{"id":25833,"date":"2020-03-30T15:02:27","date_gmt":"2020-03-30T20:02:27","guid":{"rendered":"https:\/\/www.hostgator.com\/blog\/?p=25833"},"modified":"2020-03-30T15:04:04","modified_gmt":"2020-03-30T20:04:04","slug":"cybersecurity-working-from-home","status":"publish","type":"post","link":"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/","title":{"rendered":"4 Ways to Stay Cybersecure When You Start Working from Home"},"content":{"rendered":"\n<p>Are you one of the millions of workers who\u2019ve suddenly gone from days at the office to working at home because of the coronavirus outbreak? Working from home takes some adjustment, especially on short notice. And one of the most important adjustments is thinking differently about cybersecurity at home.&nbsp;<\/p>\n\n\n\n<p>When you work in an office, your company\u2019s IT people focus on keeping hackers out of the system. When you work at home, it\u2019s your responsibility, too.&nbsp;<\/p>\n\n\n\n<p>That\u2019s because hackers are exploiting the rapid shift to remote work by targeting employees with malware and phishing attacks. Often, they\u2019re doing it by impersonating health officials and setting up fake websites that say they provide news about covid-19. Ugh.<\/p>\n\n\n\n<p>It\u2019s a lot to deal with all at once. But taking these four steps can protect your company-and your livelihood-while everyone hunkers down at home.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Got a company-issued laptop or phone? Keep it safe<\/h2>\n\n\n\n<p>If you\u2019re lucky enough to have tech tools provided by your employer, protect them from data thieves. Here are three keys to locking hackers out of your company-issued gear.<\/p>\n\n\n\n<p><strong>Store&nbsp;your company laptop and phone securely when you\u2019re not using them.<\/strong> Thieves will break into cars to steal electronics, and <a href=\"https:\/\/healthitsecurity.com\/news\/michigan-medicine-admits-to-healthcare-data-breach-in-laptop-theft\" target=\"_blank\" rel=\"noopener noreferrer\">sometimes those robberies lead to data breaches<\/a> that cost companies their reputation, customers and fines or settlements.<\/p>\n\n\n\n<p><strong>Use your company tech only for work.<\/strong> Save the social media and personal emails for your own phone and computer. Why? There\u2019s a world of phishing websites, social media scams and email phishing fraud related to the covid-19 pandemic.&nbsp;<\/p>\n\n\n\n<p>If you accidentally click on one of those traps, you could end up with malware on your company device-and in your company\u2019s network. Worst case scenario,&nbsp;ransomware locks up your company\u2019s databases until your employer pays up or shuts down.&nbsp;<\/p>\n\n\n\n<p><strong>Don\u2019t install any new software or apps on work devices without company approval.<\/strong> Every new application comes with vulnerabilities,&nbsp;a responsibility to keep them updated and the risk of installing something corrupted. Stick with what your company wants you to use. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. Connect to work securely<\/h2>\n\n\n\n<p><strong>Ideally, your company will have a <\/strong><a href=\"https:\/\/www.hostgator.com\/blog\/vps-vs-vpn\/\"><strong>virtual private network (VPN)<\/strong><\/a> that you must use to log in to your work email and files. If so, you\u2019ve got a secure, encrypted connection to work, and no one can see the data you\u2019re sending and receiving.&nbsp;<\/p>\n\n\n\n<p><strong>If your company has a VPN but you don\u2019t have to use it to log in, use it anyway.<\/strong> Yes, it will likely slow down your connection, but it will cover any gaps in your home internet security (which we\u2019ll look at in a bit). If you\u2019re using a public Wi-Fi network for work, yikes. You\u2019re putting your company\u2019s data at risk-including things like your email ID and password-unless you use a VPN.&nbsp;<\/p>\n\n\n\n<p><strong>Check your cybersecurity setup at home.<\/strong> Many of us are relaxed about cybersecurity at home because we don\u2019t think cyberthieves go for small targets. However, thanks to the magic of the internet, hackers can search online for vulnerable IP addresses and go after them from anywhere.&nbsp;<\/p>\n\n\n\n<p>Stepping up your home internet security makes your personal information safer. And when you work from home, it protects your company, too. Here\u2019s what to check:<\/p>\n\n\n\n<p><strong>1. Do you have malware protection on your devices? <\/strong><\/p>\n\n\n\n<p>This is important whether you\u2019re using a company-issued computer or your own. Regular scans and firewall protection can keep viruses and other crud off your computer and phone, where they could otherwise find their way into your employer\u2019s system.<\/p>\n\n\n\n<p><strong>2. Do you keep your operating systems, apps and programs up to date?<\/strong> <\/p>\n\n\n\n<p>It\u2019s true-Windows and Android updates can take longer than you\u2019d like when you\u2019re busy with work. But when a <a href=\"https:\/\/www.hostgator.com\/blog\/maintain-secure-website-best-practice-guide\/\">security update<\/a> announces itself, the time to install it is now.