{"id":35601,"date":"2022-08-04T05:00:00","date_gmt":"2022-08-04T11:00:00","guid":{"rendered":"https:\/\/memberpress.com\/?p=35601"},"modified":"2022-11-16T15:13:35","modified_gmt":"2022-11-16T22:13:35","slug":"what-are-cyber-threats-and-what-to-do-about-them","status":"publish","type":"post","link":"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/","title":{"rendered":"How to Fight Cyber Threats (10 Ways)"},"content":{"rendered":"\n<p>Our modern digital world is full of unique processes and functions that improve the quality of life and work. However, these technologies also pose some dangers, and no business or IT organization is safe from these threats. <\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_81 ez-toc-wrap-center counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<label for=\"ez-toc-cssicon-toggle-item-69ae8bc96bd6f\" class=\"ez-toc-cssicon-toggle-label\"><p class=\"ez-toc-title\" style=\"cursor:inherit\">WHAT'S INSIDE<\/p>\n<span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #000000;color:#000000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #000000;color:#000000\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69ae8bc96bd6f\"  \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#What_are_Cyber_Threats\" >What are Cyber Threats<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Why_Protect_Yourself_from_Cybersecurity_Threats\" >Why Protect Yourself from Cybersecurity Threats?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Where_Do_Cyber_Threats_Come_From\" >Where Do Cyber Threats Come From?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Types_of_Cyber_Threats\" >Types of Cyber Threats<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Malware\" >Malware<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#DDoS_Attacks\" >DDoS Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#_Phishing\" >\u00a0Phishing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Ransomware\" >Ransomware<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Zero-Day_Exploits\" >Zero-Day Exploits<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Man-in-the-Middle_Attacks\" >Man-in-the-Middle Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Password_Attacks\" >Password Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Data_Breaches\" >Data Breaches<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#_IoT_Device_Threats\" >\u00a0IoT Device Threats<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#10_Ways_to_Protect_Yourself_from_Cyber_Threats\" >10 Ways to Protect Yourself from Cyber Threats<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Make_cybersecurity_a_top_priority\" >Make cybersecurity a top priority<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Update_with_security_patches\" >Update with security patches<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Train_your_team\" >Train your team<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Dont_click_links\" >Don't click links<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Check_out_your_sender\" >Check out your sender<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Update_your_devices\" >Update your devices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Get_serious_about_your_passwords\" >Get serious about your passwords<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Backup_your_data\" >Backup your data<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Avoid_unsecured_networks\" >Avoid unsecured networks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Encrypt_your_data\" >Encrypt your data<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<p>Cybercriminals are using more and more sophisticated techniques to wage damaging campaigns. As a result, most organizations feel helpless in protecting their data and critical assets from malicious attacks.<\/p>\n\n\n\n<p>In this post, we'll talk about what a cyber threat looks like. And we'll give you 10 simple ways you can protect yourself from them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_are_Cyber_Threats\"><\/span><strong>What are Cyber Threats<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Cyber threats are malicious attacks designed to steal data, disrupt operations, or damage digital assets. Attackers target individuals and companies with the goal of making a profit. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg\"><img decoding=\"async\" width=\"746\" height=\"468\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg\" alt=\"cyber crime word on computer keyboard\" class=\"wp-image-38275\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg 746w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094-300x188.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094-271x170.jpg 271w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094-700x439.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094-156x98.jpg 156w\" sizes=\"(max-width: 746px) 100vw, 746px\" \/><\/a><\/figure>\n\n\n\n<p>These threats come in many forms, including <strong>viruses, malware, data breaches, Distributed Denial of Service (DDoS) attacks, phishing, ransomware, <\/strong>and <strong>Man-in-the-Middle (MitM) attacks<\/strong>, among others.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Why_Protect_Yourself_from_Cybersecurity_Threats\"><\/span><strong>Why Protect Yourself from Cybersecurity Threats?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Cyber threats are serious business and can have far-reaching effects that disrupt many areas of modern life. For example, the recent ransomware attacks on the food and fuel supply chains caused price increases and shortages. <\/p>\n\n\n\n<p>The potential for significant damage is real when the attacks are aimed at networks, phone systems, healthcare, water treatment plants, electrical grids, or government operations. <\/p>\n\n\n\n<p>Cyber threats are even a matter of <a href=\"https:\/\/www.cisa.gov\/cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">national security<\/a> and a high priority for our current administration.<\/p>\n\n\n\n<p>On a smaller scale, the threat to individuals is also severe. Any data breach leaking personal information can quickly lead to identity theft, fraud, and financial ruin. These threats are growing in severity and increasing in numbers.<\/p>\n\n\n\n<p>Businesses need to understand that it doesn\u2019t just \u201chappen to someone else\u201d. Cyber threats pose a risk to every business, no matter how small. The time to act to <a href=\"https:\/\/memberpress.com\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">protect your business from harm<\/a> is now.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Where_Do_Cyber_Threats_Come_From\"><\/span><strong>Where Do Cyber Threats Come From<\/strong>?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Attackers are not just one breed of animal we need to worry about. Unfortunately, these threats come from <strong>different types of people and groups<\/strong> with varying agendas.<\/p>\n\n\n\n<p>Unfortunately, many of the most damaging attacks are backed by <strong>hostile countries<\/strong>. Although not as common, <strong>terrorist groups<\/strong> may also be involved in cyberterrorism.<\/p>\n\n\n\n<p><strong>Organized crime<\/strong> frequently uses digital threats to gather information, hold companies hostage for ransom, and steal data for identity theft and fraud. Law enforcement has linked many credit card scams to organized crime.<\/p>\n\n\n\n<p><strong>Hackers<\/strong>, <strong>hacktivists<\/strong>, and <strong>disgruntled insiders<\/strong> are also responsible for various digital attacks. For example, sometimes hackers will contact a company employee and hire or blackmail them into becoming accomplices.<\/p>\n\n\n\n<p>This all sounds pretty sophisticated, but anyone \u2013 even small businesses \u2013 can fall prey to these attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Types_of_Cyber_Threats\"><\/span><strong>Types of Cyber Threats<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>There is a huge number of cyber threat types. But for many attacks, the overarching concept is <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/social-engineering\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">social engineering<\/a>. <\/p>\n\n\n\n<p>Social engineering is when hackers manipulate people into ignoring standard security procedures and best practices so the hackers can gain authorized access to systems and data. <\/p>\n\n\n\n<p>Following are the main types of threats, many of which involve social engineering.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg\"><img decoding=\"async\" width=\"720\" height=\"485\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg\" alt=\"Identity theft word on computer keyboard\" class=\"wp-image-38273\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg 720w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110-300x202.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110-252x170.jpg 252w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110-700x472.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110-156x105.jpg 156w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Malware\"><\/span>Malware<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Malware is <strong>malicious software<\/strong> designed to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Spy on the user<\/li><li>Steal credentials<\/li><li>Alter, copy, and delete files<\/li><li>Change permissions<\/li><li>Interrupt network operations<\/li><li>Cause other kinds of damage<\/li><\/ul>\n\n\n\n<p>There are dozens of <a href=\"https:\/\/www.idstrong.com\/sentinel\/what-is-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware types<\/a> and variants, many of them available on the dark web for sale or trade.