{"id":176,"date":"2020-08-13T04:53:53","date_gmt":"2020-08-13T04:53:53","guid":{"rendered":"http:\/\/noriskdomain.net\/blog\/?p=176"},"modified":"2020-10-08T15:58:35","modified_gmt":"2020-10-08T15:58:35","slug":"avoiding-the-risk-of-the-internet","status":"publish","type":"post","link":"https:\/\/noriskdomain.net\/blog\/avoiding-the-risk-of-the-internet\/","title":{"rendered":"Avoiding the risk of the internet"},"content":{"rendered":"\n<p>There is an infinite number of websites that you can access through the internet. Google security experts offer these security tips to avoid the risks that can be out there when surfing the net.&nbsp;<\/p>\n\n\n\n<ul><li>Pay attention to the alerts that are displayed while surfing, for example, of a site that may have a phishing or malware program.\u00a0<\/li><\/ul>\n\n\n\n<ul><li>Check the URL of the website you are entering to ensure that&#8217;s the page you want to access. The URL must not contain any spelling mistakes or special added characters that this could indicate that the page is not authentic.\u00a0<\/li><\/ul>\n\n\n\n<ul><li>Check that the https legend is present. The s means secure and indicates that the connection is encrypted and is safe to send a password, bank, or credit card details.\u00a0<\/li><\/ul>\n\n\n\n<p>In social networks and email&nbsp;<\/p>\n\n\n\n<p>If you are a frequent user of social media, and you are used to publishing or including personal data in the databases of these platforms, we recommend the following.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/image-20.png\" alt=\"C\u00f3mo evaluar la velocidad del internet en casa durante la cuarentena\" class=\"wp-image-177\" width=\"596\" height=\"286\" srcset=\"https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/image-20.png 360w, https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/image-20-300x144.png 300w\" sizes=\"(max-width: 596px) 100vw, 596px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Social Accounts and more<\/strong>\u00a0<\/h3>\n\n\n\n<ul><li>Define a complex password, containing at least six or eight characters combined with numbers, letters that also are in capital letters, and symbols.\u00a0<\/li><\/ul>\n\n\n\n<ul><li>Activate login alerts, also known as two-step authentication. This option is available for social media and email. This service offers an extra layer of security, which consists of authenticating the identity of users using a second device, usually the cell phone. The platform sends a random code to your second device that you must enter to access it. This function is useful when logging into third-party computers, tablets, or cell phones.\u00a0<\/li><\/ul>\n\n\n\n<ul><li>Create trusted contacts that option is useful on Facebook in case your account was hacked by someone or you present problems logging in. Just add three or five contacts, close friends or family\u00a0that you can locate. In the case of the email, you can add one or\u00a0two additional recovery email in the settings section. If you lose your password or your account is hacked by anyone, you can log in again with this resource.\u00a0<\/li><\/ul>\n\n\n\n<ul><li>Control Phishing. Hackers who want to access your personal and bank details usually send messages to your email account in which they perfectly imitate the platform of your bank or social network. There are two tips you can use to prevent this: the first is to install an antivirus extension in your browser that will identify fraudulent websites, better known as Phishing, and will immediately warn you that you are about to enter one, as well as telling you when you are entering disreputable websites. Another common mistake made is entering the wrong address for a website. The extension will automatically correct it and direct you to the trusted website.\u00a0<\/li><\/ul>\n\n\n\n<ul><li>Spam email can filter out phishing sites and even viruses, so when identifying the pages and domains that send you spam, it is advisable to create a filter that removes these types of unwanted messages.\u00a0<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/image-22.png\" alt=\"Tus redes sociales est\u00e1n bien protegidas?, te daremos algunos tips\" class=\"wp-image-179\" width=\"554\" height=\"307\" srcset=\"https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/image-22.png 364w, https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/image-22-300x166.png 300w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conclusion<\/strong>\u00a0<\/h3>\n\n\n\n<p>All the information that travels through the network runs the risk of being intercepted by a third party if it does not have the necessary precautionary measures. Similarly, there are also attacks for this purpose. The information requested usually points to personal data. A false step in this type of incident can expose a person to the loss of money or identity theft.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/image-21.png\" alt=\"La Internet Universal se retrasa por las desigualdades en el planeta -  MuyComputer\" class=\"wp-image-178\" width=\"540\" height=\"337\" srcset=\"https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/image-21.png 324w, https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/image-21-300x187.png 300w\" sizes=\"(max-width: 540px) 100vw, 540px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>There is an infinite number of websites that you can access through the internet. Google security experts offer these security<\/p>\n","protected":false},"author":2,"featured_media":180,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Avoiding the risk of the internet -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/noriskdomain.net\/blog\/avoiding-the-risk-of-the-internet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Avoiding the risk of the internet -\" \/>\n<meta property=\"og:description\" content=\"There is an infinite number of websites that you can access through the internet. Google security experts offer these security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/noriskdomain.net\/blog\/avoiding-the-risk-of-the-internet\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-13T04:53:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-08T15:58:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/malware-img-60.