{"componentChunkName":"component---src-templates-dictionary-term-tsx","path":"/dictionary/cybersecurity","result":{"data":{"contentfulDictionaryTerm":{"title":"Cybersecurity","slug":"cybersecurity","descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":"An article discussing cybersecurity. Ideas such as encryption and malware can be incorporated into the description."}},"body":{"body":"# What is cybersecurity?\nNowadays, almost everything we do relies on computers and the internet. We use them for communication through email, smartphones, and tablets; for entertainment with video games, social media, and apps; for transportation with navigation systems; for shopping online and using credit cards; and even for medicine with medical equipment and records. Just think about it: how much of your daily life depends on technology, and how much personal information is stored on your devices or someone else’s system?\n\nThat’s where cybersecurity comes into play. Cybersecurity is the practice of protecting networks, devices, and data from unauthorized access or criminal use. Or to put it simply, it ensures that your information stays confidential, accurate, and accessible only to those who need it.\n\n![Cybersecurity and privacy concepts ](//images.ctfassets.net/18tcvm6gnkis/wQGTqDUjbuDasAzm9ytSz/6f6478e5bcf5a5c56d7f9a2bac8bca1e/Cybersecurity_and_privacy_concepts_to_protect_data._Lock_icon_and_internet_network_security_technology._Businessman_protecti.jpg)\n\n## What are the risks of poor cybersecurity?\nNot using cybersecurity can have a number of potential risks, some more severe than others. Mostly, it will leave you, your system, and your information vulnerable to cyberattacks and scammers. For example, you could have [malware](https://guard.io/dictionary/malware \"Guardio Dictionary - What's malware?\") erase your entire system, an attacker/hacker could break in and alter your files, use your computer to attack others or steal your credit card information for unauthorized purchases. Even with the best precautions, there are no guarantees, but taking steps to protect yourself can minimize these risks.\n\n### Common cybersecurity risks explained\nRecognizing the risks is the first step in protecting yourself. Here are some key terms and practices to help you understand and mitigate these risks:\n\n#### Hackers, attackers, or intruders: \nThese individuals exploit weaknesses in software and systems for their own gain. Their actions can range from harmless curiosity to malicious activities like stealing or altering information. They can also launch attacks aimed at disrupting services, stealing sensitive data, or conducting cyberespionage—spying on individuals, organizations, or governments to gain confidential information. These are the people you need to be careful of.\n\n#### Malicious code: \nAlso known as malware, this includes viruses, worms, and Trojan horses that can harm your computer or compromise your data. Malware might require user action, such as opening an email attachment, or can spread on its own by exploiting software vulnerabilities.\n\n#### Vulnerabilities: \nThese are flaws in software, firmware, or hardware that attackers exploit to perform unauthorized actions. Vulnerabilities can result from programming errors, and attackers use them to infect computers with malware or conduct other malicious activities.\n\n### Best practices for improving cybersecurity\n\n__Keep software up to date:__ Install software updates to prevent attackers from exploiting known vulnerabilities. Enable automatic updates if available.\n\n__Use strong passwords:__ Create long, complex passwords that are difficult to guess. [Use different passwords](https://guard.io/blog/how-to-create-a-strong-password-that-you-will-remember \"Guardio Blog - How to Create a Strong Password That You Will Remember\") for different accounts and devices.\n\n__Implement multifactor authentication (MFA):__ MFA requires at least two forms of identification to verify your identity, making it [harder for attackers](https://guard.io/dictionary/multi-factor-authentication-mfa \"Guardio Dictionary - What's MFA?\") to gain access even if they have your password.\n\n__Be suspicious of unexpected emails:__ [Phishing emails](https://guard.io/blog/phishing-explained-everything-you-need-to-know-about-phishing-scams#how-can-i-protect-myself-from-phi10-paypal-scams-to-watch-outshing-emails \"Guardio Blog - Don't Take the Bait: Your Guide to Phishing Email Protection\") aim to steal your information or install malware on your device. Always be cautious of unsolicited emails.\n\n__Use cybersecurity software:__ As our lives become more online, skipping cybersecurity software is like leaving your front door wide open and expecting not to get robbed. That’s where cybersecurity tools like Guardio come into play. [Guardio](https://guard.io/plans \" Guardio Plans Page\") offers comprehensive cybersecurity protection to keep your online activities safe and secure. It provides a range of features designed to block threats, filter out scams, and alert you to potential dangers, ensuring your personal information and devices remain protected.