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"DDoS_Attacks\"><\/span><strong>DDoS Attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg\"><img decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg\" alt=\"DDoS attacks illustration\" class=\"wp-image-38279\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg 1024w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-300x150.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-768x384.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-340x170.jpg 340w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-840x420.jpg 840w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-700x350.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119-156x78.jpg 156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Distributed denial of service (DDoS) attacks <strong>overload a network or system<\/strong>. This disruption of the flow of traffic creates a window of opportunity where the cybercriminals can gain access to steal data or install malicious software.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u00a0<strong>Phishing<\/strong><\/h3>\n\n\n\n<p>Phishing is when bad actors use <a href=\"https:\/\/memberpress.com\/blog\/how-to-prevent-your-marketing-emails-from-getting-stuck-in-spam\/\" target=\"_blank\" rel=\"noreferrer noopener\">legitimate-looking emails<\/a> to trick recipients into clicking a link or visiting a malicious website. <\/p>\n\n\n\n<p>When the user visits the site or clicks the link, malware is automatically downloaded. Sometimes private information entered into hacked forms is collected and used.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ransomware\"><\/span><strong>Ransomware<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg\"><img decoding=\"async\" width=\"788\" height=\"443\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg\" alt=\"abstract background with the words access denied\" class=\"wp-image-38278\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg 788w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883-300x169.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883-768x432.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883-302x170.jpg 302w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883-700x394.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883-156x88.jpg 156w\" sizes=\"(max-width: 788px) 100vw, 788px\" \/><\/a><\/figure>\n\n\n\n<p>Ransomware attacks involve the <strong>encryption<\/strong> of a company's or individual's files. The hacker then holds the locked data hostage in demand for a ransom payment. Many companies choose not to pay. <\/p>\n\n\n\n<p>Others do pay, but they find that the promise of a decrypter key is empty, and the key doesn't work to restore the data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Zero-Day_Exploits\"><\/span><strong>Zero-Day Exploits<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>New software and devices often come with built-in flaws. With zero-day exploits, cybercriminals exploit these flaws before companies have the time to patch the vulnerabilities.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg\"><img decoding=\"async\" width=\"724\" height=\"483\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg\" alt=\"zero-day exploits illustration\" class=\"wp-image-38281\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg 724w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346-300x200.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346-255x170.jpg 255w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346-700x467.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346-156x104.jpg 156w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346-600x400.jpg 600w\" sizes=\"(max-width: 724px) 100vw, 724px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Man-in-the-Middle_Attacks\"><\/span><strong>Man-in-the-Middle Attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Man-in-the-middle attacks usually affect <strong>unsecured Wi-Fi networks at public places<\/strong> like coffee shops, airports, and hotels. <\/p>\n\n\n\n<p>The hacker monitors the network for connections, then uses special software to steal keystrokes, obtain logins, and take complete control of users\u2019 devices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Password_Attacks\"><\/span><strong>Password Attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg\"><img decoding=\"async\" width=\"671\" height=\"520\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg\" alt=\"illustration of a computer screen with password field\" class=\"wp-image-38282\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg 671w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880-300x232.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880-219x170.jpg 219w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880-668x518.jpg 668w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880-156x121.jpg 156w\" sizes=\"(max-width: 671px) 100vw, 671px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Credential stuffing<\/strong> is when threat actors use stolen passwords from one account and try to use them on another account. <\/p>\n\n\n\n<p>This is a common attack because many people <strong>reuse the same <a href=\"https:\/\/memberpress.com\/go\/lastpass\" title=\"Last Pass Affiliate link\" class=\"pretty-link-keyword\"rel=\"nofollow \" target=\"_blank\">password<\/a><\/strong> on their digital accounts. Credential stuffing is one of many types of password attacks criminals use to break into users\u2019 online accounts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Data_Breaches\"><\/span><strong>Data Breaches<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Dozens of data breaches have exposed millions of <a href=\"https:\/\/www.usa.gov\/privacy\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Americans\u2019 personal information<\/a> on the dark web. These breaches have led to fraud and personal identity theft.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u00a0<strong>IoT Device Threats<\/strong><\/h3>\n\n\n\n<p>Because IoT devices are relatively new technologies, many of them have not been appropriately secured. Because of this, IoT devices provide an entry point for hackers to gain access to a home or company network.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"10_Ways_to_Protect_Yourself_from_Cyber_Threats\"><\/span><strong>10 Ways to Protect Yourself from Cyber Threats<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg\"><img decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg\" alt=\"illustration of computer screen with death skull\" class=\"wp-image-38284\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg 1024w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-300x225.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-768x576.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-227x170.jpg 227w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-819x614.jpg 819w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-912x684.jpg 912w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-691x518.jpg 691w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438-156x117.jpg 156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Although the threats are real and imminent, you can take steps to protect yourself and your business. Following are 10 of the best things you can do to ward off cyberattacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Make_cybersecurity_a_top_priority\"><\/span>Make cybersecurity a top priority<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>This is the simplest yet most effective thing you can do to <a href=\"https:\/\/memberpress.com\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">protect yourself and your business<\/a>. Be aware of the cyberattacks you're most vulnerable to, and take specific steps to avoid them. <\/p>\n\n\n\n<p>If you run an online business, your best bet is to purchase a <a href=\"https:\/\/www.idstrong.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">high quality monitoring service<\/a> that can keep a close eye on things and resolve any issues that arise before they become catastrophic events.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Update_with_security_patches\"><\/span>Update with security patches<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg\"><img decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg\" alt=\"illustration of a handsome man using laptop and being watched\" class=\"wp-image-38276\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg 1024w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-300x225.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-768x576.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-227x170.jpg 227w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-819x614.jpg 819w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-912x684.jpg 912w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-691x518.jpg 691w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1-156x117.jpg 156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Make sure you keep all your systems, hardware, and software updated with the latest security patches. <\/p>\n\n\n\n<p>This is one of the most important reasons to <strong>renew your software licenses annually<\/strong>. For the vast majority of plugins and software, license renewal pays for important things like security patch development and implementation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Train_your_team\"><\/span>Train your team<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Make sure your staff understands the way phishing attacks and social engineering work. Then make sure they know how to respond in the event your business is attacked.