{"id":3400,"date":"2018-09-25T12:20:56","date_gmt":"2018-09-25T09:20:56","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=3400"},"modified":"2023-11-06T21:24:51","modified_gmt":"2023-11-06T18:24:51","slug":"windows-computer-safety-tips","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/windows-computer-safety-tips\/","title":{"rendered":"10 Windows Computer Safety Tips"},"content":{"rendered":"<p>Windows is undoubtedly the most popular family of operating systems for personal computers and laptops worldwide. It is used on home machines and corporate workstations alike, so the question of ensuring Windows user profile security is essential. This article provides some Windows computer safety tips we hope will be useful to you.<\/p>\n<p>In order to understand how to protect Windows and what Internet safety measures are there, we must first understand what Windows security breaches are possible and widespread. Thus said, there are 10 major Windows security issues to keep in mind:<\/p>\n<ol>\n<li><strong>Unpatched and outdated software.<\/strong><\/li>\n<li><strong>Lack of antivirus for Windows 7 or later versions.<\/strong><\/li>\n<li><strong>Disabled Windows firewall.<\/strong><\/li>\n<li><strong>Absent disk encryption and backups<\/strong>.<\/li>\n<li><strong>Lack of minimum Windows security standards<\/strong>.<\/li>\n<li><strong>Full access permissions for everyone.<\/strong><\/li>\n<li><strong>Weak passwords<\/strong>.<\/li>\n<li><strong>Insufficient Windows security policy strength. <\/strong><\/li>\n<li><strong>Legacy software within the corporate network<\/strong>.<\/li>\n<li><strong>Mobile access exploits<\/strong>.<\/li>\n<\/ol>\n<p>Even this short breakdown of the main issues of Windows computer protection allows highlighting the massive problems any business can face if they prefer to leave the matter unattended. Luckily enough, there are multiple solutions for each of the aforementioned issues, and we will list them too.<\/p>\n<h2><strong>1. Update Windows and Software Regularly<\/strong><\/h2>\n<p>Disabling the automatic Microsoft Windows update is the easiest way to ensure the system won\u2019t begin to upgrade while you are playing your favorite online game, yes. However, this is the shortest route for the hackers to get access to your system once they are inside the network. Still thinking that providing that full access to anyone was a great idea?<\/p>\n<p>When you use only licensed and fully updated software, the risk of catching a virus is significantly reduced. Do you recall the <a href=\"https:\/\/www.protectimus.com\/blog\/notpetya-virus\/\">2017 Petya ransomware attacks<\/a> in Europe? It turned out the major part of infestation was done through a security backdoor that was fixed by a Windows update released\u2026 6 months prior to the attacks! If only the users had 10 minutes to download an install it\u2026Instead, they either paid ransom or lost their sensitive data.<\/p>\n<h3><strong>Enable automatic Windows updates<\/strong><\/h3>\n<p>For Windows 7 update just go to your Windows control panel from the <strong>Start <\/strong>menu, there go to<strong> System and Security<\/strong>&gt;<strong>Windows Update<\/strong>&gt;<strong>Change Settings.<\/strong><\/p>\n<p>Then choose the time when you can spare about 15-30 minutes to download the Windows upgrade files, install them and reboot the computer \u2014 and rest assured your Windows system files are up-to-date. The same goes for all the software you use, as new vulnerabilities in multiple software and hardware tools are discovered daily, like these <a href=\"https:\/\/en.wikipedia.org\/wiki\/Meltdown_(security_vulnerability)\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Meltdown and Spectre processor vulnerabilities<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"shadow-img aligncenter wp-image-5013 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/windows-computer-safety-tips-img-4.png\" alt=\"Windows Computer Safety Tips - Enable automatic Windows updates\" width=\"650\" height=\"502\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/windows-computer-safety-tips-img-4.png 650w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/windows-computer-safety-tips-img-4-300x232.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/windows-computer-safety-tips-img-4-610x471.png 610w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<h3><strong>Create a restore point<\/strong><\/h3>\n<p>One of the best ways to secure Windows computers is to create a Windows restore point. Sometimes the new drivers are incompatible with some of your hardware, or update process may go awry, etc. There is a widely-known case when Windows 7 users have to download the<a href=\"https:\/\/steamcommunity.com\/app\/48220\/discussions\/0\/451850468363937607\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\"> outdated Nvidia drivers to play Heroes of Might &amp; Magic VI<\/a>, as any new version of the video drivers results in black screen. However, the consequences might be much more serious than the inability to play one of the best turn-based games of all times.