{"id":1311,"date":"2014-01-04T17:15:33","date_gmt":"2014-01-04T23:15:33","guid":{"rendered":"http:\/\/grownuptech.com\/?p=41"},"modified":"2024-08-12T19:15:21","modified_gmt":"2024-08-12T19:15:21","slug":"how-to-stay-safe-on-the-web","status":"publish","type":"post","link":"https:\/\/oakwoodexperience.com\/staging\/2633\/how-to-stay-safe-on-the-web\/","title":{"rendered":"How to stay safe on the Web"},"content":{"rendered":"<p>Here\u2019s the reality: The only way to stay completely safe on the web is to stay OFF the web.<\/p>\n<p>&nbsp;<\/p>\n<p>Wait, wait, I didn\u2019t mean NOW, finish reading the article.<\/p>\n<p>&nbsp;<\/p>\n<p>Yes, when you connect your computer to other computers (and that\u2019s the whole idea of the web), you do open your door to a certain amount of bad behavior. The purpose of this article is to help you minimize the risk of virus\/malware infections, identity theft, and loss of all privacy.<\/p>\n<p>&nbsp;<\/p>\n<p><b><i>computer infections<\/i><\/b><\/p>\n<p>First and foremost, regardless of whether you\u2019re on a Mac or a PC, or even Linux, you can be infected with bad stuff, so you need an antivirus\/anti-malware program. There are many to choose from and I am not going to recommend any in this article. I may later on review several, but for now I\u2019ll list several that are low-cost or no-cost. I personally use Sophos Anti-Virus on my Mac. I learned about it from following the podcast and blog, and I realize most of my audience will probably NOT be following their podcast or blog. It is free of charge and it works. My husband is using AVG, also free of charge. Both boys are using Microsoft Security Essentials, and that\u2019s also what I use on my Windows machine. \u00a0I have used AVAST with good results. The biggest problems people report with some antivirus programs is that they can be overzealous and really slow your machine down. The benefit of using a free program is that if you don\u2019t like how it makes your machine perform, you can change programs with no heartburn. Some of the programs available for charge include ESOD, McAfee (pronounce it MACK-a-fee), Trend Micro, and Symantec\/Norton products. I used a Norton suite many years ago and for the most part I was not disappointed in what I got.<\/p>\n<p>&nbsp;<\/p>\n<p>Another tool is a firewall. You can use a hardware firewall appliance but for most of us it is not necessary. You can get a firewall to install if you run a Linux machine, and there are several you can use for Windows. I\u2019ve used Zone Alarm and I liked it okay. Now I\u2019m using Windows Firewall on my windows machine. I do not have a Firewall on my Mac, but my internet connection is not great, and we disconnect our computers from the network when we close the lids on our laptops anyway.<\/p>\n<p>&nbsp;<\/p>\n<p>The most important tool you have to prevent virus and malware infections is your two hands. What they do\u2014and what they DON\u2019T do\u2014can have the biggest effect on how likely you are to become infected. Repeat after me: I DO NOT HAVE TO CLICK ON EVERY LINK IN MY EMAIL. I DO NOT HAVE TO CLICK ON EVERY STORY THAT TUGS AT MY HEARTSTRINGS. I DO NOT HAVE TO BELIEVE EVERYTHING I SEE ON THE INTERNET.<\/p>\n<p>&nbsp;<\/p>\n<p>When you see a story on Facebook to the effect that a celebrity has died or has done something scandalous, do some research before you click on it. Many of the stories like that will take you to another login page that looks just like a Facebook login, but it will actually capture your login activity; when you type in your name and password, there\u2019s a piece of software capturing that information. There are various reasons people may want to do this, but what you will most likely see is that all of a sudden people are telling you that you\u2019re putting stuff on their wall or sending them direct messages trying to sell them something; or you see weight loss products or male enhancement products showing up in your timeline.