{"id":1850,"date":"2019-01-01T09:34:40","date_gmt":"2019-01-01T09:34:40","guid":{"rendered":"http:\/\/www.kruptos2.co.uk\/blog\/?p=1850"},"modified":"2019-05-25T18:31:34","modified_gmt":"2019-05-25T18:31:34","slug":"top-5-cyber-security-tips-you-should-follow-in-2019","status":"publish","type":"post","link":"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/","title":{"rendered":"Top 5 Cyber Security Tips You Should Follow in 2019"},"content":{"rendered":"<p class=\"p2\">The new year is here, and now is the perfect time to wipe the slate clean and start 2019 off on the right foot. While many people\u2019s New Year\u2019s resolutions will be centered around eating healthier and exercising more, here at <a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2.html\">Kruptos 2 Software<\/a> we\u2019re more concerned about your digital wellbeing so we come up with top 5 cyber security tips you should follow in 2019.<\/p>\n<p class=\"p2\">In a world where\u00a0online\u00a0crime is\u00a0becoming more and more advanced, cyber security tips are\u00a0invaluable to both individuals and businesses.\u00a0However,\u00a0despite the threat of cyber-crime, many\u00a0people are failing to take the necessary steps to protect themselves.<\/p>\n<p class=\"p2\">But all is not lost! Regardless of what 2019 brings,\u00a0<span class=\"s1\">good basic cyber hygiene<\/span>is still the best defense for protecting yourself against modern digital threats. In this post, we look at top 5 cyber security tips that you can follow in 2019.<\/p>\n<h2 class=\"p2\"><b>1) Backups\u00a0<\/b><\/h2>\n<p class=\"p2\">A good backup strategy offers the ultimate peace of mind. In the event of data loss \u2013 due to, say,\u00a0<span class=\"s1\">ransomware<\/span>\u00a0or hardware failure \u2013 you can simply restore your system to its original safe state.<\/p>\n<p class=\"p2\">The 3-2-1 backup strategy is a great starting point for most home users and SMBs. It involves:<\/p>\n<ul class=\"ul1\">\n<li class=\"li2\">Keeping 3 copies of your data.<\/li>\n<li class=\"li2\">Storing 2 of these copies locally on different devices (e.g. external hard drives)<\/li>\n<li class=\"li2\">Storing 1 copy offsite (e.g. using a cloud-based backup service). Maintaining an offsite copy is critical for ensuring your backup is safe even in the event of theft or a natural disaster.<\/li>\n<\/ul>\n<p class=\"p2\">Implementing\u00a0<span class=\"s1\">a good backup strategy<\/span>\u00a0does require a bit of planning (and probably a small amount of money) but the investment is absolutely worth it. Sleep easy in 2019 knowing that your files will be safe from harm even if your system falls.<\/p>\n<h2 class=\"p2\"><b>2) Enable 2FA wherever possible<\/b><\/h2>\n<p class=\"p2\">Two-factor authentication (or 2FA for short) adds an extra layer of security that is used to ensure that people trying to log in to a website or service are really who they say they are.<\/p>\n<p class=\"p2\">Enabling 2FA means that, in addition to entering your username and password when accessing an account, you\u2019ll also need to provide another piece of information that proves your identity. For example, many banks will issue tokens that generate a one-time use password or send you a verification code to your mobile phone.<\/p>\n<p class=\"p2\">Most banks, email providers, online stores and other major service providers will offer an option for 2FA, so be sure to enable it wherever possible. It only takes a few extra seconds to log in using 2FA, but it can single-handedly thwart cybercriminals from getting access to your personal accounts (although it should be noted that 2FA is not a perfect solution).<\/p>\n<h2 class=\"p2\"><b>3) Start using a password manager<\/b><\/h2>\n<p class=\"p2\">The average Internet user is expected to have more than 200 online accounts by 2020. Manually keeping track of so many login credentials is next to impossible, which explains why passwords such as \u201c123456\u201d, \u201cpassword\u201d and \u201cqwerty\u201d remain \u2013 much to the delight of cybercriminals \u2013 so popular. Using brute force or social engineering tactics, hackers can easily break into accounts guarded by weak passwords and steal whatever information lies beyond.<\/p>\n<p class=\"p2\">\u00a0The good news is you don\u2019t have to choose between convenience and a strong password. Password managers enable you to create and store highly secure passwords on the fly, and easily enter them when prompted. There are a few great password managers on the market, including\u00a0<a href=\"https:\/\/www.roboform.com\/\"><span class=\"s1\">RoboForm<\/span><\/a>, which provides excellent encryption, multi-platform support and an excellent customisable password generator.<\/p>\n<h2 class=\"p2\"><b>4) <a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2go.html\">Encrypt your flash drives and external HDDs\u00a0<\/a><\/b><\/h2>\n<p class=\"p2\">It\u2019s all too easy to lose a flash drive or external hard drive, particularly if you\u2019re a student or regularly travel for work. In the unfortunate event that your external drive is lost or stolen, you need to be certain that the data it contains cannot be accessed by whoever\u2019s hands it falls into.