{"id":926,"date":"2014-10-29T12:00:31","date_gmt":"2014-10-29T17:00:31","guid":{"rendered":"http:\/\/convergedsystems.com\/blog\/?p=926"},"modified":"2018-10-09T11:55:56","modified_gmt":"2018-10-09T16:55:56","slug":"how-to-avoid-being-hacked","status":"publish","type":"post","link":"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/","title":{"rendered":"How to Avoid Being Hacked"},"content":{"rendered":"<p>Jewel Osco, Home Depot and Chase bank have all experienced recent security breaches. Although we often hear of big companies being at risk for hacking, it can happen to anyone. So how can you keep your online information safe?<\/p>\n<p><strong>Create tough passwords.<\/strong><\/p>\n<p>Tough, unique passwords are essential when protecting your online accounts. Creating different passwords for each of your accounts will ensure that should one account be hacked into, the others aren\u2019t at risk. If you have a hard time remembering all of your passwords, keep them stored in a document or use a password manager software program.<\/p>\n<p><strong>Set up two-part authentication.<\/strong><\/p>\n<p>Whenever you sign into a new or shared computer or device, you\u2019re putting your login credentials at risk. By creating two-step verification for each of your accounts and having security questions in place will add an extra layer of protection from hackers who want to break into your account.<\/p>\n<p><strong>Share less information online.<\/strong><\/p>\n<p>Although social media makes it easy and convenient to share information, this information can be used to access your accounts. Things like birthdays, emails and phone numbers can be used by hackers. It\u2019s important to be aware of what personal information is available online.<\/p>\n<p><strong>Delete old accounts.<\/strong><\/p>\n<p>Did you have a MySpace account? Or maybe you have a LinkedIn profile you never use. Either way, take some time to delete old social media accounts you don\u2019t use anymore.<\/p>\n<p><strong>Want more technology tips?<\/strong> Follow Converged Communication Systems on Twitter <a href=\"https:\/\/twitter.com\/CCStelephony\" class=\"external external_icon\" rel=\"nofollow\">@CCSTelephony<\/a> and like us on <a href=\"https:\/\/www.facebook.com\/ConvergedCommunicationSystems\" class=\"external external_icon\" rel=\"nofollow\">Facebook<\/a>!<\/p>\n<p><a href=\"http:\/\/convergedsystems.com\/blog\/wp-content\/uploads\/2014\/06\/iStock_000016568404_Small.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-823 aligncenter\" src=\"http:\/\/convergedsystems.com\/blog\/wp-content\/uploads\/2014\/06\/iStock_000016568404_Small.jpg\" alt=\"iStock_000016568404_Small\" width=\"500\" height=\"300\" \/><\/a><\/p>\n<a class=\"synved-social-button synved-social-button-share synved-social-size-32 synved-social-resolution-single synved-social-provider-facebook nolightbox external\" data-provider=\"facebook\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Facebook\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F926&#038;t=How%20to%20Avoid%20Being%20Hacked&#038;s=100&#038;p&#091;url&#093;=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F926&#038;p&#091;images&#093;&#091;0&#093;=http%3A%2F%2Fconvergedsystems.com%2Fblog%2Fwp-content%2Fuploads%2F2014%2F06%2FiStock_000016568404_Small.jpg&#038;p&#091;title&#093;=How%20to%20Avoid%20Being%20Hacked\" style=\"font-size: 0px;width:32px;height:32px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"Facebook\" title=\"Share on Facebook\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"32\" height=\"32\" style=\"display: inline;width:32px;height:32px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/64x64\/facebook.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-32 synved-social-resolution-single synved-social-provider-twitter nolightbox external\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F926&#038;text=Hey%20check%20this%20out\" style=\"font-size: 0px;width:32px;height:32px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Share on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"32\" height=\"32\" style=\"display: inline;width:32px;height:32px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/64x64\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-32 synved-social-resolution-single synved-social-provider-linkedin nolightbox external\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Linkedin\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F926&#038;title=How%20to%20Avoid%20Being%20Hacked\" style=\"font-size: 0px;width:32px;height:32px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Share on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"32\" height=\"32\" style=\"display: inline;width:32px;height:32px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/64x64\/linkedin.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>Jewel Osco, Home Depot and Chase bank have all experienced recent security breaches. Although we often hear of big companies being at risk for hacking, it can happen to anyone. So how can you keep your online information safe? Create tough passwords. Tough, unique passwords are essential when protecting your online accounts. Creating different passwords&#8230; <a class=\"moretag\" href=\"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[223,3,196,209],"tags":[],"class_list":["post-926","post","type-post","status-publish","format-standard","hentry","category-converged-communication-systems","category-converged-tips","category-knowledge-based","category-technology-news-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Avoid Being Hacked - Converged Systems Blog<\/title>\n<meta name=\"description\" content=\"Do you know how to keep your accounts secure? Don&#039;t be the victim of cyber hacking!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Avoid Being Hacked - Converged Systems Blog\" \/>\n<meta property=\"og:description\" content=\"Do you know how to keep your accounts secure? Don&#039;t be the victim of cyber hacking!