<\/p>\n<p>To create a system restore point on Windows 7 go to the <strong>Start <\/strong>menu, there to <strong>Control Panel<\/strong>&gt;<strong>System<\/strong><strong>and Security<\/strong>&gt;<strong>System <\/strong>and go to <strong>System Protection<\/strong> tab. Press the <strong>Create <\/strong>button and choose the name for the new restore point.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"shadow-img aligncenter wp-image-3413 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/windows-computer-safety-tips-img-3.png\" alt=\"Windows Computer Safety Tips - Create a restore point\" width=\"407\" height=\"449\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/windows-computer-safety-tips-img-3.png 407w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/windows-computer-safety-tips-img-3-272x300.png 272w\" sizes=\"auto, (max-width: 407px) 100vw, 407px\" \/><\/p>\n<p>Obtain a habit of creating Windows restore points from time to time, before installing the new computer software even if it\u2019s computer security software. Make at least one restore point immediately after installing a clean Windows operating system, and rest assured you enabled one of the most efficient tools for security Windows can provide.<\/p>\n<p><span style=\"color: #ff0000;\">| Read also:<\/span>&nbsp;<a href=\"https:\/\/www.protectimus.com\/blog\/ransomware-to-pay-or-not-to-pay\/\">Ransomware \u2013 to Pay or Not to Pay<\/a><\/p>\n<h2><strong>2. Install Windows antivirus<\/strong><\/h2>\n<p>This might seem ridiculous, but many people don\u2019t bother with installing and configuring antivirus software for Windows until it\u2019s too late and their computer is infected with viruses and spyware. How to protect your computer from virus attacks then and what is the best antivirus for Windows 7, 8, and 10?<\/p>\n<p>A good antivirus software should include the features like:<\/p>\n<ul>\n<li>Email checker to block email malware,<\/li>\n<li>Net security screens to identify and drop dangerous Internet connections,<\/li>\n<li>Javascript blockers to prevent malicious code from phishing sites from infecting your Windows PC<\/li>\n<li>Anti spyware module to ensure your Internet security<\/li>\n<li>Archive scanner to prevent executing malicious <em>.exe<\/em> files, etc.<\/li>\n<\/ul>\n<p>These functions are available by default with the majority of antivirus software for Windows. The only difference is the fullness of the virus databases, the frequency of their updates and the range of options available towards the infected files. A really good antivirus must be able to identify the threat and disarm it, without damaging the file in the best-case scenario. However, such functionality is available only with the leaders of the market, which raises an obvious question \u2014 why opt for anything less than the best antivirus for PC?<\/p>\n<p>There are many good examples of antiviruses for Windows, namely <a href=\"https:\/\/www.drweb.com\/?lng=en\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Dr.Web<\/a> and Avast Antivirus. <a href=\"https:\/\/www.reuters.com\/article\/us-usa-cyber-kaspersky\/trump-signs-into-law-u-s-government-ban-on-kaspersky-lab-software-idUSKBN1E62V4\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Kaspersky Lab was banned from use on the territory of USA<\/a> and is increasingly considered more a spyware, than a virus protection software. Thus said, opting for either Dr. Web or <a href=\"https:\/\/www.avast.com\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Avast<\/a>&nbsp;free virus protection ensures a decent degree of security for your PC.<\/p>\n<p>As for Windows 10, one of the main questions about its security sounds like this: <em>\u201cIs Windows Defender enough, or should I install any additional antivirus for Windows 10?<\/em>\u201d<\/p>\n<p>Windows Defender is a default antivirus software for Windows 8 and 10. It provides all the <em>basic<\/em> security options, runs quietly in the background and reminds about itself only when it detects a threat. Being maintained and updated by the Microsoft team, this is a decent all-around capable firewall protection and computer virus protection suit.<\/p>\n<p>Unfortunately, Jack-of-all-trades cannot be an expert in anything. Windows Defender can protect your computer from spyware and various malware floating around, yet it cannot protect a Windows 10 laptop or PC from <a href=\"https:\/\/www.theguardian.com\/technology\/askjack\/2017\/apr\/13\/how-should-i-protect-my-windows-pc-from-malware-and-viruses\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">ransomware, malware and other highly sophisticated threats<\/a> that are on the rise nowadays.<\/p>\n<p>After all, it is strongly presumed that Kaspersky Lab products are spying after their users and provide much more admin access to your computer and data than they should. Thus said, we recommend opting for a paid version of a good antivirus for Windows 10, like Avast, <a href=\"https:\/\/www.eset.com\/int\/home\/antivirus\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">ESET Nod32<\/a> or Dr.Web.