<\/p>\n\n\n\n<p>Consider holding a company-wide workshop or purchasing an online course for your team. For example, Coursera offers an excellent and affordable <a href=\"https:\/\/www.coursera.org\/learn\/ibm-cyber-threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">cyber threat intelligence course<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Dont_click_links\"><\/span>Don't click links<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg\"><img decoding=\"async\" width=\"703\" height=\"497\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg\" alt=\"illustration of hacker in the dark\" class=\"wp-image-38280\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg 703w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948-300x212.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948-240x170.jpg 240w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948-700x495.jpg 700w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948-156x110.jpg 156w\" sizes=\"(max-width: 703px) 100vw, 703px\" \/><\/a><\/figure>\n\n\n\n<p>While the majority of email and SMS links are legitimate, it's <em>extremely difficult<\/em> to tell the difference between real and phishing links. <\/p>\n\n\n\n<p>Therefore, you should make it a habit to <strong>never click a link or download an attachment in an email or SMS message<\/strong>. Instead, visit the URL directly. Just type the address into your browser, and you should be able to see whether the link is honest.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Check_out_your_sender\"><\/span>Check out your sender<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Always verify the sender of your emails before taking any action. You can do this by:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Checking the from email for misspellings<\/li><li>Verifying whether the address and display name are they same (they should be)<\/li><\/ol>\n\n\n\n<p>You can also check out the sender's DMARC record. Fraudmarc has a <a href=\"https:\/\/fraudmarc.com\/dmarc-check\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DMARC Record Check tool<\/a> that's free to use. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Update_your_devices\"><\/span>Update your devices<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Consider installing plugins, extensions, and apps to keep your devices updated with the latest antivirus\/anti-malware software.<\/p>\n\n\n\n<p>There are all kinds of tools out there, many of which are free to use. Check out PCmag's 2022 <a href=\"https:\/\/www.pcmag.com\/picks\/the-best-free-antivirus-protection\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">list of free antivirus software here<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Get_serious_about_your_passwords\"><\/span>Get serious about your passwords<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg\"><img decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg\" alt=\"cell phone sign in screen with fish hook\" class=\"wp-image-38277\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg 1024w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-300x225.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-768x576.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-227x170.jpg 227w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-819x614.jpg 819w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-912x684.jpg 912w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-691x518.jpg 691w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974-156x117.jpg 156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Implement strong password requirements and procedures like <strong>two-factor authentication<\/strong>. If possible, move to <strong>biometrics <\/strong>like fingerprint logins, and away from passwords altogether. <\/p>\n\n\n\n<p><strong>And never, ever reuse passwords.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Backup_your_data\"><\/span>Backup your data<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In case of a ransomware attack, make sure you have a solid backup of all your data. And <strong>store your backups offsite<\/strong>. Following are several WordPress backup plugins we recommend:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/memberpress.com\/go\/wptimecapsule\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">WP Time Capsule<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/backupbuddy\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BackupBuddy<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/blogvault\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BlogVault<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/jetpack\/main\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"Jetpack\">Jetpack<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/wpstaging\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"WP Staging\">WP Staging<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/updraft\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">UpdraftPlus<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/stagecoach\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">WP Stagecoach<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/duplicator\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">Duplicator Pro<\/a> (by Snapcreek)<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Avoid_unsecured_networks\"><\/span>Avoid unsecured networks<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Ideally, you should always <strong>use a virtual private network (VPN)<\/strong> when connecting with public networks. A VPN sets up an encrypted, private connection between your device and the public network. <\/p>\n\n\n\n<p>It's a good practice to avoid unsecured public networks in general.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Encrypt_your_data\"><\/span>Encrypt your data<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg\"><img decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg\" alt=\"\" class=\"wp-image-38286\" srcset=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg 1024w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-300x225.jpg 300w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-768x576.jpg 768w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-227x170.jpg 227w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-819x614.jpg 819w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-912x684.jpg 912w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-691x518.jpg 691w, https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844-156x117.jpg 156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>You should encrypt all the data in your systems and on your devices. Data encryption helps protect your private and sensitive information. It also makes the communication between client apps and servers much more secure. <\/p>\n\n\n\n<p>When your data is encrypted, even if unauthorized people or entities get their hands on your data, they'll be unable to read it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>So much of our personal information is readily available online, and there are always cyber risks to worry about. <\/p>\n\n\n\n<p>Make cybersecurity one of your main priorities to protect your online business and your entire digital world.\u00a0<\/p>\n\n\n\n<p><strong>If you liked this article, be sure to <\/strong><a href=\"https:\/\/memberpress.com\/subscribe-to-the-memberpress-blog\/\"><strong>subscribe to the MemberPress blog<\/strong><\/a><strong>!<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our modern digital world is full of unique processes and functions that improve the quality of life and work. However, these technologies also pose some dangers, and no business or IT organization is safe from these threats. Cybercriminals are using more and more sophisticated techniques to wage damaging campaigns. As a result, most organizations feel [\u2026]<\/p>\n","protected":false},"author":63703,"featured_media":38289,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_strive_editorial_status":"complete","_strive_copy_of":0,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_FSMCFIC_featured_image_caption":"","_FSMCFIC_featured_image_nocaption":"","_FSMCFIC_featured_image_hide":"","_strive_checklists":"\"\"","_strive_active_checklist":"62291e2bb2422","_strive_post_notes":"","footnotes":""},"categories":[69,258,134],"tags":[299],"class_list":{"0":"post-35601","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-advice","8":"category-fixes","9":"category-how-to-2","10":"tag-security","11":"entry"},"acf":[],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.4.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"In today&#039;s digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Levon Gasparian\"\/>\n\t<meta name=\"keywords\" content=\"cyber security for my site,what are cyber threats,cyber threat solutions,how to fight cyber threats,security\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.4.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"es_ES\" \/>\n\t\t<meta property=\"og:site_name\" content=\"MemberPress\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"How to Fight Cyber Threats (10 Ways)\" \/>\n\t\t<meta property=\"og:description\" content=\"In today&#039;s digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1480\" \/>\n\t\t<meta property=\"og:image:height\" content=\"832\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2022-08-04T11:00:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-11-16T22:13:35+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/memberpress\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@memberpress\" \/>\n\t\t<meta name=\"twitter:title\" content=\"How to Fight Cyber Threats (10 Ways)\" \/>\n\t\t<meta name=\"twitter:description\" content=\"In today&#039;s digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#blogposting\",\"name\":\"How to Fight Cyber Threats (10 Ways)\",\"headline\":\"How to Fight Cyber Threats (10 Ways)\",\"author\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/author\\\/levongasparian1\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/memberpress.