\n\n#### Here’s how Guardio protects you online: \n\n- Blocks shady websites: It stops you from accidentally visiting sites that look real but are set up to trick you.\n\n- Filters out sketchy messages: Guardio blocks [scam texts](https://guard.io/blog/hook-line-and-sinker-guardios-guide-to-foiling-sms-phishers \"Guardio Blog - Hook, Line, and Sinker: Guardio's Guide to Foiling SMS Phishing\") and unsolicited messages trying to steal your information, keeping your phone safe from scams.\n\n- Keeps an eye on your inbox: Guardio scans your emails for signs of scams and alerts you if something’s fishy.\n\n- Protects your social media: It manages your account cookies to prevent hackers from [taking over](https://guard.io/blog/facebook-hijacking-recognize-react-and-guard-io \"Guardio Blog - Facebook Hijacking: Recognize, React, and Guard(io)\").\n\n- Stops dangerous links: If you click on a malicious link, Guardio will immediately block it, keeping you and your device safe from potential threats.\n\n- Checks for data leaks: [Guardio](https://guard.io/plans \" Guardio Plans Page\") lets you know if your personal info has been compromised somewhere online.\n\nWith more of our lives becoming embedded in online interactions, not using cybersecurity software is like walking into a den of lions waving bait and expecting not to be bitten. [Guardio](https://guard.io/plans \" Guardio Plans Page\") keeps you safe no matter what you do online—whether it's banking, shopping, or just using social media, Guardio's got your back. If you don't have it yet, try the 7-day free trial. If you like it, keep it; if not, cancel anytime with no strings attached.\n","childMarkdownRemark":{"htmlAst":{"type":"root","children":[{"type":"element","tagName":"h1","properties":{"id":"what-is-cybersecurity","style":"position:relative;"},"children":[{"type":"text","value":"What is cybersecurity?"},{"type":"element","tagName":"a","properties":{"href":"#what-is-cybersecurity","ariaLabel":"what is cybersecurity permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Nowadays, almost everything we do relies on computers and the internet. We use them for communication through email, smartphones, and tablets; for entertainment with video games, social media, and apps; for transportation with navigation systems; for shopping online and using credit cards; and even for medicine with medical equipment and records. Just think about it: how much of your daily life depends on technology, and how much personal information is stored on your devices or someone else’s system?"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"That’s where cybersecurity comes into play. Cybersecurity is the practice of protecting networks, devices, and data from unauthorized access or criminal use. Or to put it simply, it ensures that your information stays confidential, accurate, and accessible only to those who need it."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-wrapper"],"style":"position: relative; display: block; ; max-width: 500px; margin-left: auto; margin-right: auto;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-background-image"],"style":"padding-bottom: 54.800000000000004%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"img","properties":{"className":["gatsby-resp-image-image"],"style":"width: 100%; height: 100%; margin: 0; vertical-align: middle; position: absolute; top: 0; left: 0; box-shadow: inset 0px 0px 0px 400px white;","alt":"Cybersecurity and privacy concepts ","title":"","src":"https://images.ctfassets.net/18tcvm6gnkis/wQGTqDUjbuDasAzm9ytSz/6f6478e5bcf5a5c56d7f9a2bac8bca1e/Cybersecurity_and_privacy_concepts_to_protect_data._Lock_icon_and_internet_network_security_technology._Businessman_protecti.jpg","srcSet":["https://images.ctfassets.net/18tcvm6gnkis/wQGTqDUjbuDasAzm9ytSz/6f6478e5bcf5a5c56d7f9a2bac8bca1e/Cybersecurity_and_privacy_concepts_to_protect_data._Lock_icon_and_internet_network_security_technology._Businessman_protecti.jpg?w=125 125w","https://images.ctfassets.net/18tcvm6gnkis/wQGTqDUjbuDasAzm9ytSz/6f6478e5bcf5a5c56d7f9a2bac8bca1e/Cybersecurity_and_privacy_concepts_to_protect_data._Lock_icon_and_internet_network_security_technology._Businessman_protecti.jpg?w=250 250w","https://images.ctfassets.net/18tcvm6gnkis/wQGTqDUjbuDasAzm9ytSz/6f6478e5bcf5a5c56d7f9a2bac8bca1e/Cybersecurity_and_privacy_concepts_to_protect_data._Lock_icon_and_internet_network_security_technology._Businessman_protecti.jpg?w=500 500w"],"sizes":"(max-width: 500px) 100vw, 500px","loading":"lazy"},"children":[]},{"type":"text","value":"\n "}]},{"type":"text","value":"\n "}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h2","properties":{"id":"what-are-the-risks-of-poor-cybersecurity","style":"position:relative;"},"children":[{"type":"text","value":"What are the risks of poor cybersecurity?"