{"id":28,"date":"2017-04-04T22:55:41","date_gmt":"2017-04-04T22:55:41","guid":{"rendered":"http:\/\/www.namorgy.com\/blog\/?p=28"},"modified":"2019-03-16T04:25:06","modified_gmt":"2019-03-16T04:25:06","slug":"3-myths-about-cyber-security","status":"publish","type":"post","link":"http:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/","title":{"rendered":"3 Myths about Cyber Security"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/www.ispeakgeek.biz\/Image%20myths.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p>1. My ISP Router Has A Firewall That Will Protect Me From Everything<br>Many people believe that the modem or router installed by your internet service provider is sufficient security to protect your network.&nbsp;<\/p>\n\n\n\n<p>The truth is that your ISPs equipment does not allow for granular administration and control, and is often out of the control of the customer. A proper SOHO or business class firewall on the inside of the modem or router is highly recommended.&nbsp;<\/p>\n\n\n\n<p>In fact, while a proper firewall is certainly necessary and will go a long way towards protecting your network from direct hacking, worms and probes, there are many other attack methods that will bypass it. Educating your employees and protecting your network on the inside is just as important.&nbsp;<\/p>\n\n\n\n<p>2. My Free Antivirus Software Is Always Scanning &amp; Protecting My PC&gt;<br>Many people believe that the free antivirus program that they downloaded acts like a private detective, constantly digging through their computers files looking for viruses to keep them safe.&nbsp;<\/p>\n\n\n\n<p>The truth is that typically only \u201cpro versions\u201d of such software do this. Free versions typically only scan files in active transfer \u2013 that is those being viewed in browser, downloaded or moved. Free anti-virus products tend to be reactive, not proactive, while only their professional version counterparts are capable for scheduled deep scanning. Some premium suites, also have more features, such as identity theft protection, firewalls, parental controls, and system performance tools. Another tradeoff is that free antivirus products often have some sort of advertisement for the company&#8217;s paid product.&nbsp;<\/p>\n\n\n\n<p>3. My Backups Are Safe From Viruses<br>Many people believe that their backups are separate from their network, or that they are a protection from viruses.&nbsp;<\/p>\n\n\n\n<p>The truth is that backups only copy what is already on your computer system. If the system is infected, the backup will be too. And restoring from that backup job will re-infect your computer. Furthermore, some backup solutions use external hard drives which, if mounted with a drive letter, are susceptible to the virus \u2013 meaning all your previous backups are vulnerable too. Best practices dictates that backups should be take regularly, retained for a sufficient period, and replicated offsite over the internet.&nbsp;\n\n<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. My ISP Router Has A Firewall That Will Protect Me From EverythingMany people believe that the modem or router installed by your internet service provider is sufficient security to &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-28","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 Myths about Cyber Security -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Myths about Cyber Security -\" \/>\n<meta property=\"og:description\" content=\"1. My ISP Router Has A Firewall That Will Protect Me From EverythingMany people believe that the modem or router installed by your internet service provider is sufficient security to &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-04T22:55:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-16T04:25:06+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.ispeakgeek.biz\/Image%20myths.jpg\" \/>\n<meta name=\"author\" content=\"Namorgy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Namorgy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2017\\\/04\\\/04\\\/3-myths-about-cyber-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2017\\\/04\\\/04\\\/3-myths-about-cyber-security\\\/\"},\"author\":{\"name\":\"Namorgy\",\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/#\\\/schema\\\/person\\\/7037cc04551c43ba5e74edd08fda91c2\"},\"headline\":\"3 Myths about Cyber Security\",\"datePublished\":\"2017-04-04T22:55:41+00:00\",\"dateModified\":\"2019-03-16T04:25:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2017\\\/04\\\/04\\\/3-myths-about-cyber-security\\\/\"},\"wordCount\":373,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2017\\\/04\\\/04\\\/3-myths-about-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.ispeakgeek.biz\\\/Image%20myths.