<\/p>\n<p>&nbsp;<\/p>\n<p>If you use Windows Vista or Windows 7, you have User Account Control\u2014USE IT! Yes, it can be annoying to have to answer \u201cAre you sure you want to do this\u201d a couple of times, but it is a viable alternative to having to enter a password for all installs, which Linux and Mac require. If the \u201care you sure\u201d dialog box comes up and you don\u2019t know why, TELL IT NO!!!! If you are trying to install something, then, tell it YES\u2014but if you don\u2019t know why your computer is asking you if you want to make a change to your computer\u2014and installing something is making a change\u2014then don\u2019t authorize the action. A lot of the infections come in with your permission, and this will stop that portion.<\/p>\n<p>&nbsp;<\/p>\n<p>Beware of what you allow with what you WANT to allow. READ what you\u2019re downloading. Lately, Adobe Reader and Flash Player have been \u201coffering\u201d downloads of other programs, notable a virus scanner. You should already be using one before you get to the point of seeing that. If you install any kind of coupon printer, READ THAT AGREEMENT!!! Seriously, I got to the point of agreeing to install one and I read what I was installing. The license I was agreeing to stated that I was also agreeing to install other software that would collect information on where you go on the web, what you do, whom you interact with, etc., none of which <i>in and of itself<\/i> is necessarily \u201cbad.\u201d The problem is that you can\u2019t be sure that all the other software is doing is what it says it is doing. It may also be logging keystrokes. That may not be horrible if all they got was your login to your favorite gardening website. However, if you log into your bank, and that software sends back to its boss your username and password of your bank login, that\u2019s called a compromised account. It\u2019s very important that you understand what you are installing, because once it\u2019s installed, it may be no easy task to get rid of it. Also, it may be phoning home and allowing installations of other software as well, that may be sending out spam from your machine.<\/p>\n<p>&nbsp;<\/p>\n<p>A couple of telltale signs that you are infected will be numerous popups of browser windows, or a \u00a0consistently dreadfully slow computer when it shouldn\u2019t be (if it\u2019s running Vista or Windows 7, or one of the later Mac OS X versions, or a fairly recent version of any Linux OS). Every computer will have times when it is more sluggish than usual, if there are a lot of processes occurring at once or if it is processing updates, etc. but if it never returns to normal performance, an infection is one possibility.<\/p>\n<p>&nbsp;<\/p>\n<p><b><i>ransomware<\/i><\/b><\/p>\n<p>Ransomware is probably about as bad an infection as you can get. Before I get too far into what it is and how to avoid it, I need to tell you to BACKUP, BACKUP, BACKUP! \u00a0You\u2019ll understand in just a few minutes.<\/p>\n<p>&nbsp;<\/p>\n<p>Ransomware holds your computer hostage. Earlier versions just put a virus on your machine and presented a page with a link that took you to a payment site. Once your credit card information was entered, you were presented with another link that would either provide a cleaner to install or clean the machine with a scan-and-remove tool. The underlying threat was that anyone who had no qualms against holding your computer for ransom with a virus would not hesitate to use that credit card information for other nefarious purposes. We actually had some luck cleaning this stuff off for customers.<\/p>\n<p>&nbsp;<\/p>\n<p>The newest variant of ransomware carries the name CryptoLocker, and unless you pay the ransom they demand, there is no cure. Lemme explain:<\/p>\n<p>CryptoLocker begins the process of encrypting your hard drive and alerts you to its presence. The encryption process they use is asymmetric, which means that one key, or mathematical algorithm, is used to encrypt the data, and a different, but matching, key is used to decrypt it. The notice you get is that you have a certain number of days to pay the ransom before your hard drive will be inaccessible to you. The payment demanded is in two forms, one is bitcoin, and the other is MoneyPak. Both of these methods work to shield against identification, making your payment untraceable.