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"Converged Systems Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-10-29T17:00:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-10-09T16:55:56+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/convergedsystems.com\/blog\/wp-content\/uploads\/2014\/06\/iStock_000016568404_Small.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49\"},\"headline\":\"How to Avoid Being Hacked\",\"datePublished\":\"2014-10-29T17:00:31+00:00\",\"dateModified\":\"2018-10-09T16:55:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/\"},\"wordCount\":258,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/convergedsystems.com\/blog\/wp-content\/uploads\/2014\/06\/iStock_000016568404_Small.jpg\",\"articleSection\":[\"Converged Communication Systems\",\"Converged Tips\",\"Knowledge Based\",\"Technology News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/\",\"url\":\"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/\",\"name\":\"How to Avoid Being Hacked - Converged Systems Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/convergedsystems.com\/blog\/wp-content\/uploads\/2014\/06\/iStock_000016568404_Small.jpg\",\"datePublished\":\"2014-10-29T17:00:31+00:00\",\"dateModified\":\"2018-10-09T16:55:56+00:00\",\"author\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49\"},\"description\":\"Do you know how to keep your accounts secure? Don't be the victim of cyber hacking!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/#primaryimage\",\"url\":\"http:\/\/convergedsystems.com\/blog\/wp-content\/uploads\/2014\/06\/iStock_000016568404_Small.jpg\",\"contentUrl\":\"http:\/\/convergedsystems.com\/blog\/wp-content\/uploads\/2014\/06\/iStock_000016568404_Small.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.convergedsystems.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Avoid Being Hacked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#website\",\"url\":\"https:\/\/www.convergedsystems.com\/blog\/\",\"name\":\"Converged Systems Blog\",\"description\":\"Converged Communication Systems (CCS) provides best-in-class IP Telephony \/ Unified Communications solutions.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.convergedsystems.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/www.convergedsystems.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Avoid Being Hacked - Converged Systems Blog","description":"Do you know how to keep your accounts secure? Don't be the victim of cyber hacking!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/","og_locale":"en_US","og_type":"article","og_title":"How to Avoid Being Hacked - Converged Systems Blog","og_description":"Do you know how to keep your accounts secure? Don't be the victim of cyber hacking!","og_url":"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/","og_site_name":"Converged Systems Blog","article_published_time":"2014-10-29T17:00:31+00:00","article_modified_time":"2018-10-09T16:55:56+00:00","og_image":[{"url":"http:\/\/convergedsystems.com\/blog\/wp-content\/uploads\/2014\/06\/iStock_000016568404_Small.jpg","type":"","width":"","height":""}],"author":"admin","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/#article","isPartOf":{"@id":"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/"},"author":{"name":"admin","@id":"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49"},"headline":"How to Avoid Being Hacked","datePublished":"2014-10-29T17:00:31+00:00","dateModified":"2018-10-09T16:55:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/"},"wordCount":258,"commentCount":0,"image":{"@id":"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/#primaryimage"},"thumbnailUrl":"http:\/\/convergedsystems.com\/blog\/wp-content\/uploads\/2014\/06\/iStock_000016568404_Small.jpg","articleSection":["Converged Communication Systems","Converged Tips","Knowledge Based","Technology News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/","url":"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/","name":"How to Avoid Being Hacked - Converged Systems Blog","isPartOf":{"@id":"https:\/\/www.convergedsystems.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/#primaryimage"},"image":{"@id":"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/#primaryimage"},"thumbnailUrl":"http:\/\/convergedsystems.com\/blog\/wp-content\/uploads\/2014\/06\/iStock_000016568404_Small.jpg","datePublished":"2014-10-29T17:00:31+00:00","dateModified":"2018-10-09T16:55:56+00:00","author":{"@id":"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49"},"description":"Do you know how to keep your accounts secure? Don't be the victim of cyber hacking!","breadcrumb":{"@id":"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/#primaryimage","url":"http:\/\/convergedsystems.com\/blog\/wp-content\/uploads\/2014\/06\/iStock_000016568404_Small.jpg","contentUrl":"http:\/\/convergedsystems.com\/blog\/wp-content\/uploads\/2014\/06\/iStock_000016568404_Small.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.convergedsystems.com\/blog\/how-to-avoid-being-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.convergedsystems.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Avoid Being Hacked"}]},{"@type":"WebSite","@id":"https:\/\/www.convergedsystems.com\/blog\/#website","url":"https:\/\/www.convergedsystems.com\/blog\/","name":"Converged Systems Blog","description":"Converged Communication Systems (CCS) provides best-in-class IP Telephony \/ Unified Communications solutions.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.convergedsystems.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/www.convergedsystems.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts\/926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/comments?post=926"}],"version-history":[{"count":7,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts\/926\/revisions"}],"predecessor-version":[{"id":1084,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts\/926\/revisions\/1084"}],"wp:attachment":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/media?parent=926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/categories?post=926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/tags?post=926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}