{"id":7,"date":"2024-09-23T16:38:56","date_gmt":"2024-09-23T16:38:56","guid":{"rendered":"https:\/\/computerbasicshub.net\/?page_id=7"},"modified":"2025-06-24T18:53:22","modified_gmt":"2025-06-24T18:53:22","slug":"onlinesecurity","status":"publish","type":"page","link":"https:\/\/computerbasicshub.net\/index.php\/onlinesecurity\/","title":{"rendered":"Online Security"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<div class=\"wp-block-group alignwide has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-2 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-1 wp-block-group-is-layout-constrained\">\n<!DOCTYPE html>\n<html>\n<head>\n\t<meta http-equiv=\"content-type\" content=\"text\/html; charset=utf-8\"\/>\n\t<title><\/title>\n\t<meta name=\"generator\" content=\"LibreOffice 25.2.4.3 (Windows)\"\/>\n\t<meta name=\"created\" content=\"2022-04-28T13:44:15.421000000\"\/>\n\t<meta name=\"changed\" content=\"2025-06-23T13:40:47.270556700\"\/>\n\t<style type=\"text\/css\">\n\t\t@page { margin: 2cm }\n\t\ttd p { background: transparent; line-height: 115%; margin-bottom: 0.25cm }\n\t\tp { background: transparent; line-height: 115%; margin-bottom: 0.25cm }\n\t<\/style>\n<\/head>\n<body lang=\"en-US\" dir=\"ltr\"><p style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"center\" style=\"margin-bottom: 0cm\"><font size=\"6\" style=\"font-size: 24pt\"><b>Online\nSecurity<\/b><\/font><\/p>\n<p align=\"center\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<table width=\"827\" cellpadding=\"0\" cellspacing=\"0\" style=\"page-break-inside: avoid\">\n\t<col width=\"827\"\/>\n\t<tr>\n\t\t<td width=\"827\" valign=\"top\" style=\"border: none; padding: 0cm\"><p align=\"center\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/computerbasicshub.net\/onlinesecuritytopimg.jfif\" name=\"Image1\" align=\"right\" width=\"152\" height=\"152\" border=\"0\"\/>\n<br\/>\n\n\t\t\t<\/p>\n\t\t<\/td>\n\t<\/tr>\n<\/table>\n<p align=\"center\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-left: 0.6cm; page-break-before: auto; page-break-after: auto\">\n<font size=\"4\" style=\"font-size: 14pt\"><b>Using Internet Web Browsers\nSafely<\/b><\/font><\/p>\n<p align=\"left\" style=\"margin-left: 0.6cm; background: transparent\">When\nusing the Internet, being safe online is important. A number of key\naspects to being safe while online are the following.<\/p>\n<p align=\"left\" style=\"margin-left: 0.6cm; background: transparent\"><br\/>\n<br\/>\n\n<\/p>\n<ul>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Use strong passwords\n\tthat are unique.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Log out from\n\tservices. This refers to online services like bank accounts, online\n\tshopping and email accounts.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Keep backups.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Avoid going to\n\twebsites that do not use HTTPS and are HTTP websites.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Do not leave\n\tsigned-in while the web browser is closed.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Be careful to not add\n\tpeople who you do not know as friends to Facebook.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Cloud storage of\n\tdocuments and photos should always have an offline backup or source\n\tin case something happens to them online.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Do not download\n\tanything, illegally.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Do not share a Wifi\n\tconnection.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Never leave web\n\tbrowsers open, unattended.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Avoid posting\n\tinappropriate comments or photos on social media pages.<\/p><\/li>\n<\/ul>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-right: 2.7cm; page-break-before: auto; page-break-after: auto\">\n<br\/>\n<br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-right: 2.9cm; margin-left: 0.7cm; page-break-before: auto; page-break-after: auto\">\nWeb browsers tend to block direct access to http websites for\nsecurity sought reasons. However, http websites that do not utilize\nhttps can still be accessed. You will notice an exclamation mark\nwarning sign to the left of the URL address on the URL box&#8217;s left\nside with, &#8216;Not secure&#8217;, next to it. This would be in place of the\nlock symbol. URLs without &#8216;https:\/\/&#8217; at the beginning like\nexample.com or www.example.com get automatically translated to the\nfull URL. An example is the following.<\/p>\n<p align=\"left\" style=\"margin-left: 0.7cm; page-break-before: auto; page-break-after: auto\">\nIn New York, if one enters, &#8216;www.yahoo.com&#8217;, in the URL box of a\nbrowser like Chrome, the following URL will be seen in its place.<\/p>\n<p align=\"left\" style=\"margin-left: 0.7cm; background: transparent\">https:\/\/us.yahoo.com\/<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-left: 0.8cm; page-break-before: auto; page-break-after: auto\">\nSearch engines like Google, Yahoo and Bing are have their own version\ndepending on which country it is being accessed from in many\ncountries in the world.