2019re connected to a public hotspot, refrain from visiting your online bank accounts or cloud storages. One in four public hotspots have no protection at all; the other three have minimum protection. If you absolutely need to check your bank account or email, use a VPN.<\/p>\r\n\r\n\r\n\r\n<p>If you can avoid these twelve pitfalls, your surfing should be much more secure.<\/p>\r\n\r\n\r\n<h2>Links<\/h2>\r\n<ul>\r\n<li><a href=\"https:\/\/us.norton.com\/internetsecurity-privacy-risky-online-behaviors.html\" target=\"_blank\" rel=\"noreferrer noopener\">7 risky behaviors you should stop right now<\/a> &#8211; Norton<\/li>\r\n<li><a href=\"https:\/\/igotoffer.com\/blog\/security-in-internet-of-things-iot-for-short\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Cyber Security: Internet of Things (opens in a new tab)\">Cyber Security: Internet of Things<\/a> &#8211; iGotOffer<\/li>\r\n<li><a href=\"https:\/\/igotoffer.com\/blog\/protect-your-phone-cyber-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Security: How to protect your phone from cyber attacks<\/a> &#8211; iGotOffer<\/li>\r\n<li><a href=\"\/blog\/vpn-key-security-line\" target=\"_blank\" rel=\"noreferrer noopener\">VPN &#8211; key to cyber security online<\/a> &#8211; iGotOffer<\/li>\r\n<li><a href=\"https:\/\/igotoffer.com\" target=\"_blank\" rel=\"noreferrer noopener\">Trade your electronics online<\/a> &#8211; iGotOffer<\/li>\r\n<\/ul>\r\n\r\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security In 7 Minutes | What Is Cyber Security: How It Works? | Cyber Security [Video] Video uploaded by Simplilearn on June 10, 2020 12 Online Behaviors That Sabotage Your Cyber Security Even experienced web surfers are prone to overlook online security. Most of them think they are too insignificant to fall victim to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11846,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[460],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security: Twelve Online Behaviors That Put You at Risk | iGotOffer<\/title>\n<meta name=\"description\" content=\"Even experienced web surfers are prone to overlook online security. Here are twelve online behaviors that sabotage your cyber security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security: Twelve Online Behaviors That Put You at Risk | iGotOffer\" \/>\n<meta property=\"og:description\" content=\"Even experienced web surfers are prone to overlook online security. Here are twelve online behaviors that sabotage your cyber security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors\" \/>\n<meta property=\"og:site_name\" content=\"iGotOffer Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iGotOffer\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/svetlana.ustinova2\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-24T19:30:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-17T03:28:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/02\/cyber-security-twelve-online-behaviors-that-put-you-at-risk.png\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@iGotOffer\" \/>\n<meta name=\"twitter:site\" content=\"@iGotOffer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#website\",\"url\":\"https:\/\/igotoffer.com\/blog\/\",\"name\":\"iGotOffer Blog\",\"description\":\"News and reviews about electronics &amp; apps\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/igotoffer.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors#primaryimage\",\"url\":\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/02\/cyber-security-twelve-online-behaviors-that-put-you-at-risk.png\",\"contentUrl\":\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/02\/cyber-security-twelve-online-behaviors-that-put-you-at-risk.png\",\"width\":650,\"height\":400,\"caption\":\"Cyber Security: Twelve Online Behaviors That Put You at Risk\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors#webpage\",\"url\":\"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors\",\"name\":\"Cyber Security: Twelve Online Behaviors That Put You at Risk | iGotOffer\",\"isPartOf\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors#primaryimage\"},\"datePublished\":\"2019-06-24T19:30:30+00:00\",\"dateModified\":\"2023-11-17T03:28:56+00:00\",\"author\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16\"},\"description\":\"Even experienced web surfers are prone to overlook online security. Here are twelve online behaviors that sabotage your cyber security.\",\"breadcrumb\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/igotoffer.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security: Twelve Online Behaviors That Put You at Risk\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16\",\"name\":\"Steve\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g\",\"caption\":\"Steve\"},\"sameAs\":[\"https:\/\/igotoffer.com\/\",\"https:\/\/www.facebook.com\/svetlana.ustinova2\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security: Twelve Online Behaviors That Put You at Risk | iGotOffer","description":"Even experienced web surfers are prone to overlook online security. Here are twelve online behaviors that sabotage your cyber security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors","og_locale":"en_US","og_type":"article","og_title":"Cyber Security: Twelve Online Behaviors That Put You at Risk | iGotOffer","og_description":"Even experienced web surfers are prone to overlook online security. Here are twelve online behaviors that sabotage your cyber security.","og_url":"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors","og_site_name":"iGotOffer Blog","article_publisher":"https:\/\/www.facebook.com\/iGotOffer","article_author":"https:\/\/www.facebook.com\/svetlana.ustinova2","article_published_time":"2019-06-24T19:30:30+00:00","article_modified_time":"2023-11-17T03:28:56+00:00","og_image":[{"width":650,"height":400,"url":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/02\/cyber-security-twelve-online-behaviors-that-put-you-at-risk.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@iGotOffer","twitter_site":"@iGotOffer","twitter_misc":{"Written by":"Steve","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/igotoffer.com\/blog\/#website","url":"https:\/\/igotoffer.com\/blog\/","name":"iGotOffer Blog","description":"News and reviews about electronics &amp; apps","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/igotoffer.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors#primaryimage","url":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/02\/cyber-security-twelve-online-behaviors-that-put-you-at-risk.png","contentUrl":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2019\/02\/cyber-security-twelve-online-behaviors-that-put-you-at-risk.png","width":650,"height":400,"caption":"Cyber Security: Twelve Online Behaviors That Put You at Risk"},{"@type":"WebPage","@id":"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors#webpage","url":"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors","name":"Cyber Security: Twelve Online Behaviors That Put You at Risk | iGotOffer","isPartOf":{"@id":"https:\/\/igotoffer.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors#primaryimage"},"datePublished":"2019-06-24T19:30:30+00:00","dateModified":"2023-11-17T03:28:56+00:00","author":{"@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16"},"description":"Even experienced web surfers are prone to overlook online security. Here are twelve online behaviors that sabotage your cyber security.","breadcrumb":{"@id":"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/igotoffer.com\/blog\/cyber-security-online-behaviors#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/igotoffer.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Security: Twelve Online Behaviors That Put You at Risk"}]},{"@type":"Person","@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/2e5559af8f4c85b3c121b665ccef1e16","name":"Steve","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ef902dfdf5f1c30f261fa557b8d6d80a?s=96&d=mm&r=g","caption":"Steve"},"sameAs":["https:\/\/igotoffer.com\/","https:\/\/www.facebook.com\/svetlana.ustinova2"]}]}},"_links":{"self":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/11270"}],"collection":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/comments?post=11270"}],"version-history":[{"count":4,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/11270\/revisions"}],"predecessor-version":[{"id":14865,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/11270\/revisions\/14865"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/media\/11846"}],"wp:attachment":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/media?parent=11270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/categories?post=11270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/tags?post=11270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}