{"id":800,"date":"2019-03-06T20:18:44","date_gmt":"2019-03-06T20:18:44","guid":{"rendered":"http:\/\/tekhattan.com\/?p=800"},"modified":"2021-04-27T14:05:50","modified_gmt":"2021-04-27T18:05:50","slug":"best-practices-on-internet-security-for-2019","status":"publish","type":"post","link":"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/","title":{"rendered":"Best practices on Internet security for 2019"},"content":{"rendered":"<p>It&#8217;s 2019, and we should consider the Internet to be out of it&#8217;s infancy stage at this point. Every day, scammers come up with new ways to try and trick people into giving up their passwords or steal their money. No matter what new trick the scammers come up with, there are always things you can do to keep your network, computers, and finances protected. These are things we recommend to our managed clients on a daily basis to keep their network secure:<\/p>\n<ol>\n<li>Always be cautious when receiving an email asking you to open a document or link. Check the sender to make sure the email domain matches. For example, if it is from Bank of America, make sure the email domain is &#8220;bankofamerica.com&#8221;.<\/li>\n<li>Do not be fooled from websites that give you pop ups such as &#8220;Your computer is infected&#8221;. These type of pop-ups are fake, and can be resolved by closing the web browser completely and reopening it. Pop-up blockers can also help get rid of these advertisements on a more permanent basis.<\/li>\n<li>Change your passwords often and do not use the same password for everything. Many people use the same password for everything and this is a recipe for disaster. It is recommended to change your passwords at least once every 30 days. Also, the longer and more random the password, the more secure it is. There are services such as <a href=\"https:\/\/www.dashlane.com\/\">Dashlane<\/a> that store passwords securely so that you do not need to remember all of them.<\/li>\n<li>If you see an email from a recognized sender that seems unusual, give them a call to confirm the email. It does happen often these days that somebody&#8217;s email is compromised and this person may not realize it.<\/li>\n<li>Do not be so quick to enter username and password details from an email message. Verify the website URL is correct before entering credentials. The best way to do this is to check the URL in the top of the browser. In this example, we used Dropbox. Verify the correct spelling of the domain, and the padlock icon before entering any login credentials.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-801\" src=\"http:\/\/tekhattan.com\/wp-content\/uploads\/2019\/03\/dropbox-300x28.png\" alt=\"\" width=\"300\" height=\"28\" \/><\/li>\n<li>If you are a TekHattan managed client, do not hesitate to reach out to us if you need to verify a website or email is legitimate. We can help keep you stay protected against cyber threats.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s 2019, and we should consider the Internet to be out of it&#8217;s infancy stage at this point. Every day, scammers come up with new ways to try and trick people into giving up their passwords or steal their money. No matter what new trick the scammers come up with, there are always things you [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1756,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-800","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-updates"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Best Practices on Internet Security for 2019 - TekHattan Blog<\/title>\n<meta name=\"description\" content=\"Read more on information to help keep your computers and network secure in 2019. TekHattan helps keep you safe on the Internet in 2019 with so many threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Best Practices on Internet Security for 2019 - TekHattan Blog\" \/>\n<meta property=\"og:description\" content=\"Read more on information to help keep your computers and network secure in 2019. TekHattan helps keep you safe on the Internet in 2019 with so many threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/\" \/>\n<meta property=\"og:site_name\" content=\"Tekie\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TekieUSA\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-06T20:18:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-27T18:05:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tekie.com\/blog\/wp-content\/uploads\/2019\/03\/internet-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TekieUSA\" \/>\n<meta name=\"twitter:site\" content=\"@TekieUSA\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/tekie.com\/blog\/#\/schema\/person\/cc0c2322aaa141289c84a111fec3634a\"},\"headline\":\"Best practices on Internet security for 2019\",\"datePublished\":\"2019-03-06T20:18:44+00:00\",\"dateModified\":\"2021-04-27T18:05:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/\"},\"wordCount\":392,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/tekie.com\/blog\/#organization\"},\"articleSection\":[\"Tech Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/\",\"url\":\"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/\",\"name\":\"Best Practices on Internet Security for 2019 - TekHattan Blog\",\"isPartOf\":{\"@id\":\"https:\/\/tekie.com\/blog\/#website\"},\"datePublished\":\"2019-03-06T20:18:44+00:00\",\"dateModified\":\"2021-04-27T18:05:50+00:00\",\"description\":\"Read more on information to help keep your computers and network secure in 2019. TekHattan helps keep you safe on the Internet in 2019 with so many threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tekie.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Best practices on Internet security for 2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tekie.com\/blog\/#website\",\"url\":\"https:\/\/tekie.com\/blog\/\",\"name\":\"Tekie\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/tekie.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tekie.