<\/p>\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/malvertising\/\">Malvertising: Can It Be Stopped?<\/a><\/p>\n<h2><strong>3. Enable Windows Firewall<\/strong><\/h2>\n<p>Many Windows users have inexplicable hate towards Windows firewall \u2014 yet it is a highly useful feature that can block wireless intrusions, malware infiltrations, and other Windows security threats. Configuring the firewall protection might seem a daunting task, yet it must be only done once and you will enjoy the safety of mind and data security from that point onwards.<\/p>\n<p>Windows 10 Firewall is actually a decent tool that protects your Windows PC against a wide variety of known Internet security threats. If you still prefer to stay away from Windows products \u2014 you can choose between several decent alternatives like <a href=\"https:\/\/www.techradar.com\/news\/the-best-free-firewall\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Comodo Free Firewall<\/a> and others.<\/p>\n<h2><strong>4. Do Windows Backups regularly<\/strong><\/h2>\n<p>Computers are great for storing information, yet they are not ideal. A hard drive might fail tomorrow, a fire can ruin the equipment, etc. In addition, burglars can steal your laptop leaving you devoid of personal data and obtaining the means for identity theft in the process. Do you have \u201cautofill passwords\u201d turned on and your banking accounts in the bookmarks? Well, there goes your money if the criminals obtain your device. Just never do that.<\/p>\n<p>How to secure your personal data then? Regular backups help a ton with that task. There are three possible ways of doing Windows backups:<\/p>\n<ul>\n<li>Copying the content to external HDD\/SSD drives<\/li>\n<li>Syncing the content with cloud backup services<\/li>\n<li>Storing all the important data in the cloud from the get-go<\/li>\n<\/ul>\n<p>Copying your files to an external device is the cheapest and easiest way of doing a data backup, yet these devices must be stored offsite \u2014 in the office, at friend\u2019s house or in the bank\u2019s safe in order for such a backup to be efficient (and the questions of fires, earthquakes, and theft during commuting are still in place). File History tool helps to do this with Windows 8 and 10, while Windows Backup does the job for Windows 7.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"shadow-img aligncenter wp-image-3415 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/windows-computer-safety-tips-img-1.png\" alt=\"Windows Computer Safety Tips - Do Windows Backups regularly\" width=\"650\" height=\"356\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/windows-computer-safety-tips-img-1.png 650w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/windows-computer-safety-tips-img-1-300x164.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/windows-computer-safety-tips-img-1-610x334.png 610w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>Copying your personal data to the cloud using multiple online backup services like <a href=\"https:\/\/www.backblaze.com\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Backblaze<\/a>, <a href=\"https:\/\/mozy.com\/product\/mozy\/personal\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">MozyHome<\/a> or <a href=\"https:\/\/www.carbonite.com\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Carbonite<\/a> ensures your files are always synced to the cloud, so losing an on-site device due to force-majeure or theft is now not so damaging. The only downsides include the fact that these services should be paid for and the backups usually last for no longer than 30 days.<\/p>\n<p>The third way of enabling backups is storing all the essential data in your Google Drive, DropBox, iCloud or other cloud storage services. The downsides of this approach are the limited size of free storage available with such platforms, and the security considerations, as many naked celebrity photo leaks showed us. However, if you are not a movie star and are able to look after your passwords \u2014 your personal data will be absolutely safe with Google Drive or other cloud data storages.<\/p>\n<p>As for data encryption, Windows BitLocker is provided by default with the latest versions of Windows. All you need to do is enable it in the control panel and it will quietly work in the background encrypting all the content of your Windows PC or laptop. As it encrypts the disk as a whole, you can no longer be afraid of losing your device or having it stolen \u2014 the criminals will not be able to get access to the encrypted data. As BitLocker does not require any additional configuration or installation, it is a very easy and reliable tool for ensuring your Windows security.