<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-left: 0.5cm; page-break-before: auto; page-break-after: auto\">\n<font size=\"4\" style=\"font-size: 14pt\"><b>Online Security Threats<\/b><\/font><\/p>\n<p align=\"left\" style=\"margin-right: 2.9cm; margin-left: 0.7cm; page-break-before: auto; page-break-after: auto\">\nThe Internet is host to numerous online security threats. These\ninclude threats to computer systems, privacy of personal data and\neven users themselves. For this reason, it is important to actively\nbe at the forefront of keeping your computer secure from online\nthreats as much as possible.<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-left: 0.6cm; page-break-before: auto; page-break-after: auto\">\n<font size=\"4\" style=\"font-size: 14pt\"><b>Computer viruses and\nmalware:<\/b><\/font><\/p>\n<p align=\"left\" style=\"margin-right: 4.3cm; margin-left: 0.6cm; page-break-before: auto; page-break-after: auto\">\nComputer viruses and malware most often infect computers from the\nInternet. They can come from websites and even emails. For an email\nto be able to infect a computer, it must have a link to a malicious\nlink or a file attachment that contains a computer virus in it. The\nsame is true for malware. Computer infections by viruses and malware\naim to cause damage to computer systems and cause major operational\nissues. Data loss and leakage often occurs due to computer viruses\nand malware. The cost of computer viruses to companies and\norganizations is high, too. Both, damage from them and loss of\nproductivity have negative financial impacts on their budgets. For\nbusinesses, bottom lines are affected and for non-profit entities,\nbudgets are strained. Software to detect and block computer\ninfections also costs money, too. Each year antivirus apps have to be\nupdated to the latest version for computers to be protected from the\nlatest emerging threats to them.<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-left: 0.5cm; page-break-before: auto; page-break-after: auto\">\n<font size=\"4\" style=\"font-size: 14pt\"><b>Theft of passwords and\npersonal information:<\/b><\/font><\/p>\n<p align=\"left\" style=\"margin-right: 4.4cm; margin-left: 0.6cm; page-break-before: auto; page-break-after: auto\">\nData theft can be done by computer viruses and malware. When data on\ncomputer filesystems gets compromised, it could be used for illegal\npurposes including fraud. Personal information including identity and\nfinancial information can be stolen, too. This is known as identity\ntheft. Most often, identity theft is done to very deceptively commit\nfraud or theft. Upon finding out passwords have been compromised,\nthey should be changed to prevent accounts from being compromised\nbeyond that point by the entity that stole the password(s). It is\ngood practice to reset all account passwords to ensure account\nsecurity across the board when even one account is compromised, at\nthe user level. Once one`s account`s password has been reset for all\nonline accounts, it would be less likely their accounts will be\ncompromised.<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-left: 0.5cm; page-break-before: auto; page-break-after: auto\">\n<font size=\"4\" style=\"font-size: 14pt\"><b>Unauthorized access of\ncomputers over the Internet:<\/b><\/font><\/p>\n<p align=\"left\" style=\"margin-right: 4.5cm; margin-left: 0.5cm; page-break-before: auto; page-break-after: auto\">\nUnauthorized access to computers connected to the Internet can occur\nwhen passwords are compromised or networked computers are hacked.\nViruses or malware can assist others and even various organizations\nin gaining access to networked computer systems. Often, this is done\nto steal data of interest or to alter information.<\/p>\n<p align=\"left\" style=\"margin-right: 4.5cm; background: transparent\"><br\/>\n<br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-right: 4.5cm; background: transparent\"><br\/>\n<br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-left: 0.5cm; page-break-before: auto; page-break-after: auto\">\n<font size=\"4\" style=\"font-size: 14pt\"><b>Minimizing Exposure to\nSecurity Threats<\/b><\/font><\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-left: 0.5cm; page-break-before: auto; page-break-after: auto\">\nA number of good practices while online can minimize your exposure to\nonline security threats. They include the following.<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<ul>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Do not reply to spam\n\tand just delete them or move them to the Junk folder without opening\n\tany links in them or downloading any attachments they may contain.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Do not go to unsafe\n\twebsites. They may contain viruses or malware.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Update antivirus app\n\tsubscriptions each year before they expire and have automatic virus\n\tdetection enabled.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Avoid saving\n\tpasswords in browsers.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Evaluate whether or\n\tnot an app is authentic before downloading it from the Internet.\n\tVarious apps that are virus scanners are viruses themselves, just as\n\tone example. It is better to limit downloads to official website\n\tdownloads when downloading apps.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Do not download\n\tscripts that are you do not know what they are purposed for.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Do not download apps\n\tthat you are unsure of their purpose.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Password-protect\n\tAdministrator accounts of Windows.