},{"type":"element","tagName":"a","properties":{"href":"#what-are-the-risks-of-poor-cybersecurity","ariaLabel":"what are the risks of poor cybersecurity permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Not using cybersecurity can have a number of potential risks, some more severe than others. Mostly, it will leave you, your system, and your information vulnerable to cyberattacks and scammers. For example, you could have "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/dictionary/malware","title":"Guardio Dictionary - What's malware?"},"children":[{"type":"text","value":"malware"}]},{"type":"text","value":" erase your entire system, an attacker/hacker could break in and alter your files, use your computer to attack others or steal your credit card information for unauthorized purchases. Even with the best precautions, there are no guarantees, but taking steps to protect yourself can minimize these risks."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"common-cybersecurity-risks-explained","style":"position:relative;"},"children":[{"type":"text","value":"Common cybersecurity risks explained"},{"type":"element","tagName":"a","properties":{"href":"#common-cybersecurity-risks-explained","ariaLabel":"common cybersecurity risks explained permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Recognizing the risks is the first step in protecting yourself. Here are some key terms and practices to help you understand and mitigate these risks:"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h4","properties":{"id":"hackers-attackers-or-intruders","style":"position:relative;"},"children":[{"type":"text","value":"Hackers, attackers, or intruders:"},{"type":"element","tagName":"a","properties":{"href":"#hackers-attackers-or-intruders","ariaLabel":"hackers attackers or intruders permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"These individuals exploit weaknesses in software and systems for their own gain. Their actions can range from harmless curiosity to malicious activities like stealing or altering information. They can also launch attacks aimed at disrupting services, stealing sensitive data, or conducting cyberespionage—spying on individuals, organizations, or governments to gain confidential information. These are the people you need to be careful of."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h4","properties":{"id":"malicious-code","style":"position:relative;"},"children":[{"type":"text","value":"Malicious code:"},{"type":"element","tagName":"a","properties":{"href":"#malicious-code","ariaLabel":"malicious code permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Also known as malware, this includes viruses, worms, and Trojan horses that can harm your computer or compromise your data. Malware might require user action, such as opening an email attachment, or can spread on its own by exploiting software vulnerabilities."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h4","properties":{"id":"vulnerabilities","style":"position:relative;"},"children":[{"type":"text","value":"Vulnerabilities:"},{"type":"element","tagName":"a","properties":{"href":"#vulnerabilities","ariaLabel":"vulnerabilities permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"These are flaws in software, firmware, or hardware that attackers exploit to perform unauthorized actions. Vulnerabilities can result from programming errors, and attackers use them to infect computers with malware or conduct other malicious activities."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"best-practices-for-improving-cybersecurity","style":"position:relative;"},"children":[{"type":"text","value":"Best practices for improving cybersecurity"},{"type":"element","tagName":"a","properties":{"href":"#best-practices-for-improving-cybersecurity","ariaLabel":"best practices for improving cybersecurity permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Keep software up to date:"}]},{"type":"text","value":" Install software updates to prevent attackers from exploiting known vulnerabilities. Enable automatic updates if available."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Use strong passwords:"}]},{"type":"text","value":" Create long, complex passwords that are difficult to guess. "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/blog/how-to-create-a-strong-password-that-you-will-remember","title":"Guardio Blog - How to Create a Strong Password That You Will Remember"},"children":[{"type":"text","value":"Use different passwords"}]},{"type":"text","value":" for different accounts and devices."