<\/p>\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/google-authenticator-backup\/\">How to Backup Google Authenticator or Transfer It to a New Phone<\/a><\/p>\n<h2><strong>5. Follow strict security standards<\/strong><\/h2>\n<p>This is especially applicable to company workers who are frequently working from home while commuting or from a business trip. Their Windows OS\u2019s need to connect to corporate servers through public WiFi networks or via a 3G\/4G\/5G connection. The company must ensure such users leverage SSL access for their Outlook, a PPTP VPN connection for public networks or a WPA2-PSK protection for their home WiFi connection. Unfortunately, too many businesses care little about such cases \u2014 till the security breaches happen.<\/p>\n<p>In order to prevent such damaging results, every Windows user must follow strict security standards when logging into their accounts over the public networks, from home or using the RDP (Remote Desktop Protocol) to login corporate network.<\/p>\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/vpn-two-factor-authentication\/\">Securing VPN with Two-Factor Authentication<\/a><\/p>\n<h2><strong>6. Avoid enabling full access and separate the accounts<\/strong><\/h2>\n<p>Windows system administrator account has supreme access rights to your system and personal data. Working under this account on your corporate workstation of from home is highly insecure. As a matter of fact, all user accounts must be set to Default security level in Windows User Access Control center, so each action that can involve altering the system settings must be approved by entering the administrator password.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3414 aligncenter shadow-img\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/windows-computer-safety-tips-img-2.png\" alt=\"\" width=\"580\" height=\"372\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/windows-computer-safety-tips-img-2.png 580w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/windows-computer-safety-tips-img-2-300x192.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/windows-computer-safety-tips-img-2-578x372.png 578w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/p>\n<p>The same applies to the access rights for shared files and folders. These should <strong>NEVER <\/strong>be put to full access, as there are many backdoors for malicious actors whenever they get FULL ACCESS to anything inside your corporate network.<\/p>\n<h2><strong>7. Use strong passwords and two-factor authentication<\/strong><\/h2>\n<p>We have mentioned this before, yet this is such an overwhelming problem (which has been around since dinosaurs), that this deserves a separate point of the list. Login\/password combinations like <em>Admin\/admin<\/em>, or <em>123456<\/em>, or <em>qwerty<\/em> are too widespread. There is no excuse for such a situation \u2014 yet the people are lazy\u2026<\/p>\n<p>The only solution known so far is enforcing a strict password strength policy across the corporate network, along with enabling two-factor authentication for Windows login.<\/p>\n<p>Read how to create strong passwords and remember all of them in the article <a href=\"https:\/\/www.protectimus.com\/blog\/how-to-choose-and-use-strong-passwords\/\">How to Choose and Use Strong Passwords<\/a>.<\/p>\n<p><iframe loading=\"lazy\" title=\"Windows two-factor authentication (2FA) setup | Secure Window login and RDP with MFA || Protectimus\" width=\"838\" height=\"471\" src=\"https:\/\/www.youtube.com\/embed\/xCeQ4jRzXo4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>With <a href=\"https:\/\/www.protectimus.com\/winlogon\/index.php\">Protectimus Winlogon<\/a> &#8211; a two-factor authentication tool for Windows Login and Microsoft RDP protection, it\u2019s very easy to set up 2-factor authentication on personal or corporate computers and protect remote access via RDP. It\u2019s free up to 10 user accounts \u2014 more than enough for a small business or a startup with people working remotely.<\/p>\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">The Pros and Cons of Different Two-Factor Authentication Types and Methods<\/a><\/p>\n<h2><strong>8. Enforce strict Windows corporate security policies<\/strong><\/h2>\n<p>Does your corporate workstation require a password-protected login via Ctrl+Alt+Del screen? Does it automatically lock the screen after 30 seconds of inactivity? Does it show the last username? Are you sure there is an audit logging for failed events (like failed login attempts) in place? These basic steps are easily configured through Active Directory Group Policies \u2014 are they enabled on your corporate machine, by the way?<\/p>\n<p>As a matter of fact, <a href=\"https:\/\/www.protectimus.com\/winlogon\/\">Protectimus Winlogon 2FA tool<\/a> can help with enforcing strict Windows corporate security policies too. It works well with corporate networks built on Windows Server 2012-2016 OS\u2019s and easily integrates with Active Directory.