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Only download apps\n\tusing the Administrator account whenever possible.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Avoid using the\n\tAdministrator account of Windows for using the Internet as much as\n\tpossible.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Do not share personal\n\tinformation over the Internet like phone number(s) and address\n\tunless required.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Log out of accounts\n\tthat are signed into after using them.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Ensure that you are\n\tnot using old versions of browsers that are no longer supported.<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Limit the amount of\n\ttime browsing history is stored in a given browser for. \n\t<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Keep your software up\n\tto date.<\/p><\/li>\n<\/ul>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-left: 0.7cm; background: transparent\"><font size=\"4\" style=\"font-size: 14pt\"><b>Modem\nand Router Security<\/b><\/font><\/p>\n<p align=\"left\" style=\"margin-left: 0.6cm; page-break-before: auto; page-break-after: auto\">\nKeeping your computer network&#8217;s modem or router secure should be\ndone. Modem security is vital to network and computer security. An\ninsecure modem can open the door to vulnerabilities to breaches of\nnetwork security and the integrity of data on networked devices.\nPlease see the below link for more on modem security.<\/p>\n<p align=\"left\" style=\"margin-left: 0.7cm; page-break-before: auto; page-break-after: auto\">\n<br\/>\n<br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-left: 0.7cm; background: transparent\"><font size=\"4\" style=\"font-size: 14pt\"><b>Link:<\/b><\/font><\/p>\n<p align=\"left\" style=\"margin-left: 0.7cm; page-break-before: auto; page-break-after: auto\">\n<a href=\"https:\/\/computerbasicshub.net\/modemsecurity.html\">Modem\nSecurity<\/a><\/p>\n<p align=\"left\" style=\"margin-left: 0.6cm; page-break-before: auto; page-break-after: auto\">\n<br\/>\n<br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><font size=\"4\" style=\"font-size: 14pt\"><b>Personal\nSecurity<\/b><\/font><\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\">Personal security while\nonline involves protecting yourself from people who may want to\nthreaten you or subject you to exploitation in any way. Social media\nplatforms are open to exploitation risks. This is especially true for\nyoung people. A number of the most widely used social media platforms\nthat are used by cybercriminals as attractive gateways are the\nfollowing.<\/p>\n<ul>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Facebook<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Instagram<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">YouTube<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">X<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">TikTok<\/p><\/li>\n\t<li><p align=\"left\" style=\"margin-bottom: 0cm\">Snapchat<\/p><\/li>\n<\/ul>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><font size=\"4\" style=\"font-size: 14pt\"><b>Secure\nOnline Networks<\/b><\/font><\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\">Private networks are more\nsecure than public networks. A private network is a network that is\nrestricted to users who have the authorized authentication key or\npassword to access devices on it that are within the same network and\nthe Internet, too. A public network is a network that permits access\nto almost anyone. Both types of networks are considered to to secure\nin general. If a network has a lock symbol next to it, the network is\nsecure. This is because the information in it is encrypted. Most\nnetworks are encrypted, these days. However, firewalls and security\npolicies are more common on private networks. The transfer of\nsensitive information or work-related information over the Internet\nshould not be done often or at all over a public network. Since\npublic networks are less secure, it is best to work with sensitive\ninformation or confidential information over a private network.<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><a href=\"https:\/\/computerbasicshub.net\/index.php\/computerbasicshub\/\"><font color=\"#ff0000\">Computer\nBasics Hub<\/font><\/a><\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p><br\/>\n<br\/>\n\n<\/p>\n<\/body>\n<\/html>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online Security Using Internet Web Browsers Safely When using the Internet, being safe online is important. A number of key aspects to being safe while online are the following. Use strong passwords that are unique. Log out from services. This refers to online services like bank accounts, online shopping and email accounts. Keep backups. Avoid [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-no-title","meta":{"footnotes":""},"class_list":["post-7","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/pages\/7","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/comments?post=7"}],"version-history":[{"count":18,"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/pages\/7\/revisions"}],"predecessor-version":[{"id":369,"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/pages\/7\/revisions\/369"}],"wp:attachment":[{"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/media?parent=7"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}