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Fight-Cyber-Threats.jpg\",\"width\":1480,\"height\":832,\"caption\":\"10 Ways to Fight Cyber Threats\"},\"datePublished\":\"2022-08-04T05:00:00-04:00\",\"dateModified\":\"2022-11-16T15:13:35-05:00\",\"inLanguage\":\"es-ES\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#webpage\"},\"articleSection\":\"Advice, Fixes, How To, security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/es#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/memberpress.com\\\/es\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/category\\\/advice\\\/#listItem\",\"name\":\"Advice\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/category\\\/advice\\\/#listItem\",\"position\":2,\"name\":\"Advice\",\"item\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/category\\\/advice\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#listItem\",\"name\":\"How to Fight Cyber Threats (10 Ways)\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/es#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#listItem\",\"position\":3,\"name\":\"How to Fight Cyber Threats (10 Ways)\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/category\\\/advice\\\/#listItem\",\"name\":\"Advice\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/#organization\",\"name\":\"MemberPress\",\"description\":\"The All-In-One WordPress Membership Plugin\",\"url\":\"https:\\\/\\\/memberpress.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/memberpress.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/mp-icon-RGB_Icon-01.jpg\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#organizationLogo\",\"width\":1650,\"height\":1275,\"caption\":\"memberpress logo icon\"},\"image\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.instagram.com\\\/memberpress\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/memberpressplugin\\\/\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/MemberPressPlugin\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/memberpress\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/author\\\/levongasparian1\\\/#author\",\"url\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/author\\\/levongasparian1\\\/\",\"name\":\"Levon Gasparian\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/memberpress.com\\\/wp-content\\\/litespeed\\\/avatar\\\/8021f617f664e4349f7e6de8a1e4918d.jpg?ver=1772802116\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#webpage\",\"url\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/\",\"name\":\"How to Fight Cyber Threats (10 Ways)\",\"description\":\"In today's digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.\",\"inLanguage\":\"es-ES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/author\\\/levongasparian1\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/author\\\/levongasparian1\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/memberpress.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Fight-Cyber-Threats.jpg\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#mainImage\",\"width\":1480,\"height\":832,\"caption\":\"10 Ways to Fight Cyber Threats\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/blog\\\/what-are-cyber-threats-and-what-to-do-about-them\\\/#mainImage\"},\"datePublished\":\"2022-08-04T05:00:00-04:00\",\"dateModified\":\"2022-11-16T15:13:35-05:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/memberpress.com\\\/es\\\/\",\"name\":\"MemberPress\",\"description\":\"The All-In-One WordPress Membership Plugin\",\"inLanguage\":\"es-ES\",\"publisher\":{\"@id\":\"https:\\\/\\\/memberpress.com\\\/es\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>How to Fight Cyber Threats (10 Ways)<\/title>\n\n","aioseo_head_json":{"title":"How to Fight Cyber Threats (10 Ways)","description":"In today's digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.","canonical_url":"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/","robots":"max-image-preview:large","keywords":"cyber security for my site,what are cyber threats,cyber threat solutions,how to fight cyber threats,security","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#blogposting","name":"How to Fight Cyber Threats (10 Ways)","headline":"How to Fight Cyber Threats (10 Ways)","author":{"@id":"https:\/\/memberpress.com\/es\/blog\/author\/levongasparian1\/#author"},"publisher":{"@id":"https:\/\/memberpress.com\/es\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg","width":1480,"height":832,"caption":"10 Ways to Fight Cyber Threats"},"datePublished":"2022-08-04T05:00:00-04:00","dateModified":"2022-11-16T15:13:35-05:00","inLanguage":"es-ES","mainEntityOfPage":{"@id":"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#webpage"},"isPartOf":{"@id":"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#webpage"},"articleSection":"Advice, Fixes, How To, security"},{"@type":"BreadcrumbList","@id":"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/memberpress.com\/es#listItem","position":1,"name":"Home","item":"https:\/\/memberpress.com\/es","nextItem":{"@type":"ListItem","@id":"https:\/\/memberpress.com\/es\/blog\/category\/advice\/#listItem","name":"Advice"}},{"@type":"ListItem","@id":"https:\/\/memberpress.com\/es\/blog\/category\/advice\/#listItem","position":2,"name":"Advice","item":"https:\/\/memberpress.com\/es\/blog\/category\/advice\/","nextItem":{"@type":"ListItem","@id":"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#listItem","name":"How to Fight Cyber Threats (10 Ways)"},"previousItem":{"@type":"ListItem","@id":"https:\/\/memberpress.com\/es#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#listItem","position":3,"name":"How to Fight Cyber Threats (10 Ways)","previousItem":{"@type":"ListItem","@id":"https:\/\/memberpress.com\/es\/blog\/category\/advice\/#listItem","name":"Advice"}}]},{"@type":"Organization","@id":"https:\/\/memberpress.com\/es\/#organization","name":"MemberPress","description":"The All-In-One WordPress Membership Plugin","url":"https:\/\/memberpress.com\/es\/","logo":{"@type":"ImageObject","url":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/10\/mp-icon-RGB_Icon-01.jpg","@id":"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#organizationLogo","width":1650,"height":1275,"caption":"memberpress logo icon"},"image":{"@id":"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#organizationLogo"},"sameAs":["https:\/\/www.instagram.com\/memberpress\/","https:\/\/www.pinterest.com\/memberpressplugin\/","https:\/\/www.youtube.com\/c\/MemberPressPlugin","https:\/\/www.linkedin.com\/company\/memberpress\/"]},{"@type":"Person","@id":"https:\/\/memberpress.com\/es\/blog\/author\/levongasparian1\/#author","url":"https:\/\/memberpress.com\/es\/blog\/author\/levongasparian1\/","name":"Levon Gasparian","image":{"@type":"ImageObject","url":"https:\/\/memberpress.com\/wp-content\/litespeed\/avatar\/8021f617f664e4349f7e6de8a1e4918d.jpg?ver=1772802116"}},{"@type":"WebPage","@id":"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#webpage","url":"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/","name":"How to Fight Cyber Threats (10 Ways)","description":"In today's digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.","inLanguage":"es-ES","isPartOf":{"@id":"https:\/\/memberpress.com\/es\/#website"},"breadcrumb":{"@id":"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#breadcrumblist"},"author":{"@id":"https:\/\/memberpress.com\/es\/blog\/author\/levongasparian1\/#author"},"creator":{"@id":"https:\/\/memberpress.com\/es\/blog\/author\/levongasparian1\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg","@id":"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#mainImage","width":1480,"height":832,"caption":"10 Ways to Fight Cyber Threats"},"primaryImageOfPage":{"@id":"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/#mainImage"},"datePublished":"2022-08-04T05:00:00-04:00","dateModified":"2022-11-16T15:13:35-05:00"},{"@type":"WebSite","@id":"https:\/\/memberpress.com\/es\/#website","url":"https:\/\/memberpress.com\/es\/","name":"MemberPress","description":"The All-In-One WordPress Membership Plugin","inLanguage":"es-ES","publisher":{"@id":"https:\/\/memberpress.com\/es\/#organization"}}]},"og:locale":"es_ES","og:site_name":"MemberPress","og:type":"article","og:title":"How to Fight Cyber Threats (10 Ways)","og:description":"In today's digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.","og:url":"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/","og:image":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg","og:image:secure_url":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg","og:image:width":1480,"og:image:height":832,"article:published_time":"2022-08-04T11:00:00+00:00","article:modified_time":"2022-11-16T22:13:35+00:00","article:publisher":"https:\/\/www.facebook.com\/memberpress\/","twitter:card":"summary_large_image","twitter:site":"@memberpress","twitter:title":"How to Fight Cyber Threats (10 Ways)","twitter:description":"In today's digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.","twitter:image":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/07\/Fight-Cyber-Threats.jpg"},"aioseo_meta_data":{"post_id":"35601","title":null,"description":"In today's digital world, cyber security is essential for small online businesses. Learn how to fight cyber threats with these 10 simple practices.","keywords":[{"label":"cyber security for my site","value":"cyber security for my site"},{"label":"what are cyber threats","value":"what are cyber threats"},{"label":"cyber threat solutions","value":"cyber threat solutions"},{"label":"how to fight cyber threats","value":"how to fight cyber threats"}],"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":[],"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"Article","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"},\"blockGraphs\":[]}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-10-09 19:19:34","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2022-04-01 17:04:01","updated":"2026-03-03 15:02:11"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/memberpress.com\/es\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/memberpress.com\/es\/blog\/category\/advice\/\" title=\"Advice\">Advice<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tHow to Fight Cyber Threats (10 Ways)\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/memberpress.com\/es"},{"label":"Advice","link":"https:\/\/memberpress.com\/es\/blog\/category\/advice\/"},{"label":"How to Fight Cyber Threats (10 Ways)","link":"https:\/\/memberpress.com\/es\/blog\/what-are-cyber-threats-and-what-to-do-about-them\/"}],"app_bookmark":{"bookmark_id":0,"is_bookmarked":false,"bookmark_date":0},"comments_count":"0","content_native":[{"type":"core\/paragraph","render":"<p>Our modern digital world is full of unique processes and functions that improve the quality of life and work. However, these technologies also pose some dangers, and no business or IT organization is safe from these threats. <\/p>","content":[{"type":"text","data":"Our modern digital world is full of unique processes and functions that improve the quality of life and work. However, these technologies also pose some dangers, and no business or IT organization is safe from these threats. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Cybercriminals are using more and more sophisticated techniques to wage damaging campaigns. As a result, most organizations feel helpless in protecting their data and critical assets from malicious attacks.<\/p>","content":[{"type":"text","data":"Cybercriminals are using more and more sophisticated techniques to wage damaging campaigns. As a result, most organizations feel helpless in protecting their data and critical assets from malicious attacks."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>In this post, we'll talk about what a cyber threat looks like. And we'll give you 10 simple ways you can protect yourself from them.<\/p>","content":[{"type":"text","data":"In this post, we'll talk about what a cyber threat looks like. And we'll give you 10 simple ways you can protect yourself from them."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h2 class=\"wp-block-heading\"><strong>What are Cyber Threats<\/strong><\/h2>","content":"What are Cyber Threats","data":[],"style":{"align":"left","parent_style":{},"header":"h2","fontSize":"27px"}},{"type":"core\/paragraph","render":"<p>Cyber threats are malicious attacks designed to steal data, disrupt operations, or damage digital assets. Attackers target individuals and companies with the goal of making a profit. <\/p>","content":[{"type":"text","data":"Cyber threats are malicious attacks designed to steal data, disrupt operations, or damage digital assets. Attackers target individuals and companies with the goal of making a profit. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg\" alt=\"cyber crime word on computer keyboard\" class=\"wp-image-38275\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg","alt":"cyber crime word on computer keyboard","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418094.jpg","linkDestination":"media"},"style":{"width":746,"height":468,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>These threats come in many forms, including <strong>viruses, malware, data breaches, Distributed Denial of Service (DDoS) attacks, phishing, ransomware, <\/strong>and <strong>Man-in-the-Middle (MitM) attacks<\/strong>, among others.<\/p>","content":[{"type":"text","data":"These threats come in many forms, including <strong>viruses, malware, data breaches, Distributed Denial of Service (DDoS) attacks, phishing, ransomware, <\/strong>and <strong>Man-in-the-Middle (MitM) attacks<\/strong>, among others."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Why Protect Yourself from Cybersecurity Threats?<\/strong><\/h3>","content":"Why Protect Yourself from Cybersecurity Threats?","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Cyber threats are serious business and can have far-reaching effects that disrupt many areas of modern life. For example, the recent ransomware attacks on the food and fuel supply chains caused price increases and shortages. <\/p>","content":[{"type":"text","data":"Cyber threats are serious business and can have far-reaching effects that disrupt many areas of modern life. For example, the recent ransomware attacks on the food and fuel supply chains caused price increases and shortages. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>The potential for significant damage is real when the attacks are aimed at networks, phone systems, healthcare, water treatment plants, electrical grids, or government operations. <\/p>","content":[{"type":"text","data":"The potential for significant damage is real when the attacks are aimed at networks, phone systems, healthcare, water treatment plants, electrical grids, or government operations. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Cyber threats are even a matter of <a href=\"https:\/\/www.cisa.gov\/cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">national security<\/a> and a high priority for our current administration.<\/p>","content":[{"type":"text","data":"Cyber threats are even a matter of <a href=\"https:\/\/www.cisa.gov\/cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">national security<\/a> and a high priority for our current administration."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>On a smaller scale, the threat to individuals is also severe. Any data breach leaking personal information can quickly lead to identity theft, fraud, and financial ruin. These threats are growing in severity and increasing in numbers.<\/p>","content":[{"type":"text","data":"On a smaller scale, the threat to individuals is also severe. Any data breach leaking personal information can quickly lead to identity theft, fraud, and financial ruin. These threats are growing in severity and increasing in numbers."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Businesses need to understand that it doesn\u2019t just \u201chappen to someone else\u201d. Cyber threats pose a risk to every business, no matter how small. The time to act to <a href=\"https:\/\/memberpress.com\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">protect your business from harm<\/a> is now.<\/p>","content":[{"type":"text","data":"Businesses need to understand that it doesn\u2019t just \u201chappen to someone else\u201d. Cyber threats pose a risk to every business, no matter how small. The time to act to <a href=\"https:\/\/memberpress.com\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">protect your business from harm<\/a> is now."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Where Do Cyber Threats Come From<\/strong>?<\/h3>","content":"Where Do Cyber Threats Come From?","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Attackers are not just one breed of animal we need to worry about. Unfortunately, these threats come from <strong>different types of people and groups<\/strong> with varying agendas.<\/p>","content":[{"type":"text","data":"Attackers are not just one breed of animal we need to worry about. Unfortunately, these threats come from <strong>different types of people and groups<\/strong> with varying agendas."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Unfortunately, many of the most damaging attacks are backed by <strong>hostile countries<\/strong>. Although not as common, <strong>terrorist groups<\/strong> may also be involved in cyberterrorism.<\/p>","content":[{"type":"text","data":"Unfortunately, many of the most damaging attacks are backed by <strong>hostile countries<\/strong>. Although not as common, <strong>terrorist groups<\/strong> may also be involved in cyberterrorism."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p><strong>Organized crime<\/strong> frequently uses digital threats to gather information, hold companies hostage for ransom, and steal data for identity theft and fraud. Law enforcement has linked many credit card scams to organized crime.<\/p>","content":[{"type":"text","data":"<strong>Organized crime<\/strong> frequently uses digital threats to gather information, hold companies hostage for ransom, and steal data for identity theft and fraud. Law enforcement has linked many credit card scams to organized crime."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p><strong>Hackers<\/strong>, <strong>hacktivists<\/strong>, and <strong>disgruntled insiders<\/strong> are also responsible for various digital attacks. For example, sometimes hackers will contact a company employee and hire or blackmail them into becoming accomplices.<\/p>","content":[{"type":"text","data":"<strong>Hackers<\/strong>, <strong>hacktivists<\/strong>, and <strong>disgruntled insiders<\/strong> are also responsible for various digital attacks. For example, sometimes hackers will contact a company employee and hire or blackmail them into becoming accomplices."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>This all sounds pretty sophisticated, but anyone \u2013 even small businesses \u2013 can fall prey to these attacks.<\/p>","content":[{"type":"text","data":"This all sounds pretty sophisticated, but anyone \u2013 even small businesses \u2013 can fall prey to these attacks."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h2 class=\"wp-block-heading\"><strong>Types of Cyber Threats<\/strong><\/h2>","content":"Types of Cyber Threats","data":[],"style":{"align":"left","parent_style":{},"header":"h2","fontSize":"27px"}},{"type":"core\/paragraph","render":"<p>There is a huge number of cyber threat types. But for many attacks, the overarching concept is <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/social-engineering\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">social engineering<\/a>. <\/p>","content":[{"type":"text","data":"There is a huge number of cyber threat types. But for many attacks, the overarching concept is <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/social-engineering\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">social engineering<\/a>. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Social engineering is when hackers manipulate people into ignoring standard security procedures and best practices so the hackers can gain authorized access to systems and data. <\/p>","content":[{"type":"text","data":"Social engineering is when hackers manipulate people into ignoring standard security procedures and best practices so the hackers can gain authorized access to systems and data. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Following are the main types of threats, many of which involve social engineering.<\/p>","content":[{"type":"text","data":"Following are the main types of threats, many of which involve social engineering."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg\" alt=\"Identity theft word on computer keyboard\" class=\"wp-image-38273\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg","alt":"Identity theft word on computer keyboard","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1387418110.jpg","linkDestination":"media"},"style":{"width":720,"height":485,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Malware<\/h3>","content":"Malware","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Malware is <strong>malicious software<\/strong> designed to:<\/p>","content":[{"type":"text","data":"Malware is <strong>malicious software<\/strong> designed to:"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/list","render":"<ul class=\"wp-block-list\"><li>Spy on the user<\/li><li>Steal credentials<\/li><li>Alter, copy, and delete files<\/li><li>Change permissions<\/li><li>Interrupt network operations<\/li><li>Cause other kinds of damage<\/li><\/ul>","content":"<ul class=\"wp-block-list\"><li>Spy on the user<\/li><li>Steal credentials<\/li><li>Alter, copy, and delete files<\/li><li>Change permissions<\/li><li>Interrupt network operations<\/li><li>Cause other kinds of damage<\/li><\/ul>","data":{"listType":"unordered"},"style":{"parent_style":{}}},{"type":"core\/paragraph","render":"<p>There are dozens of <a href=\"https:\/\/www.idstrong.com\/sentinel\/what-is-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware types<\/a> and variants, many of them available on the dark web for sale or trade.<\/p>","content":[{"type":"text","data":"There are dozens of <a href=\"https:\/\/www.idstrong.com\/sentinel\/what-is-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware types<\/a> and variants, many of them available on the dark web for sale or trade."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>DDoS Attacks<\/strong><\/h3>","content":"DDoS Attacks","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg\" alt=\"DDoS attacks illustration\" class=\"wp-image-38279\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg","alt":"DDoS attacks illustration","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/laptop-ddos-attack-vector-id1292783119.jpg","linkDestination":"media"},"style":{"width":1024,"height":512,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>Distributed denial of service (DDoS) attacks <strong>overload a network or system<\/strong>. This disruption of the flow of traffic creates a window of opportunity where the cybercriminals can gain access to steal data or install malicious software.<\/p>","content":[{"type":"text","data":"Distributed denial of service (DDoS) attacks <strong>overload a network or system<\/strong>. This disruption of the flow of traffic creates a window of opportunity where the cybercriminals can gain access to steal data or install malicious software."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">&nbsp;<strong>Phishing<\/strong><\/h3>","content":"&nbsp;Phishing","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Phishing is when bad actors use <a href=\"https:\/\/memberpress.com\/blog\/how-to-prevent-your-marketing-emails-from-getting-stuck-in-spam\/\" target=\"_blank\" rel=\"noreferrer noopener\">legitimate-looking emails<\/a> to trick recipients into clicking a link or visiting a malicious website. <\/p>","content":[{"type":"text","data":"Phishing is when bad actors use <a href=\"https:\/\/memberpress.com\/blog\/how-to-prevent-your-marketing-emails-from-getting-stuck-in-spam\/\" target=\"_blank\" rel=\"noreferrer noopener\">legitimate-looking emails<\/a> to trick recipients into clicking a link or visiting a malicious website. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>When the user visits the site or clicks the link, malware is automatically downloaded. Sometimes private information entered into hacked forms is collected and used.<\/p>","content":[{"type":"text","data":"When the user visits the site or clicks the link, malware is automatically downloaded. Sometimes private information entered into hacked forms is collected and used."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Ransomware<\/strong><\/h3>","content":"Ransomware","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg\" alt=\"abstract background with the words access denied\" class=\"wp-image-38278\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg","alt":"abstract background with the words access denied","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1344801883.jpg","linkDestination":"media"},"style":{"width":788,"height":443,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>Ransomware attacks involve the <strong>encryption<\/strong> of a company's or individual's files. The hacker then holds the locked data hostage in demand for a ransom payment. Many companies choose not to pay. <\/p>","content":[{"type":"text","data":"Ransomware attacks involve the <strong>encryption<\/strong> of a company's or individual's files. The hacker then holds the locked data hostage in demand for a ransom payment. Many companies choose not to pay. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Others do pay, but they find that the promise of a decrypter key is empty, and the key doesn't work to restore the data.<\/p>","content":[{"type":"text","data":"Others do pay, but they find that the promise of a decrypter key is empty, and the key doesn't work to restore the data."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Zero-Day Exploits<\/strong><\/h3>","content":"Zero-Day Exploits","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>New software and devices often come with built-in flaws. With zero-day exploits, cybercriminals exploit these flaws before companies have the time to patch the vulnerabilities.<\/p>","content":[{"type":"text","data":"New software and devices often come with built-in flaws. With zero-day exploits, cybercriminals exploit these flaws before companies have the time to patch the vulnerabilities."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg\" alt=\"zero-day exploits illustration\" class=\"wp-image-38281\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg","alt":"zero-day exploits illustration","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-503592346.jpg","linkDestination":"media"},"style":{"width":724,"height":483,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Man-in-the-Middle Attacks<\/strong><\/h3>","content":"Man-in-the-Middle Attacks","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Man-in-the-middle attacks usually affect <strong>unsecured Wi-Fi networks at public places<\/strong> like coffee shops, airports, and hotels. <\/p>","content":[{"type":"text","data":"Man-in-the-middle attacks usually affect <strong>unsecured Wi-Fi networks at public places<\/strong> like coffee shops, airports, and hotels. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>The hacker monitors the network for connections, then uses special software to steal keystrokes, obtain logins, and take complete control of users\u2019 devices.<\/p>","content":[{"type":"text","data":"The hacker monitors the network for connections, then uses special software to steal keystrokes, obtain logins, and take complete control of users\u2019 devices."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Password Attacks<\/strong><\/h3>","content":"Password Attacks","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg\" alt=\"illustration of a computer screen with password field\" class=\"wp-image-38282\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg","alt":"illustration of a computer screen with password field","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-470004880.jpg","linkDestination":"media"},"style":{"width":671,"height":520,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p><strong>Credential stuffing<\/strong> is when threat actors use stolen passwords from one account and try to use them on another account. <\/p>","content":[{"type":"text","data":"<strong>Credential stuffing<\/strong> is when threat actors use stolen passwords from one account and try to use them on another account. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>This is a common attack because many people <strong>reuse the same password<\/strong> on their digital accounts. Credential stuffing is one of many types of password attacks criminals use to break into users\u2019 online accounts.<\/p>","content":[{"type":"text","data":"This is a common attack because many people <strong>reuse the same password<\/strong> on their digital accounts. Credential stuffing is one of many types of password attacks criminals use to break into users\u2019 online accounts."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\"><strong>Data Breaches<\/strong><\/h3>","content":"Data Breaches","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Dozens of data breaches have exposed millions of <a href=\"https:\/\/www.usa.gov\/privacy\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Americans\u2019 personal information<\/a> on the dark web. These breaches have led to fraud and personal identity theft.