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2017\\\/04\\\/04\\\/3-myths-about-cyber-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2017\\\/04\\\/04\\\/3-myths-about-cyber-security\\\/\",\"url\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2017\\\/04\\\/04\\\/3-myths-about-cyber-security\\\/\",\"name\":\"3 Myths about Cyber Security -\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2017\\\/04\\\/04\\\/3-myths-about-cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2017\\\/04\\\/04\\\/3-myths-about-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.ispeakgeek.biz\\\/Image%20myths.jpg\",\"datePublished\":\"2017-04-04T22:55:41+00:00\",\"dateModified\":\"2019-03-16T04:25:06+00:00\",\"author\":{\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/#\\\/schema\\\/person\\\/7037cc04551c43ba5e74edd08fda91c2\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2017\\\/04\\\/04\\\/3-myths-about-cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2017\\\/04\\\/04\\\/3-myths-about-cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2017\\\/04\\\/04\\\/3-myths-about-cyber-security\\\/#primaryimage\",\"url\":\"http:\\\/\\\/www.ispeakgeek.biz\\\/Image%20myths.jpg\",\"contentUrl\":\"http:\\\/\\\/www.ispeakgeek.biz\\\/Image%20myths.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2017\\\/04\\\/04\\\/3-myths-about-cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 Myths about Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/#website\",\"url\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/\",\"name\":\"Namorgy.com\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/#\\\/schema\\\/person\\\/7037cc04551c43ba5e74edd08fda91c2\",\"name\":\"Namorgy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g\",\"caption\":\"Namorgy\"},\"sameAs\":[\"http:\\\/\\\/www.namorgy.com\"],\"url\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/author\\\/namorgy_12uffn\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Myths about Cyber Security -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"3 Myths about Cyber Security -","og_description":"1. My ISP Router Has A Firewall That Will Protect Me From EverythingMany people believe that the modem or router installed by your internet service provider is sufficient security to &hellip;","og_url":"https:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/","article_published_time":"2017-04-04T22:55:41+00:00","article_modified_time":"2019-03-16T04:25:06+00:00","og_image":[{"url":"http:\/\/www.ispeakgeek.biz\/Image%20myths.jpg","type":"","width":"","height":""}],"author":"Namorgy","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Namorgy","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/#article","isPartOf":{"@id":"https:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/"},"author":{"name":"Namorgy","@id":"http:\/\/www.namorgy.com\/blog\/#\/schema\/person\/7037cc04551c43ba5e74edd08fda91c2"},"headline":"3 Myths about Cyber Security","datePublished":"2017-04-04T22:55:41+00:00","dateModified":"2019-03-16T04:25:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/"},"wordCount":373,"commentCount":0,"image":{"@id":"https:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/#primaryimage"},"thumbnailUrl":"http:\/\/www.ispeakgeek.biz\/Image%20myths.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/","url":"https:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/","name":"3 Myths about Cyber Security -","isPartOf":{"@id":"http:\/\/www.namorgy.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/#primaryimage"},"thumbnailUrl":"http:\/\/www.ispeakgeek.biz\/Image%20myths.jpg","datePublished":"2017-04-04T22:55:41+00:00","dateModified":"2019-03-16T04:25:06+00:00","author":{"@id":"http:\/\/www.namorgy.com\/blog\/#\/schema\/person\/7037cc04551c43ba5e74edd08fda91c2"},"breadcrumb":{"@id":"https:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/#primaryimage","url":"http:\/\/www.ispeakgeek.biz\/Image%20myths.jpg","contentUrl":"http:\/\/www.ispeakgeek.biz\/Image%20myths.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.namorgy.com\/blog\/2017\/04\/04\/3-myths-about-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/www.namorgy.com\/blog\/"},{"@type":"ListItem","position":2,"name":"3 Myths about Cyber Security"}]},{"@type":"WebSite","@id":"http:\/\/www.namorgy.com\/blog\/#website","url":"http:\/\/www.namorgy.com\/blog\/","name":"Namorgy.com","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/www.namorgy.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"http:\/\/www.namorgy.com\/blog\/#\/schema\/person\/7037cc04551c43ba5e74edd08fda91c2","name":"Namorgy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g","caption":"Namorgy"},"sameAs":["http:\/\/www.namorgy.com"],"url":"http:\/\/www.namorgy.com\/blog\/author\/namorgy_12uffn\/"}]}},"_links":{"self":[{"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/posts\/28","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":1,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/posts\/28\/revisions"}],"predecessor-version":[{"id":29,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/posts\/28\/revisions\/29"}],"wp:attachment":[{"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/media?parent=28"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/categories?post=28"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/tags?post=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}