<\/p>\n<p>Your second best option if you get a CryptoLocker infection is to stop using the machine immediately, disconnect it from the web and from any storage drives, and do what we call a \u201cnuke and pave\u201d\u2014completely reformat the drive and reinstall the operating system. The best option is to do a complete restore from a complete backup, and that is only the best option if the backup you bring in was done before the encryption started. If you ever get a notification that you have been hit by CryptoLocker, or by any software that says it will encrypt your hard drive and demands payment, immediately disable any automatic backups, and uninstall your backup software, if possible. This will prevent accidental overwriting of any good backups with encrypted backups.<\/p>\n<p>&nbsp;<\/p>\n<p>We\u2019ll go further into backup and restore in other places on this site, but from here you just want to take away the best ways to keep it from happening to you and what to do if it does.<\/p>\n<p>&nbsp;<\/p>\n<p><b><i>identity theft<\/i><\/b><\/p>\n<p>When someone uses your personally identifiable information (PII) to do things as if they were you, such as open accounts, obtain credit, or rent an apartment, your identity has been stolen. This can happen as easily among family members as it can on the web. I\u2019m not going to try to tell you how to deal with your family, but I can tell you how to guard against it on the web.<\/p>\n<p>&nbsp;<\/p>\n<p>Let\u2019s be clear on this: Banking and shopping over the internet are reasonably safe\u2014as long as you pay attention and do certain things, and avoid certain things.<\/p>\n<p>&nbsp;<\/p>\n<p>First, the DO\u2019s: \u00a0DO monitor all your bank accounts and credit and debit card activity. Verify all purchases and question any suspicious transactions. If you have any questions, call the financial institution immediately. DO log out of stores and bank websites where you have used your bank card. DO protect any passwords you use. DO look for this icon or this bar whenever you plan on using your bank card, or when you visit your bank\u2019s website for login. DO visit my other site to learn how to create a strong password.<\/p>\n<p>&nbsp;<\/p>\n<p>Now the DON\u2019Ts: DON\u2019T use public computers, like at a library or school or internet cafe, to conduct financial transactions. DON\u2019T use anything on this list of passwords. DON\u2019T leave passwords lying around, stuck on the bottom of your keyboard, taped to your monitor. DON\u2019T click on a login link in an email that looks like it came from your bank or other place where you\u2019ve done credit or debit card transactions. DON\u2019T fall for any messages that come from friends stranded in London with no money.<\/p>\n<p>&nbsp;<\/p>\n<p><b><i>physical theft<\/i><\/b><\/p>\n<p>This may sound like a strange subject to be addressing on a tech blog, but you can defeat a lot of your physical security with a few keystrokes. Pay attention to how much of your activity you post. If you make it known that you\u2019re gone, and have previously said something on Facebook about a door lock that doesn\u2019t work right, and posted a picture from your phone of your new car in your driveway, there\u2019s a strong possibility that a thief can use metadata in the photo to figure out the exact location of the unoccupied house with the malfunctioning door lock. Make sure you disable location abilities on your photo app on your phone. Set your Facebook privacy to Friends only. Don\u2019t advertise goodies thieves may want, if you get a fabulous new television for Christmas, don\u2019t take the box to the curb till trash day.<\/p>\n<p>&nbsp;<\/p>\n<p><b><i>kids<\/i><\/b><\/p>\n<p>Yes, your grandkids and your kids all know how to use this stuff better than you do. The problem is that they don\u2019t know any more about doing it <i>safely<\/i> than you do. In fact, after today, you\u2019ll know more than they do.<\/p>\n<p>&nbsp;<\/p>\n<p>In much the same way that you\u2019ve taught them about physical \u201cstranger-danger,\u201d talk to them about cyber-danger. Not everyone who \u201cfriends\u201d them is their friend, and kids shouldn\u2019t have any \u201cfriends\u201d who aren\u2019t FRIENDS. If they have never met them, they shouldn\u2019t be online friends with them. There may be exceptions to this, for example, in a heavily monitored space set up as a safe place for kids to meet online, but even then you\u2019d want to vet the monitoring organization.