<\/p>","content":[{"type":"text","data":"Dozens of data breaches have exposed millions of <a href=\"https:\/\/www.usa.gov\/privacy\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Americans\u2019 personal information<\/a> on the dark web. These breaches have led to fraud and personal identity theft."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">&nbsp;<strong>IoT Device Threats<\/strong><\/h3>","content":"&nbsp;IoT Device Threats","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Because IoT devices are relatively new technologies, many of them have not been appropriately secured. Because of this, IoT devices provide an entry point for hackers to gain access to a home or company network.<\/p>","content":[{"type":"text","data":"Because IoT devices are relatively new technologies, many of them have not been appropriately secured. Because of this, IoT devices provide an entry point for hackers to gain access to a home or company network."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h2 class=\"wp-block-heading\"><strong>10 Ways to Protect Yourself from Cyber Threats<\/strong><\/h2>","content":"10 Ways to Protect Yourself from Cyber Threats","data":[],"style":{"align":"left","parent_style":{},"header":"h2","fontSize":"27px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg\" alt=\"illustration of computer screen with death skull\" class=\"wp-image-38284\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg","alt":"illustration of computer screen with death skull","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/cyber-attack-on-a-laptop-computer-vector-id860363438.jpg","linkDestination":"media"},"style":{"width":1024,"height":768,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>Although the threats are real and imminent, you can take steps to protect yourself and your business. Following are 10 of the best things you can do to ward off cyberattacks.<\/p>","content":[{"type":"text","data":"Although the threats are real and imminent, you can take steps to protect yourself and your business. Following are 10 of the best things you can do to ward off cyberattacks."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Make cybersecurity a top priority<\/h3>","content":"Make cybersecurity a top priority","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>This is the simplest yet most effective thing you can do to <a href=\"https:\/\/memberpress.com\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">protect yourself and your business<\/a>. Be aware of the cyberattacks you're most vulnerable to, and take specific steps to avoid them. <\/p>","content":[{"type":"text","data":"This is the simplest yet most effective thing you can do to <a href=\"https:\/\/memberpress.com\/blog\/the-ultimate-guide-to-security-for-your-membership-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">protect yourself and your business<\/a>. Be aware of the cyberattacks you're most vulnerable to, and take specific steps to avoid them. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>If you run an online business, your best bet is to purchase a <a href=\"https:\/\/www.idstrong.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">high quality monitoring service<\/a> that can keep a close eye on things and resolve any issues that arise before they become catastrophic events.<\/p>","content":[{"type":"text","data":"If you run an online business, your best bet is to purchase a <a href=\"https:\/\/www.idstrong.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">high quality monitoring service<\/a> that can keep a close eye on things and resolve any issues that arise before they become catastrophic events."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Update with security patches<\/h3>","content":"Update with security patches","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg\" alt=\"illustration of a handsome man using laptop and being watched\" class=\"wp-image-38276\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg","alt":"illustration of a handsome man using laptop and being watched","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/handsome-businessman-uses-laptop-lots-of-periscopes-are-peeking-at-vector-id1214179730-1.jpg","linkDestination":"media"},"style":{"width":1024,"height":768,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>Make sure you keep all your systems, hardware, and software updated with the latest security patches. <\/p>","content":[{"type":"text","data":"Make sure you keep all your systems, hardware, and software updated with the latest security patches. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>This is one of the most important reasons to <strong>renew your software licenses annually<\/strong>. For the vast majority of plugins and software, license renewal pays for important things like security patch development and implementation.<\/p>","content":[{"type":"text","data":"This is one of the most important reasons to <strong>renew your software licenses annually<\/strong>. For the vast majority of plugins and software, license renewal pays for important things like security patch development and implementation."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Train your team<\/h3>","content":"Train your team","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Make sure your staff understands the way phishing attacks and social engineering work. Then make sure they know how to respond in the event your business is attacked.<\/p>","content":[{"type":"text","data":"Make sure your staff understands the way phishing attacks and social engineering work. Then make sure they know how to respond in the event your business is attacked."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Consider holding a company-wide workshop or purchasing an online course for your team. For example, Coursera offers an excellent and affordable <a href=\"https:\/\/www.coursera.org\/learn\/ibm-cyber-threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">cyber threat intelligence course<\/a>.<\/p>","content":[{"type":"text","data":"Consider holding a company-wide workshop or purchasing an online course for your team. For example, Coursera offers an excellent and affordable <a href=\"https:\/\/www.coursera.org\/learn\/ibm-cyber-threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">cyber threat intelligence course<\/a>."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Don't click links<\/h3>","content":"Don't click links","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg\" alt=\"illustration of hacker in the dark\" class=\"wp-image-38280\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg","alt":"illustration of hacker in the dark","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/iStock-1264284948.jpg","linkDestination":"media"},"style":{"width":703,"height":497,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>While the majority of email and SMS links are legitimate, it's <em>extremely difficult<\/em> to tell the difference between real and phishing links. <\/p>","content":[{"type":"text","data":"While the majority of email and SMS links are legitimate, it's <em>extremely difficult<\/em> to tell the difference between real and phishing links. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Therefore, you should make it a habit to <strong>never click a link or download an attachment in an email or SMS message<\/strong>. Instead, visit the URL directly. Just type the address into your browser, and you should be able to see whether the link is honest.<\/p>","content":[{"type":"text","data":"Therefore, you should make it a habit to <strong>never click a link or download an attachment in an email or SMS message<\/strong>. Instead, visit the URL directly. Just type the address into your browser, and you should be able to see whether the link is honest."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Check out your sender<\/h3>","content":"Check out your sender","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Always verify the sender of your emails before taking any action. You can do this by:<\/p>","content":[{"type":"text","data":"Always verify the sender of your emails before taking any action. You can do this by:"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/list","render":"<ol class=\"wp-block-list\"><li>Checking the from email for misspellings<\/li><li>Verifying whether the address and display name are they same (they should be)<\/li><\/ol>","content":"<ol class=\"wp-block-list\"><li>Checking the from email for misspellings<\/li><li>Verifying whether the address and display name are they same (they should be)<\/li><\/ol>","data":{"listType":"ordered"},"style":{"parent_style":{}}},{"type":"core\/paragraph","render":"<p>You can also check out the sender's DMARC record. Fraudmarc has a <a href=\"https:\/\/fraudmarc.com\/dmarc-check\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DMARC Record Check tool<\/a> that's free to use. <\/p>","content":[{"type":"text","data":"You can also check out the sender's DMARC record. Fraudmarc has a <a href=\"https:\/\/fraudmarc.com\/dmarc-check\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DMARC Record Check tool<\/a> that's free to use. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Update your devices<\/h3>","content":"Update your devices","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Consider installing plugins, extensions, and apps to keep your devices updated with the latest antivirus\/anti-malware software.<\/p>","content":[{"type":"text","data":"Consider installing plugins, extensions, and apps to keep your devices updated with the latest antivirus\/anti-malware software."