<\/p>\n<h2><strong>9. Drop legacy software for good<\/strong><\/h2>\n<p>Legacy Windows OS like NT\/Me\/2000 are the goldmine of backdoor access points for a hacker. Even if these are absolutely crucial for running some legacy billing and accounting system in a bank, they put all the other systems in the network at risk. Truth be told, are these systems absolutely crucial in 2018?<\/p>\n<p>Even if the costs of putting these legacy systems out of commission seems too high, keep in mind that these platforms are quite often the bottlenecks of your workflows. Just make the onsite or offsite backup of all the important data and rebuild the network without them. This will bolster both the network productivity and security levels.<\/p>\n<h2><strong>10. Control the mobile access to your network<\/strong><\/h2>\n<p>When 100% of the employees have mobile devices and can access the corporate network from them \u2014 both via WiFi and over the 3G\/4G connection \u2014 the matter of ensuring the security becomes even more essential. There are certain weaknesses in any mobile devices phones (no matter if it\u2019s iOS, Android or Windows phone) which must be taken into consideration when ensuring your corporate network security.<\/p>\n<p>The best you can do is forbid using personal devices to access the corporate network and provide corporate laptops and smartphones for all the staff. Of course, it\u2019s too expensive and not so many companies can do this.<\/p>\n<p>But at least make sure that all the remote devices are connected to the corporate network via VPN, use <a href=\"https:\/\/www.protectimus.com\/winlogon\/\">two-factor authentication when accessing Windows via RDP<\/a>, and regularly scan your network with packet analyzers like <a href=\"http:\/\/www.tamosoft.com\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">CommView<\/a>,&nbsp;<a href=\"http:\/\/www.qualys.com\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">QualysGuard<\/a>&nbsp;or <a href=\"http:\/\/www.wildpackets.com\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">OmniPeek<\/a>.<\/p>\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/byod-security-rules\/\">10 Basic BYOD Security Rules<\/a><\/p>\n<h2><strong>Final thoughts on 10 basic Windows Internet security tips<\/strong><\/h2>\n<p>To sum it up, there are 10 essential threats to Windows security: outdated system and software, missing antivirus, disabled firewall for Windows, absent backups and disk encryption, weak Windows Internet security policies, working under administrator account and granting full access to shared files for everyone, using weak passwords, not enforcing strict corporate security standards, using legacy software and not controlling the mobile access rights.<\/p>\n<p>However, by exercising caution and common sense, using free and paid security tools and following strict security guidelines every Windows user can ensure the safety and security of their personal and corporate Windows PC or laptop. Should you have any questions on the topic \u2014 please let us know in the comments below!<\/p>\n<h2><strong>Read more<\/strong><\/h2>\n<ul>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/digital-security-risks-fintech\/\">10 Steps to Eliminate Digital Security Risks in Fintech Project<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/how-to-protect-your-privacy-on-facebook\/\">How to Protect Your Privacy on Facebook<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/mitm-prevention-and-detection\/\">Man In The Middle Attack Prevention And Detection<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/7-tips-from-phishing-scams\/\">Top 7 Tips How to Protect Yourself from Phishing Scams<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/reddit-hacked\/\">Reddit was hacked: how it happened, who the victims were, and why SMS authentication failed<\/a><\/li>\n<\/ul>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Windows is undoubtedly the most popular family of operating systems for personal computers and laptops worldwide. It is used on home machines and corporate workstations alike, so the question of ensuring Windows user profile security is essential. This article provides some Windows computer safety tips we hope will be useful to you. In order to [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":4164,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[3,15],"tags":[202,118,230,436],"class_list":["post-3400","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engineering","category-rd","tag-cybersecurity","tag-data-protection","tag-information-security","tag-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3400","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=3400"}],"version-history":[{"count":19,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3400\/revisions"}],"predecessor-version":[{"id":8629,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3400\/revisions\/8629"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4164"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=3400"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=3400"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=3400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}