<\/p>\n<p>&nbsp;<\/p>\n<p>You\u2019ve taught your kids to walk away from a bully, teach them the same thing about cyberbullies. Unfriend and block. Bullies are everywhere, and children simply don\u2019t have the sensibilities to allow them to deal with them. Best to avoid altogether.<\/p>\n<p>&nbsp;<\/p>\n<p>Even if your kids are more technically savvy than you are, you are still their first line of defense against dangers online. Know what they are doing, know where they visit. Talk to them, and encourage them to talk to you. Let them know you won\u2019t blow up if they accidentally end up at a porn site\u2014it can happen by accident, and yes, you do want to know about it. You want them to know that you want them to talk about what happened, so they can process the feelings of ickiness they had when they saw what they saw, and so they won\u2019t carry a burden of guilt for landing on a page they didn\u2019t want to get to. It happens, it\u2019s not their fault. Your cool head will serve them far better than any punishment (which they don\u2019t deserve just for that) would.<\/p>\n<p>&nbsp;<\/p>\n<p><b><i>if it happens to you<\/i><\/b><\/p>\n<p>Depending on what exactly \u201cit\u201d is that happens to you, the process is different.<\/p>\n<p>&nbsp;<\/p>\n<p>If you are a victim of identity theft, as soon as you see something suspicious, contact your bank\u2019s fraud victim officer or whoever it is that is in charge of identity theft. Follow their instructions carefully, and make sure one of those instructions is to file a police report.<\/p>\n<p>&nbsp;<\/p>\n<p>If you are a victim of cyberlocker, there isn\u2019t much you can do beyond start over.<\/p>\n<p>&nbsp;<\/p>\n<p>If your children are victims of cyberbullying, use the incident to bolster their understanding of where their genuine worth comes from. If there are threats of physical violence, your child probably has an idea of how realistic the threats are, and your course of action will be driven from that. Your kids\u2019 friends probably know the bullies as well, those friends\u2019 parents may be good resources as to how to deal with it. I\u2019ll never understand how a cyberbullying victim keeps the bully as a \u201cfriend\u201d online. \u00a0But as a parent, your child should NEVER HAVE A PASSWORD THAT YOU DON\u2019T KNOW!!!!!<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>This sounds like a lot, and it may be. I\u2019ve adopted these strategies sort of by default as I learned of each threat. I spend a lot of time reading about and listening to and learning about this stuff so you don\u2019t have to, so this isn\u2019t just my opinion. It\u2019s an aggregate of about 25 blogs and 12 podcasts on technology and security and parenthood. I\u2019ve just been able to connect the dots and bring it all into one document.<\/p>\n<p>&nbsp;<\/p>\n<p>Any questions, comments or suggestions? Anything I\u2019ve missed or that you wish you had found here? Let me know. If I can address it quickly, I\u2019ll either edit the post or answer your comment. If it\u2019s deep enough, I\u2019ll write a whole new post.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s the reality: The only way to stay completely safe on the web is to stay OFF the web. &nbsp; Wait, wait, I didn\u2019t mean NOW, finish reading the article. &nbsp; Yes, when you connect your computer to other computers (and that\u2019s the whole idea of the web), you do open your door to a&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[8],"tags":[276,279,294,317,320,321,49,333,339,342,343,385,388,404,50,411,425,432,436,441,448,466,111,480,497,501,508,528,539,542,545,553,554,582,600,606,608,615,616,622,161,648,657,672,173,677,678,679,179,683,689,696,709,713,720,734,737,757,768,773,781,782,800,802,824,208,827,835,856,861,215,883,894,895,901,924,930,937,939,51,954,965,966,1002,1013,1018,1019,1023,1027,1033,1035,1038,1048,257,1071],"class_list":["post-1311","post","type-post","status-publish","format-standard","hentry","category-recentrelevant","tag-account","tag-activity","tag-algorithm","tag-authorize","tag-avast","tag-avg","tag-backup","tag-believe","tag-bitcoin","tag-block","tag-blog","tag-cleaner","tag