<\/p>\n<p class=\"p2\">External drive encryption comes in two main flavors:<\/p>\n<ul class=\"ul1\">\n<li class=\"li2\"><b> Hardware<\/b>: A number of manufacturers make secure flash drives that come equipped with a physical pin pad or fingerprint scanner, which prevent access to the contents of the drive without the correct input. As you might imagine, these secure drives are significantly more expensive than regular external drives.<\/li>\n<li class=\"li2\"><b> Software:\u00a0<\/b>You can also use software to encrypt your external drives, making your files inaccessible to anyone without the password. Pro, Enterprise, and Education editions of Windows 10 come with built-in drive encryption software called\u00a0<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/information-protection\/bitlocker\/bitlocker-overview\"><span class=\"s1\">BitLocker<\/span><\/a>. Alternatively, you may wish to use <a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2go.html\">Kruptos 2 Go<\/a>, a cross-platform encryption tool.<\/li>\n<\/ul>\n<h2 class=\"p2\"><b>5) Install an ad blocker\u00a0<\/b><\/h2>\n<p class=\"p2\">Almost 1 in 3 people (31 percent) in the United States use an ad blocker, according to a report from\u00a0<a href=\"https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/global\/Images\/infographics\/technologymediatelecommunications\/gx-deloitte-tmt-2018-adblocking-media-report.pdf\"><span class=\"s1\">Deloitte<\/span><\/a>\u00a0\u2013 and it\u2019s easy to see why. By filtering out HTML elements that contain advertising, ad blockers can protect you against PUPs and malvertising, stop cookies that track your browsing and speed up your web browsing.<\/p>\n<p class=\"p2\">There are a few different options available for each web browser, but one good option is\u00a0<a href=\"https:\/\/github.com\/gorhill\/uBlock\"><span class=\"s1\">uBlock Origin<\/span><\/a>; a free, open-source ad blocker that <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/top-10-best-free-internet-security-suits-for-2019\/\">works with most major browsers.<\/a><\/p>\n<p class=\"p2\">We don\u2019t know what the rest of the year has in store for you, but one thing is certain: malware isn\u2019t going away any time soon. By practicing the top 5 cyber security tips discussed in this article you\u2019ll be in a great position to make 2019 your most cyber-secure year ever.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new year is here, and now is the perfect time to wipe the slate clean and start 2019 off on the right foot. While many people\u2019s New Year\u2019s resolutions will be centered around eating healthier and exercising more, here at Kruptos 2 Software we\u2019re more concerned about your digital wellbeing so we come up &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"ast-button\" href=\"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/\"> <span class=\"screen-reader-text\">Top 5 Cyber Security Tips You Should Follow in 2019<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":2,"featured_media":1852,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8,7,37],"tags":[],"class_list":["post-1850","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-how-to","category-online-safety"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top 5 Cyber Security Tips You Should Follow in 2019 - Kruptos Security Blog<\/title>\n<meta name=\"description\" content=\"Here are top 5 cyber security tips you should follow in 2019 to ensure your privacy, protect your data, and secure intellectual property.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 5 Cyber Security Tips You Should Follow in 2019 - Kruptos Security Blog\" \/>\n<meta property=\"og:description\" content=\"Here are top 5 cyber security tips you should follow in 2019 to ensure your privacy, protect your data, and secure intellectual property.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/\" \/>\n<meta property=\"og:site_name\" content=\"Kruptos Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-01T09:34:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-25T18:31:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/01\/cybersecurity-2019.png\" \/>\n\t<meta property=\"og:image:width\" content=\"870\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Candy Ross\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Candy Ross\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/\"},\"author\":{\"name\":\"Candy Ross\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb\"},\"headline\":\"Top 5 Cyber Security Tips You Should Follow in 2019\",\"datePublished\":\"2019-01-01T09:34:40+00:00\",\"dateModified\":\"2019-05-25T18:31:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/\"},\"wordCount\":889,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/01\/cybersecurity-2019.png\",\"articleSection\":[\"Data Protection\",\"How To\",\"Online Safety\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/\",\"name\":\"Top 5 Cyber Security Tips You Should Follow in 2019 - Kruptos Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/01\/cybersecurity-2019.png\",\"datePublished\":\"2019-01-01T09:34:40+00:00\",\"dateModified\":\"2019-05-25T18:31:34+00:00\",\"description\":\"Here are top 5 cyber security tips you should follow in 2019 to ensure your privacy, protect your data, and secure intellectual property.\",\"breadcrumb\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/#primaryimage\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/01\/cybersecurity-2019.