&nbsp;<\/p>\n\n\n\n<p>That\u2019s because by the time the company sends that security update out, hackers know about it, too-and they\u2019re busy looking for machines that aren\u2019t updated yet so they can break into them. (Unpatched software is <a href=\"https:\/\/www.cnet.com\/news\/equifaxs-hack-one-year-later-a-look-back-at-how-it-happened-and-whats-changed\/\" target=\"_blank\" rel=\"noopener noreferrer\">how the Equifax hack happened<\/a>.)<\/p>\n\n\n\n<p><strong>3. Is your home Wi-Fi network password strong and unique?<\/strong> <\/p>\n\n\n\n<p>A <a href=\"https:\/\/www.hostgator.com\/blog\/setting-secure-password-remember\/\">strong, unique password<\/a> will keep snoops and opportunists out of your home network-and out of your work at home. Especially if you live in a crowded area where plenty of people nearby can see your network when they search for Wi-Fi, you need a good password.&nbsp;<\/p>\n\n\n\n<p>Strong means your password is at least 8 characters long, with a random mix of letters, numbers and characters.&nbsp;Unique means you only use that password for your home Wi-Fi network, not for any other accounts like email and social media. That\u2019s because if someone guesses your Wi-Fi password, they could then also get into those other accounts.<\/p>\n\n\n\n<p><strong>4. Can anyone with an internet connection log in to your home internet gateway?<\/strong> <\/p>\n\n\n\n<p>You might be surprised. Even if you\u2019ve created a strong home Wi-Fi password, you should still check your internet hardware.&nbsp;<\/p>\n\n\n\n<p>That\u2019s because your router may have arrived with default login credentials of 'admin\/admin.'\u009d Those are weak, but who\u2019s going to get close enough to your router to mess with it? Anybody who cares to look it up. Hackers can search for IP addresses with default router login credentials, log in and take over-all from the comfort of wherever they happen to be.&nbsp;<\/p>\n\n\n\n<p>If that happens, attackers can see everything that happens on your network. That means they can easily steal your work email login information and then go on to hack your employer. Here\u2019s a basic walk-through of <a href=\"https:\/\/www.nbcnews.com\/better\/lifestyle\/how-protect-your-router-home-security-cameras-hackers-ncna1041806\" target=\"_blank\" rel=\"noopener noreferrer\">how to change the password on your router<\/a> and other network hardware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Step up your password security<\/h2>\n\n\n\n<p>Strong and unique passwords aren\u2019t just for your home Wi-Fi network. Ideally, you would use a unique password for every single account you have and use a password manager to keep track of them all. <\/p>\n\n\n\n<p>But at the very least, you need strong, unique passwords for your work email and other work-related accounts, plus your personal email, social media, banking and utility accounts.&nbsp;<\/p>\n\n\n\n<p>When you use a different password for each account, it prevents hackers from using a stolen password of yours like a skeleton key to unlock your other accounts. And that can keep criminals out of your company data as well as your personal information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. Watch out for phishing&nbsp;<\/h2>\n\n\n\n<p>There\u2019s so much malware out there right now related to the coronavirus. Scammers are going after people in their inbox with fake cures and offers of 'new information'\u009d designed to trick victims into giving up their email or Office365 login information.&nbsp;<\/p>\n\n\n\n<p>Other coronavirus scams are dumping ransomware into health care providers\u2019 systems at the worst possible time. And still others are tricking workers into paying fake invoices related in some way to the coronavirus outbreak.<\/p>\n\n\n\n<p>What can you do? Practice good email hygiene.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Check the sender\u2019s email address<\/strong> (not just the sender\u2019s name) before clicking on links or attachments in an email, especially if you didn\u2019t expect to receive it. Scammers often impersonate company owners or executives to trick employees into making funds transfers.<\/li><li><strong>Verify unusual or urgent email requests from others in the company<\/strong> by phone, video or chat before you act. Scammers know that creating a sense of urgency can cause people to rush into actions they wouldn\u2019t otherwise take.&nbsp;<\/li><li><strong>Don\u2019t click on any links, attachments or pop-up boxes<\/strong> if you\u2019re not certain who sent them and why. You could end up with malware or stolen login credentials.<\/li><li><strong>Be careful about visiting unfamiliar websites<\/strong>, especially if you\u2019re looking for covid-19 information. A lot of <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2020\/03\/12\/coronavirus-scam-alert-watch-out-for-these-risky-covid-19-websites-and-emails\/#48250f341099\" target=\"_blank\" rel=\"noopener noreferrer\">malicious websites with 'coronavirus'\u009d in the domain name<\/a> have cropped up in recent weeks, designed to steal visitor information or spread malware.<\/li><li><strong>Report suspected phishing emails to your company\u2019s IT people.<\/strong> You may not be the only employee who\u2019s getting them.<\/li><\/ul>\n\n\n\n<p>So that\u2019s the basics of cybersecurity for the new remote worker: Protect your company-issued devices, connect securely, use strong and unique passwords and watch out for phishing. By following these steps, you can protect your company and everyone who works for it.