-click","tag-compromise","tag-computer","tag-connect","tag-coupon","tag-credit","tag-cryptolocker","tag-cyberbully","tag-defense","tag-disable","tag-disconnect","tag-download","tag-email","tag-encryption","tag-esod","tag-facebook-celebrity","tag-financial","tag-firewall","tag-flash","tag-fraud","tag-free","tag-hands","tag-hostage","tag-identifiable","tag-identity-theft","tag-infection","tag-information","tag-install","tag-internet","tag-keystroke","tag-laptop","tag-link","tag-linux","tag-location","tag-logger","tag-login","tag-mac","tag-machine","tag-malware","tag-mcafee","tag-microsoft-security-essentials","tag-minimize","tag-monitor","tag-network","tag-norton","tag-overzealous","tag-password","tag-pc","tag-permission","tag-personal","tag-podcast","tag-popup","tag-printer","tag-privacy","tag-problems","tag-program","tag-ransomware","tag-reader","tag-research","tag-risk","tag-safe","tag-safety","tag-scandal","tag-slow","tag-social","tag-sophos","tag-spam","tag-storage","tag-story","tag-suspicious","tag-symantec","tag-trend-micro","tag-uac","tag-unfriend","tag-uninstall","tag-update","tag-username","tag-verify","tag-victim","tag-virus","tag-web","tag-windows","tag-zone-alarm"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Stay Safe on the Web<\/title>\n<meta name=\"description\" content=\"The web is a marvelous place--but it&#039;s also a dangerous one if you don&#039;t practice defensive surfing. These ideas will keep you safer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/oakwoodexperience.com\/how-to-stay-safe-on-the-web\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Stay Safe on the Web\" \/>\n<meta property=\"og:description\" content=\"The web is a marvelous place--but it&#039;s also a dangerous one if you don&#039;t practice defensive surfing. These ideas will keep you safer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/oakwoodexperience.com\/how-to-stay-safe-on-the-web\/\" \/>\n<meta property=\"og:site_name\" content=\"Oakwood Experience\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/profile.php?id=61563885192881\" \/>\n<meta property=\"article:published_time\" content=\"2014-01-04T23:15:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-12T19:15:21+00:00\" \/>\n<meta name=\"author\" content=\"Nancy Jones\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/x.com\/oakwood92297\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nancy Jones\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/how-to-stay-safe-on-the-web\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/how-to-stay-safe-on-the-web\\\/\"},\"author\":{\"name\":\"Nancy Jones\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/person\\\/55a8ed6b0b18ff93e63bbba903d4dae3\"},\"headline\":\"How to stay safe on the Web\",\"datePublished\":\"2014-01-04T23:15:33+00:00\",\"dateModified\":\"2024-08-12T19:15:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/how-to-stay-safe-on-the-web\\\/\"},\"wordCount\":2668,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#organization\"},\"keywords\":[\"account\",\"activity\",\"algorithm\",\"authorize\",\"Avast\",\"AVG\",\"backup\",\"believe\",\"bitcoin\",\"block\",\"blog\",\"cleaner\",\"click\",\"compromise\",\"computer\",\"connect\",\"coupon\",\"credit\",\"cryptolocker\",\"cyberbully\",\"defense\",\"disable\",\"Disconnect\",\"download\",\"email\",\"encryption\",\"ESOD\",\"Facebook celebrity\",\"financial\",\"firewall\",\"flash\",\"fraud\",\"free\",\"hands\",\"hostage\",\"identifiable\",\"identity theft\",\"infection\",\"information\",\"install\",\"internet\",\"keystroke\",\"laptop\",\"link\",\"Linux\",\"location\",\"logger\",\"login\",\"Mac\",\"machine\",\"malware\",\"McAfee\",\"Microsoft Security Essentials\",\"minimize\",\"monitor\",\"network\",\"Norton\",\"overzealous\",\"password\",\"PC\",\"permission\",\"personal\",\"podcast\",\"popup\",\"printer\",\"Privacy\",\"problems\",\"program\",\"ransomware\",\"reader\",\"research\",\"risk\",\"safe\",\"safety\",\"scandal\",\"slow\",\"social\",\"Sophos\",\"spam\",\"storage\",\"story\",\"suspicious\",\"Symantec\",\"Trend Micro\",\"UAC\",\"unfriend\",\"uninstall\",\"update\",\"username\",\"verify\",\"victim\",\"virus\",\"web\",\"Windows\",\"Zone Alarm\"],\"articleSection\":[\"Recent and Relevant\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/oakwoodexperience.com\\\/how-to-stay-safe-on-the-web\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/how-to-stay-safe-on-the-web\\\/\",\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/how-to-stay-safe-on-the-web\\\/\",\"name\":\"How to Stay Safe on the Web\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#website\"},\"datePublished\":\"2014-01-04T23:15:33+00:00\",\"dateModified\":\"2024-08-12T19:15:21+00:00\",\"description\":\"The web is a marvelous place--but it's also a dangerous one if you don't practice defensive surfing. These ideas will keep you safer.