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tekie.com\/blog\/#organization\",\"name\":\"Tekie\",\"url\":\"https:\/\/tekie.com\/blog\/\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/71571613\",\"https:\/\/www.facebook.com\/TekieUSA\/\",\"https:\/\/twitter.com\/TekieUSA\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tekie.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/tekie.com\/blog\/wp-content\/uploads\/2021\/04\/logo_white-1.png\",\"contentUrl\":\"https:\/\/tekie.com\/blog\/wp-content\/uploads\/2021\/04\/logo_white-1.png\",\"width\":248,\"height\":85,\"caption\":\"Tekie\"},\"image\":{\"@id\":\"https:\/\/tekie.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/tekie.com\/blog\/#\/schema\/person\/cc0c2322aaa141289c84a111fec3634a\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tekie.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0ff615bb0efbeffc6041f61a492241ddad4ec051fbfdd7a0fb9b1d7252b90a90?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0ff615bb0efbeffc6041f61a492241ddad4ec051fbfdd7a0fb9b1d7252b90a90?s=96&r=pg\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/tekie\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Best Practices on Internet Security for 2019 - TekHattan Blog","description":"Read more on information to help keep your computers and network secure in 2019. TekHattan helps keep you safe on the Internet in 2019 with so many threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/","og_locale":"en_US","og_type":"article","og_title":"Best Practices on Internet Security for 2019 - TekHattan Blog","og_description":"Read more on information to help keep your computers and network secure in 2019. TekHattan helps keep you safe on the Internet in 2019 with so many threats.","og_url":"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/","og_site_name":"Tekie","article_publisher":"https:\/\/www.facebook.com\/TekieUSA\/","article_published_time":"2019-03-06T20:18:44+00:00","article_modified_time":"2021-04-27T18:05:50+00:00","og_image":[{"width":1080,"height":720,"url":"https:\/\/tekie.com\/blog\/wp-content\/uploads\/2019\/03\/internet-security.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@TekieUSA","twitter_site":"@TekieUSA","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/#article","isPartOf":{"@id":"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/"},"author":{"name":"admin","@id":"https:\/\/tekie.com\/blog\/#\/schema\/person\/cc0c2322aaa141289c84a111fec3634a"},"headline":"Best practices on Internet security for 2019","datePublished":"2019-03-06T20:18:44+00:00","dateModified":"2021-04-27T18:05:50+00:00","mainEntityOfPage":{"@id":"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/"},"wordCount":392,"commentCount":0,"publisher":{"@id":"https:\/\/tekie.com\/blog\/#organization"},"articleSection":["Tech Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/","url":"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/","name":"Best Practices on Internet Security for 2019 - TekHattan Blog","isPartOf":{"@id":"https:\/\/tekie.com\/blog\/#website"},"datePublished":"2019-03-06T20:18:44+00:00","dateModified":"2021-04-27T18:05:50+00:00","description":"Read more on information to help keep your computers and network secure in 2019. TekHattan helps keep you safe on the Internet in 2019 with so many threats.","breadcrumb":{"@id":"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/tekie.com\/blog\/tech-updates\/best-practices-on-internet-security-for-2019\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tekie.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Best practices on Internet security for 2019"}]},{"@type":"WebSite","@id":"https:\/\/tekie.com\/blog\/#website","url":"https:\/\/tekie.com\/blog\/","name":"Tekie","description":"","publisher":{"@id":"https:\/\/tekie.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tekie.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/tekie.com\/blog\/#organization","name":"Tekie","url":"https:\/\/tekie.com\/blog\/","sameAs":["https:\/\/www.linkedin.com\/company\/71571613","https:\/\/www.facebook.com\/TekieUSA\/","https:\/\/twitter.com\/TekieUSA"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tekie.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/tekie.com\/blog\/wp-content\/uploads\/2021\/04\/logo_white-1.png","contentUrl":"https:\/\/tekie.com\/blog\/wp-content\/uploads\/2021\/04\/logo_white-1.png","width":248,"height":85,"caption":"Tekie"},"image":{"@id":"https:\/\/tekie.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/tekie.com\/blog\/#\/schema\/person\/cc0c2322aaa141289c84a111fec3634a","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tekie.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0ff615bb0efbeffc6041f61a492241ddad4ec051fbfdd7a0fb9b1d7252b90a90?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0ff615bb0efbeffc6041f61a492241ddad4ec051fbfdd7a0fb9b1d7252b90a90?s=96&r=pg","caption":"admin"},"sameAs":["https:\/\/tekie\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/tekie.com\/blog\/wp-json\/wp\/v2\/posts\/800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tekie.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tekie.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tekie.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tekie.com\/blog\/wp-json\/wp\/v2\/comments?post=800"}],"version-history":[{"count":5,"href":"https:\/\/tekie.com\/blog\/wp-json\/wp\/v2\/posts\/800\/revisions"}],"predecessor-version":[{"id":1762,"href":"https:\/\/tekie.com\/blog\/wp-json\/wp\/v2\/posts\/800\/revisions\/1762"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tekie.com\/blog\/wp-json\/wp\/v2\/media\/1756"}],"wp:attachment":[{"href":"https:\/\/tekie.com\/blog\/wp-json\/wp\/v2\/media?parent=800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tekie.com\/blog\/wp-json\/wp\/v2\/categories?post=800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tekie.com\/blog\/wp-json\/wp\/v2\/tags?post=800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}