&nbsp;<\/p>\n\n\n\n<p><strong><em>Run a small business? <\/em><\/strong><a href=\"https:\/\/www.hostgator.com\/blog\/remote-work-cybersecurity-checklist-small-businesses\/\">Read our checklist<\/a> for securing your employees&#8217; remote workspaces.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are you one of the millions of workers who\u2019ve suddenly gone from days at the office to working at home&#8230;<\/p>\n","protected":false},"author":162,"featured_media":25811,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[98],"tags":[139,140],"class_list":["post-25833","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-startup-small-business","tag-startup-small-business","tag-website-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.2 (Yoast SEO v23.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>4 Ways to Stay Cybersecure When You Start Working from Home - HostGator<\/title>\n<meta name=\"description\" content=\"Are you working from home? Stay secure with these cybersecurity best practices for home offices and remote workspaces.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 Ways to Stay Cybersecure When You Start Working from Home\" \/>\n<meta property=\"og:description\" content=\"Are you working from home? Stay secure with these cybersecurity best practices for home offices and remote workspaces.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/\" \/>\n<meta property=\"og:site_name\" content=\"HostGator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HostGator\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-30T20:02:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-30T20:04:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostgator.com\/blog\/wp-content\/\/uploads\/2020\/03\/Cyber-Security-While-Working-From-Home@2x.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1150\" \/>\n\t<meta property=\"og:image:height\" content=\"604\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Casey Kelly-Barton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@HostGator\" \/>\n<meta name=\"twitter:site\" content=\"@HostGator\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Casey Kelly-Barton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/\"},\"author\":{\"name\":\"Casey Kelly-Barton\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a\"},\"headline\":\"4 Ways to Stay Cybersecure When You Start Working from Home\",\"datePublished\":\"2020-03-30T20:02:27+00:00\",\"dateModified\":\"2020-03-30T20:04:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/\"},\"wordCount\":1421,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/03\/Cyber-Security-While-Working-From-Home@2x.jpg\",\"keywords\":[\"Startup &amp; Small Business\",\"Website Security\"],\"articleSection\":[\"Startup &amp; Small Business\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/\",\"url\":\"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/\",\"name\":\"4 Ways to Stay Cybersecure When You Start Working from Home - HostGator\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/03\/Cyber-Security-While-Working-From-Home@2x.jpg\",\"datePublished\":\"2020-03-30T20:02:27+00:00\",\"dateModified\":\"2020-03-30T20:04:04+00:00\",\"description\":\"Are you working from home? Stay secure with these cybersecurity best practices for home offices and remote workspaces.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/#primaryimage\",\"url\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/03\/Cyber-Security-While-Working-From-Home@2x.jpg\",\"contentUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/03\/Cyber-Security-While-Working-From-Home@2x.jpg\",\"width\":1150,\"height\":604,\"caption\":\"cyber security best practices for work from home offices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hostgator.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 Ways to Stay Cybersecure When You Start Working from Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#website\",\"url\":\"https:\/\/www.hostgator.com\/blog\/\",\"name\":\"HostGtaor\",\"description\":\"Web Hosting and Marketing Tips for Entrepreneurs\",\"publisher\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hostgator.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\",\"name\":\"HostGtaor\",\"url\":\"https:\/\/www.hostgator.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png\",\"contentUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png\",\"width\":1092,\"height\":215,\"caption\":\"HostGtaor\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/HostGator\",\"https:\/\/x.com\/HostGator\",\"https:\/\/www.instagram.com\/hostgator\",\"https:\/\/www.linkedin.com\/company\/hostgator-com\",\"https:\/\/www.pinterest.com\/hostgator\/\",\"https:\/\/www.youtube.com\/user\/hostgator\"],\"email\":\"support@gator.com\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a\",\"name\":\"Casey Kelly-Barton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g\",\"caption\":\"Casey Kelly-Barton\"},\"description\":\"Casey Kelly-Barton is an Austin-based freelance B2B content marketing writer. Her specialty areas include SMB marketing and growth, data security, IoT, and fraud prevention\",\"sameAs\":[\"http:\/\/caseykellybarton.com\/\"],\"url\":\"https:\/\/www.hostgator.com\/blog\/author\/caseykb\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"4 Ways to Stay Cybersecure When You Start Working from Home - HostGator","description":"Are you working from home? Stay secure with these cybersecurity best practices for home offices and remote workspaces.