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/how-to-stay-safe-on-the-web\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/oakwoodexperience.com\\\/how-to-stay-safe-on-the-web\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/how-to-stay-safe-on-the-web\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/oakwoodexperience.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to stay safe on the Web\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#website\",\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/\",\"name\":\"Oakwood Experience\",\"description\":\"Technology news, information, commentary, tutorials, and deep dives, and my photography journey.\",\"publisher\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/oakwoodexperience.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#organization\",\"name\":\"Oakwood Experience\",\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/oakwoodexperience.com\\\/staging\\\/2633\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Oakwood-Experience.png?fit=1000%2C885&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/oakwoodexperience.com\\\/staging\\\/2633\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Oakwood-Experience.png?fit=1000%2C885&ssl=1\",\"width\":1000,\"height\":885,\"caption\":\"Oakwood Experience\"},\"image\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/person\\\/55a8ed6b0b18ff93e63bbba903d4dae3\",\"name\":\"Nancy Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g\",\"caption\":\"Nancy Jones\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/profile.php?id=61563885192881\",\"https:\\\/\\\/www.instagram.com\\\/southernfriedyanqui\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/feed\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/x.com\\\/oakwood92297\",\"https:\\\/\\\/www.youtube.com\\\/@nancyjones6235\"],\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/staging\\\/2633\\\/author\\\/nancyjones36507\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Stay Safe on the Web","description":"The web is a marvelous place--but it's also a dangerous one if you don't practice defensive surfing. These ideas will keep you safer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/oakwoodexperience.com\/how-to-stay-safe-on-the-web\/","og_locale":"en_US","og_type":"article","og_title":"How to Stay Safe on the Web","og_description":"The web is a marvelous place--but it's also a dangerous one if you don't practice defensive surfing. These ideas will keep you safer.","og_url":"https:\/\/oakwoodexperience.com\/how-to-stay-safe-on-the-web\/","og_site_name":"Oakwood Experience","article_author":"https:\/\/www.facebook.com\/profile.php?id=61563885192881","article_published_time":"2014-01-04T23:15:33+00:00","article_modified_time":"2024-08-12T19:15:21+00:00","author":"Nancy Jones","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/x.com\/oakwood92297","twitter_misc":{"Written by":"Nancy Jones","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/oakwoodexperience.com\/how-to-stay-safe-on-the-web\/#article","isPartOf":{"@id":"https:\/\/oakwoodexperience.com\/how-to-stay-safe-on-the-web\/"},"author":{"name":"Nancy Jones","@id":"https:\/\/oakwoodexperience.com\/#\/schema\/person\/55a8ed6b0b18ff93e63bbba903d4dae3"},"headline":"How to stay safe on the Web","datePublished":"2014-01-04T23:15:33+00:00","dateModified":"2024-08-12T19:15:21+00:00","mainEntityOfPage":{"@id":"https:\/\/oakwoodexperience.com\/how-to-stay-safe-on-the-web\/"},"wordCount":2668,"commentCount":0,"publisher":{"@id":"https:\/\/oakwoodexperience.com\/#organization"},"keywords":["account","activity","algorithm","authorize","Avast","AVG","backup","believe","bitcoin","block","blog","cleaner","click","compromise","computer","connect","coupon","credit","cryptolocker","cyberbully","defense","disable","Disconnect","download","email","encryption","ESOD","Facebook