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/01\/cybersecurity-2019.png\",\"width\":870,\"height\":550,\"caption\":\"top 5 cybersecurity tips\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kruptos2.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 5 Cyber Security Tips You Should Follow in 2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"name\":\"Kruptos Security Blog\",\"description\":\"The Kruptos Security Blog\",\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\",\"name\":\"Kruptos Security Blog\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"width\":200,\"height\":58,\"caption\":\"Kruptos Security Blog\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb\",\"name\":\"Candy Ross\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g\",\"caption\":\"Candy Ross\"},\"description\":\"As a Cyber Security Enthusiast at Kruptos 2 Software, Candy is passionate about data protection and online privacy. She help users to understand how cyber security works by providing useful guides and tips.\",\"sameAs\":[\"http:\/\/www.kruptos2.com\"],\"url\":\"https:\/\/kruptos2.co.uk\/blog\/author\/candy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 5 Cyber Security Tips You Should Follow in 2019 - Kruptos Security Blog","description":"Here are top 5 cyber security tips you should follow in 2019 to ensure your privacy, protect your data, and secure intellectual property.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/","og_locale":"en_US","og_type":"article","og_title":"Top 5 Cyber Security Tips You Should Follow in 2019 - Kruptos Security Blog","og_description":"Here are top 5 cyber security tips you should follow in 2019 to ensure your privacy, protect your data, and secure intellectual property.","og_url":"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/","og_site_name":"Kruptos Security Blog","article_published_time":"2019-01-01T09:34:40+00:00","article_modified_time":"2019-05-25T18:31:34+00:00","og_image":[{"width":870,"height":550,"url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/01\/cybersecurity-2019.png","type":"image\/png"}],"author":"Candy Ross","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Candy Ross","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/#article","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/"},"author":{"name":"Candy Ross","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb"},"headline":"Top 5 Cyber Security Tips You Should Follow in 2019","datePublished":"2019-01-01T09:34:40+00:00","dateModified":"2019-05-25T18:31:34+00:00","mainEntityOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/"},"wordCount":889,"commentCount":0,"publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/01\/cybersecurity-2019.png","articleSection":["Data Protection","How To","Online Safety"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/","url":"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/","name":"Top 5 Cyber Security Tips You Should Follow in 2019 - Kruptos Security Blog","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/#primaryimage"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/01\/cybersecurity-2019.png","datePublished":"2019-01-01T09:34:40+00:00","dateModified":"2019-05-25T18:31:34+00:00","description":"Here are top 5 cyber security tips you should follow in 2019 to ensure your privacy, protect your data, and secure intellectual property.","breadcrumb":{"@id":"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/#primaryimage","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/01\/cybersecurity-2019.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/01\/cybersecurity-2019.png","width":870,"height":550,"caption":"top 5 cybersecurity tips"},{"@type":"BreadcrumbList","@id":"https:\/\/kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kruptos2.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"Top 5 Cyber Security Tips You Should Follow in 2019"}]},{"@type":"WebSite","@id":"https:\/\/kruptos2.co.uk\/blog\/#website","url":"https:\/\/kruptos2.co.uk\/blog\/","name":"Kruptos Security Blog","description":"The Kruptos Security Blog","publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/kruptos2.co.uk\/blog\/#organization","name":"Kruptos Security Blog","url":"https:\/\/kruptos2.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","width":200,"height":58,"caption":"Kruptos Security Blog"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb","name":"Candy Ross","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g","caption":"Candy Ross"},"description":"As a Cyber Security Enthusiast at Kruptos 2 Software, Candy is passionate about data protection and online privacy. She help users to understand how cyber security works by providing useful guides and tips.","sameAs":["http:\/\/www.kruptos2.com"],"url":"https:\/\/kruptos2.co.uk\/blog\/author\/candy\/"}]}},"_links":{"self":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1850"}],"version-history":[{"count":5,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1850\/revisions"}],"predecessor-version":[{"id":1931,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1850\/revisions\/1931"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media\/1852"}],"wp:attachment":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}