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"710\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anonymous\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anonymous\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/noriskdomain.net\/blog\/avoiding-the-risk-of-the-internet\/\",\"url\":\"https:\/\/noriskdomain.net\/blog\/avoiding-the-risk-of-the-internet\/\",\"name\":\"Avoiding the risk of the internet -\",\"isPartOf\":{\"@id\":\"https:\/\/noriskdomain.net\/blog\/#website\"},\"datePublished\":\"2020-08-13T04:53:53+00:00\",\"dateModified\":\"2020-10-08T15:58:35+00:00\",\"author\":{\"@id\":\"https:\/\/noriskdomain.net\/blog\/#\/schema\/person\/34bb9c735a14700672147fcc941d8b31\"},\"breadcrumb\":{\"@id\":\"https:\/\/noriskdomain.net\/blog\/avoiding-the-risk-of-the-internet\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/noriskdomain.net\/blog\/avoiding-the-risk-of-the-internet\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/noriskdomain.net\/blog\/avoiding-the-risk-of-the-internet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/noriskdomain.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Avoiding the risk of the internet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/noriskdomain.net\/blog\/#website\",\"url\":\"https:\/\/noriskdomain.net\/blog\/\",\"name\":\"\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/noriskdomain.net\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/noriskdomain.net\/blog\/#\/schema\/person\/34bb9c735a14700672147fcc941d8b31\",\"name\":\"Anonymous\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/noriskdomain.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/484383e83973b56f08179b2dbc70f98b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/484383e83973b56f08179b2dbc70f98b?s=96&d=mm&r=g\",\"caption\":\"Anonymous\"},\"url\":\"https:\/\/noriskdomain.net\/blog\/author\/anonymous\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Avoiding the risk of the internet -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/noriskdomain.net\/blog\/avoiding-the-risk-of-the-internet\/","og_locale":"en_US","og_type":"article","og_title":"Avoiding the risk of the internet -","og_description":"There is an infinite number of websites that you can access through the internet. Google security experts offer these security","og_url":"https:\/\/noriskdomain.net\/blog\/avoiding-the-risk-of-the-internet\/","article_published_time":"2020-08-13T04:53:53+00:00","article_modified_time":"2020-10-08T15:58:35+00:00","og_image":[{"width":710,"height":400,"url":"https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/malware-img-60.jpg","type":"image\/jpeg"}],"author":"Anonymous","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Anonymous","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/noriskdomain.net\/blog\/avoiding-the-risk-of-the-internet\/","url":"https:\/\/noriskdomain.net\/blog\/avoiding-the-risk-of-the-internet\/","name":"Avoiding the risk of the internet -","isPartOf":{"@id":"https:\/\/noriskdomain.net\/blog\/#website"},"datePublished":"2020-08-13T04:53:53+00:00","dateModified":"2020-10-08T15:58:35+00:00","author":{"@id":"https:\/\/noriskdomain.net\/blog\/#\/schema\/person\/34bb9c735a14700672147fcc941d8b31"},"breadcrumb":{"@id":"https:\/\/noriskdomain.net\/blog\/avoiding-the-risk-of-the-internet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/noriskdomain.net\/blog\/avoiding-the-risk-of-the-internet\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/noriskdomain.net\/blog\/avoiding-the-risk-of-the-internet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/noriskdomain.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Avoiding the risk of the internet"}]},{"@type":"WebSite","@id":"https:\/\/noriskdomain.net\/blog\/#website","url":"https:\/\/noriskdomain.net\/blog\/","name":"","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/noriskdomain.net\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/noriskdomain.net\/blog\/#\/schema\/person\/34bb9c735a14700672147fcc941d8b31","name":"Anonymous","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/noriskdomain.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/484383e83973b56f08179b2dbc70f98b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/484383e83973b56f08179b2dbc70f98b?s=96&d=mm&r=g","caption":"Anonymous"},"url":"https:\/\/noriskdomain.net\/blog\/author\/anonymous\/"}]}},"_links":{"self":[{"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/posts\/176"}],"collection":[{"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/comments?post=176"}],"version-history":[{"count":1,"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/posts\/176\/revisions"}],"predecessor-version":[{"id":181,"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/posts\/176\/revisions\/181"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/media\/180"}],"wp:attachment":[{"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/media?parent=176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/categories?post=176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/tags?post=176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}