celebrity","financial","firewall","flash","fraud","free","hands","hostage","identifiable","identity theft","infection","information","install","internet","keystroke","laptop","link","Linux","location","logger","login","Mac","machine","malware","McAfee","Microsoft Security Essentials","minimize","monitor","network","Norton","overzealous","password","PC","permission","personal","podcast","popup","printer","Privacy","problems","program","ransomware","reader","research","risk","safe","safety","scandal","slow","social","Sophos","spam","storage","story","suspicious","Symantec","Trend Micro","UAC","unfriend","uninstall","update","username","verify","victim","virus","web","Windows","Zone Alarm"],"articleSection":["Recent and Relevant"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/oakwoodexperience.com\/how-to-stay-safe-on-the-web\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/oakwoodexperience.com\/how-to-stay-safe-on-the-web\/","url":"https:\/\/oakwoodexperience.com\/how-to-stay-safe-on-the-web\/","name":"How to Stay Safe on the Web","isPartOf":{"@id":"https:\/\/oakwoodexperience.com\/#website"},"datePublished":"2014-01-04T23:15:33+00:00","dateModified":"2024-08-12T19:15:21+00:00","description":"The web is a marvelous place--but it's also a dangerous one if you don't practice defensive surfing. These ideas will keep you safer.","breadcrumb":{"@id":"https:\/\/oakwoodexperience.com\/how-to-stay-safe-on-the-web\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/oakwoodexperience.com\/how-to-stay-safe-on-the-web\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/oakwoodexperience.com\/how-to-stay-safe-on-the-web\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/oakwoodexperience.com\/"},{"@type":"ListItem","position":2,"name":"How to stay safe on the Web"}]},{"@type":"WebSite","@id":"https:\/\/oakwoodexperience.com\/#website","url":"https:\/\/oakwoodexperience.com\/","name":"Oakwood Experience","description":"Technology news, information, commentary, tutorials, and deep dives, and my photography journey.","publisher":{"@id":"https:\/\/oakwoodexperience.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/oakwoodexperience.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/oakwoodexperience.com\/#organization","name":"Oakwood Experience","url":"https:\/\/oakwoodexperience.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/oakwoodexperience.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/oakwoodexperience.com\/staging\/2633\/wp-content\/uploads\/2024\/07\/Oakwood-Experience.png?fit=1000%2C885&ssl=1","contentUrl":"https:\/\/i0.wp.com\/oakwoodexperience.com\/staging\/2633\/wp-content\/uploads\/2024\/07\/Oakwood-Experience.png?fit=1000%2C885&ssl=1","width":1000,"height":885,"caption":"Oakwood Experience"},"image":{"@id":"https:\/\/oakwoodexperience.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/oakwoodexperience.com\/#\/schema\/person\/55a8ed6b0b18ff93e63bbba903d4dae3","name":"Nancy Jones","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g","caption":"Nancy Jones"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61563885192881","https:\/\/www.instagram.com\/southernfriedyanqui\/","https:\/\/www.linkedin.com\/feed\/","https:\/\/x.com\/https:\/\/x.com\/oakwood92297","https:\/\/www.youtube.com\/@nancyjones6235"],"url":"https:\/\/oakwoodexperience.com\/staging\/2633\/author\/nancyjones36507\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts\/1311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/comments?post=1311"}],"version-history":[{"count":1,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts\/1311\/revisions"}],"predecessor-version":[{"id":1626,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts\/1311\/revisions\/1626"}],"wp:attachment":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/media?parent=1311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/categories?post=1311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/tags?post=1311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}