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>There are all kinds of tools out there, many of which are free to use. Check out PCmag's 2022 <a href=\"https:\/\/www.pcmag.com\/picks\/the-best-free-antivirus-protection\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">list of free antivirus software here<\/a>.<\/p>","content":[{"type":"text","data":"There are all kinds of tools out there, many of which are free to use. Check out PCmag's 2022 <a href=\"https:\/\/www.pcmag.com\/picks\/the-best-free-antivirus-protection\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">list of free antivirus software here<\/a>."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Get serious about your passwords<\/h3>","content":"Get serious about your passwords","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg\" alt=\"cell phone sign in screen with fish hook\" class=\"wp-image-38277\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg","alt":"cell phone sign in screen with fish hook","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/signin-form-on-fishing-hook-on-the-screen-of-a-smartphone-scam-and-vector-id1018936974.jpg","linkDestination":"media"},"style":{"width":1024,"height":768,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>Implement strong password requirements and procedures like <strong>two-factor authentication<\/strong>. If possible, move to <strong>biometrics <\/strong>like fingerprint logins, and away from passwords altogether. <\/p>","content":[{"type":"text","data":"Implement strong password requirements and procedures like <strong>two-factor authentication<\/strong>. If possible, move to <strong>biometrics <\/strong>like fingerprint logins, and away from passwords altogether. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p><strong>And never, ever reuse passwords.<\/strong><\/p>","content":[{"type":"text","data":"<strong>And never, ever reuse passwords.<\/strong>"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Backup your data<\/h3>","content":"Backup your data","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>In case of a ransomware attack, make sure you have a solid backup of all your data. And <strong>store your backups offsite<\/strong>. Following are several WordPress backup plugins we recommend:<\/p>","content":[{"type":"text","data":"In case of a ransomware attack, make sure you have a solid backup of all your data. And <strong>store your backups offsite<\/strong>. Following are several WordPress backup plugins we recommend:"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/list","render":"<ul class=\"wp-block-list\"><li><a href=\"https:\/\/memberpress.com\/go\/wptimecapsule\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">WP Time Capsule<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/backupbuddy\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BackupBuddy<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/blogvault\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BlogVault<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/jetpack\/main\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"Jetpack\">Jetpack<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/wpstaging\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"WP Staging\">WP Staging<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/updraft\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">UpdraftPlus<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/stagecoach\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">WP Stagecoach<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/duplicator\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">Duplicator Pro<\/a> (by Snapcreek)<\/li><\/ul>","content":"<ul class=\"wp-block-list\"><li><a href=\"https:\/\/memberpress.com\/go\/wptimecapsule\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">WP Time Capsule<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/backupbuddy\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BackupBuddy<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/blogvault\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">BlogVault<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/jetpack\/main\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"Jetpack\">Jetpack<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/wpstaging\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\" title=\"WP Staging\">WP Staging<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/updraft\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">UpdraftPlus<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/stagecoach\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">WP Stagecoach<\/a><\/li><li><a href=\"https:\/\/memberpress.com\/go\/duplicator\" target=\"_blank\" rel=\"noreferrer noopener nofollow sponsored\">Duplicator Pro<\/a> (by Snapcreek)<\/li><\/ul>","data":{"listType":"unordered"},"style":{"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Avoid unsecured networks<\/h3>","content":"Avoid unsecured networks","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/paragraph","render":"<p>Ideally, you should always <strong>use a virtual private network (VPN)<\/strong> when connecting with public networks. A VPN sets up an encrypted, private connection between your device and the public network. <\/p>","content":[{"type":"text","data":"Ideally, you should always <strong>use a virtual private network (VPN)<\/strong> when connecting with public networks. A VPN sets up an encrypted, private connection between your device and the public network. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>It's a good practice to avoid unsecured public networks in general.<\/p>","content":[{"type":"text","data":"It's a good practice to avoid unsecured public networks in general."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h3 class=\"wp-block-heading\">Encrypt your data<\/h3>","content":"Encrypt your data","data":[],"style":{"align":"left","parent_style":{},"header":"h3","fontSize":"21px"}},{"type":"core\/image","render":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg\"><img src=\"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg\" alt=\"\" class=\"wp-image-38286\"\/><\/a><\/figure>","content":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg","data":{"linkSrc":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg","src":"https:\/\/memberpress.com\/wp-content\/uploads\/2022\/06\/digital-security-vector-id513112844.jpg","linkDestination":"media"},"style":{"width":1024,"height":768,"align":"left","parent_style":{},"sizeSlug":"full"}},{"type":"core\/paragraph","render":"<p>You should encrypt all the data in your systems and on your devices. Data encryption helps protect your private and sensitive information. It also makes the communication between client apps and servers much more secure. <\/p>","content":[{"type":"text","data":"You should encrypt all the data in your systems and on your devices. Data encryption helps protect your private and sensitive information. It also makes the communication between client apps and servers much more secure. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>When your data is encrypted, even if unauthorized people or entities get their hands on your data, they'll be unable to read it.<\/p>","content":[{"type":"text","data":"When your data is encrypted, even if unauthorized people or entities get their hands on your data, they'll be unable to read it."}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/heading","render":"<h2 class=\"wp-block-heading\">Conclusion<\/h2>","content":"Conclusion","data":[],"style":{"align":"left","parent_style":{},"header":"h2","fontSize":"27px"}},{"type":"core\/paragraph","render":"<p>So much of our personal information is readily available online, and there are always cyber risks to worry about. <\/p>","content":[{"type":"text","data":"So much of our personal information is readily available online, and there are always cyber risks to worry about. "}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p>Make cybersecurity one of your main priorities to protect your online business and your entire digital world.&nbsp;<\/p>","content":[{"type":"text","data":"Make cybersecurity one of your main priorities to protect your online business and your entire digital world.&nbsp;"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}},{"type":"core\/paragraph","render":"<p><strong>If you liked this article, be sure to <\/strong><a href=\"https:\/\/memberpress.com\/subscribe-to-the-memberpress-blog\/\"><strong>subscribe to the MemberPress blog<\/strong><\/a><strong>!<\/strong><\/p>","content":[{"type":"text","data":"<strong>If you liked this article, be sure to <\/strong><a href=\"https:\/\/memberpress.com\/subscribe-to-the-memberpress-blog\/\"><strong>subscribe to the MemberPress blog<\/strong><\/a><strong>!<\/strong>"}],"data":[],"style":{"textAlign":"left","color":"","dropCap":false,"parent_style":{}}}],"app_access":{"can_access":true,"restrict_message":null},"_links":{"self":[{"href":"https:\/\/memberpress.com\/es\/wp-json\/wp\/v2\/posts\/35601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/memberpress.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/memberpress.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/memberpress.com\/es\/wp-json\/wp\/v2\/users\/63703"}],"replies":[{"embeddable":true,"href":"https:\/\/memberpress.com\/es\/wp-json\/wp\/v2\/comments?post=35601"}],"version-history":[{"count":0,"href":"https:\/\/memberpress.com\/es\/wp-json\/wp\/v2\/posts\/35601\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/memberpress.com\/es\/wp-json\/wp\/v2\/media\/38289"}],"wp:attachment":[{"href":"https:\/\/memberpress.com\/es\/wp-json\/wp\/v2\/media?parent=35601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/memberpress.com\/es\/wp-json\/wp\/v2\/categories?post=35601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/memberpress.com\/es\/wp-json\/wp\/v2\/tags?post=35601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}