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Implement multifactor authentication (MFA):"}]},{"type":"text","value":" MFA requires at least two forms of identification to verify your identity, making it "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/dictionary/multi-factor-authentication-mfa","title":"Guardio Dictionary - What's MFA?"},"children":[{"type":"text","value":"harder for attackers"}]},{"type":"text","value":" to gain access even if they have your password."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Be suspicious of unexpected emails:"}]},{"type":"text","value":" "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/blog/phishing-explained-everything-you-need-to-know-about-phishing-scams#how-can-i-protect-myself-from-phi10-paypal-scams-to-watch-outshing-emails","title":"Guardio Blog - Don't Take the Bait: Your Guide to Phishing Email Protection"},"children":[{"type":"text","value":"Phishing emails"}]},{"type":"text","value":" aim to steal your information or install malware on your device. Always be cautious of unsolicited emails."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Use cybersecurity software:"}]},{"type":"text","value":" As our lives become more online, skipping cybersecurity software is like leaving your front door wide open and expecting not to get robbed. That’s where cybersecurity tools like Guardio come into play. "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":" Guardio Plans Page"},"children":[{"type":"text","value":"Guardio"}]},{"type":"text","value":" offers comprehensive cybersecurity protection to keep your online activities safe and secure. It provides a range of features designed to block threats, filter out scams, and alert you to potential dangers, ensuring your personal information and devices remain protected."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h4","properties":{"id":"heres-how-guardio-protects-you-online","style":"position:relative;"},"children":[{"type":"text","value":"Here’s how Guardio protects you online:"},{"type":"element","tagName":"a","properties":{"href":"#heres-how-guardio-protects-you-online","ariaLabel":"heres how guardio protects you online permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Blocks shady websites: It stops you from accidentally visiting sites that look real but are set up to trick you."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Filters out sketchy messages: Guardio blocks "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/blog/hook-line-and-sinker-guardios-guide-to-foiling-sms-phishers","title":"Guardio Blog - Hook, Line, and Sinker: Guardio's Guide to Foiling SMS Phishing"},"children":[{"type":"text","value":"scam texts"}]},{"type":"text","value":" and unsolicited messages trying to steal your information, keeping your phone safe from scams."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Keeps an eye on your inbox: Guardio scans your emails for signs of scams and alerts you if something’s fishy."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Protects your social media: It manages your account cookies to prevent hackers from "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/blog/facebook-hijacking-recognize-react-and-guard-io","title":"Guardio Blog - Facebook Hijacking: Recognize, React, and Guard(io)"},"children":[{"type":"text","value":"taking over"}]},{"type":"text","value":"."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Stops dangerous links: If you click on a malicious link, Guardio will immediately block it, keeping you and your device safe from potential threats."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Checks for data leaks: "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":" Guardio Plans Page"},"children":[{"type":"text","value":"Guardio"}]},{"type":"text","value":" lets you know if your personal info has been compromised somewhere online."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"With more of our lives becoming embedded in online interactions, not using cybersecurity software is like walking into a den of lions waving bait and expecting not to be bitten. "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":" Guardio Plans Page"},"children":[{"type":"text","value":"Guardio"}]},{"type":"text","value":" keeps you safe no matter what you do online—whether it's banking, shopping, or just using social media, Guardio's got your back. If you don't have it yet, try the 7-day free trial. If you like it, keep it; if not, cancel anytime with no strings attached."}]}],"data":{"quirksMode":false}}}}}},"pageContext":{"title":"Cybersecurity","slug":"cybersecurity","keepLearning":[{"title":"DDoS","slug":"ddos"},{"title":"DNs Hijacking","slug":"dns-hijacking"},{"title":"Dark Web","slug":"dark-web"}],"breadcrumb":{"location":"/dictionary/cybersecurity","crumbs":[{"pathname":"/","crumbLabel":"Homepage"},{"pathname":"/dictionary","crumbLabel":"dictionary"},{"pathname":"/dictionary/cybersecurity","crumbLabel":"cybersecurity"}]}}},"staticQueryHashes":["1614255152"]}