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/","og_locale":"en_US","og_type":"article","og_title":"4 Ways to Stay Cybersecure When You Start Working from Home","og_description":"Are you working from home? Stay secure with these cybersecurity best practices for home offices and remote workspaces.","og_url":"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/","og_site_name":"HostGator","article_publisher":"https:\/\/www.facebook.com\/HostGator","article_published_time":"2020-03-30T20:02:27+00:00","article_modified_time":"2020-03-30T20:04:04+00:00","og_image":[{"width":1150,"height":604,"url":"https:\/\/www.hostgator.com\/blog\/wp-content\/\/uploads\/2020\/03\/Cyber-Security-While-Working-From-Home@2x.jpg","type":"image\/jpeg"}],"author":"Casey Kelly-Barton","twitter_card":"summary_large_image","twitter_creator":"@HostGator","twitter_site":"@HostGator","twitter_misc":{"Written by":"Casey Kelly-Barton","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/#article","isPartOf":{"@id":"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/"},"author":{"name":"Casey Kelly-Barton","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a"},"headline":"4 Ways to Stay Cybersecure When You Start Working from Home","datePublished":"2020-03-30T20:02:27+00:00","dateModified":"2020-03-30T20:04:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/"},"wordCount":1421,"commentCount":0,"publisher":{"@id":"https:\/\/www.hostgator.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/03\/Cyber-Security-While-Working-From-Home@2x.jpg","keywords":["Startup &amp; Small Business","Website Security"],"articleSection":["Startup &amp; Small Business"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/","url":"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/","name":"4 Ways to Stay Cybersecure When You Start Working from Home - HostGator","isPartOf":{"@id":"https:\/\/www.hostgator.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/#primaryimage"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/03\/Cyber-Security-While-Working-From-Home@2x.jpg","datePublished":"2020-03-30T20:02:27+00:00","dateModified":"2020-03-30T20:04:04+00:00","description":"Are you working from home? Stay secure with these cybersecurity best practices for home offices and remote workspaces.","breadcrumb":{"@id":"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/#primaryimage","url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/03\/Cyber-Security-While-Working-From-Home@2x.jpg","contentUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2020\/03\/Cyber-Security-While-Working-From-Home@2x.jpg","width":1150,"height":604,"caption":"cyber security best practices for work from home offices"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostgator.com\/blog\/cybersecurity-working-from-home\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostgator.com\/blog\/"},{"@type":"ListItem","position":2,"name":"4 Ways to Stay Cybersecure When You Start Working from Home"}]},{"@type":"WebSite","@id":"https:\/\/www.hostgator.com\/blog\/#website","url":"https:\/\/www.hostgator.com\/blog\/","name":"HostGtaor","description":"Web Hosting and Marketing Tips for Entrepreneurs","publisher":{"@id":"https:\/\/www.hostgator.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostgator.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hostgator.com\/blog\/#organization","name":"HostGtaor","url":"https:\/\/www.hostgator.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png","contentUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png","width":1092,"height":215,"caption":"HostGtaor"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/HostGator","https:\/\/x.com\/HostGator","https:\/\/www.instagram.com\/hostgator","https:\/\/www.linkedin.com\/company\/hostgator-com","https:\/\/www.pinterest.com\/hostgator\/","https:\/\/www.youtube.com\/user\/hostgator"],"email":"support@gator.com"},{"@type":"Person","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a","name":"Casey Kelly-Barton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g","caption":"Casey Kelly-Barton"},"description":"Casey Kelly-Barton is an Austin-based freelance B2B content marketing writer. Her specialty areas include SMB marketing and growth, data security, IoT, and fraud prevention","sameAs":["http:\/\/caseykellybarton.com\/"],"url":"https:\/\/www.hostgator.com\/blog\/author\/caseykb\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/25833"}],"collection":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/users\/162"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/comments?post=25833"}],"version-history":[{"count":2,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/25833\/revisions"}],"predecessor-version":[{"id":25836,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/25833\/revisions\/25836"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/media\/25811"}],"wp:attachment":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/media?parent=25833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/categories?post=25833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/tags?post=25833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}