{"id":179222,"date":"2021-10-22T10:08:24","date_gmt":"2021-10-22T14:08:24","guid":{"rendered":"https:\/\/armchairarcade.com\/perspectives\/?p=179222"},"modified":"2021-10-22T10:09:03","modified_gmt":"2021-10-22T14:09:03","slug":"cybersecurity","status":"publish","type":"post","link":"https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/","title":{"rendered":"Why and how cybersecurity must be taken seriously"},"content":{"rendered":"\n<p>With an attack happening on average once every 40 seconds it is likely that at some point in the future either you or your business will encounter cybercrime. As long as you are on the internet then you are at risk of an attack, and should consider your safety.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Types of cyberattacks<\/strong><\/h2>\n\n\n\n<p>This article will examine a few simple tips that you can use to improve your cybersecurity levels. Whether you are gaming at <a href=\"https:\/\/www.jackpotcitycasino.com\/canada\/\">jackpotcitycasino.com\/canada<\/a> or working online, you need to be secure. A typical cyberattack can include identity theft (and fraud and extortion using this information), installation of viruses, breach of access, denial of services, and password theft. This will compromise your data and cause severe business and personal risk. The following strategies can thus be used to limit these attacks and reduce the risk of them achieving their aim of financial fraud and theft:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Be informed and train staff<\/h3>\n\n\n\n<p>Make sure that anyone who accesses your information and company data is well trained and clearly understands the <a href=\"https:\/\/www.cnbc.com\/2019\/10\/13\/cyberattacks-cost-small-companies-200k-putting-many-out-of-business.html\">threats afforded by cybercriminals<\/a>, and online crime in general. Everyone who has access must ensure that their passwords are unique for each application that they access.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Back up your data<\/h3>\n\n\n\n<p>Having all your data backed up on a regular basis on a secure server (or offsite) is one of the best ways to pre-empt a cyberattack. Should your <a href=\"https:\/\/www.nytimes.com\/2021\/08\/18\/business\/tmobile-data-breach.html\">data be compromised or stolen<\/a>, you will than have a backup through which work and other business processes can simply continue.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Develop your endpoint protection<\/h3>\n\n\n\n<p>With so many more devices being able to access the network and data through the cloud, it is essential that you have a suitable endpoint security strategy and system in place. This security must be able to detect, contain, and stop any attacks that are attempted.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-mati-mango-6330644.jpg?resize=1024%2C683&#038;ssl=1\" alt=\"\" class=\"wp-image-179224\" srcset=\"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-mati-mango-6330644.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-mati-mango-6330644.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-mati-mango-6330644.jpg?resize=150%2C100&amp;ssl=1 150w, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-mati-mango-6330644.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-mati-mango-6330644.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Control all physical access<\/h3>\n\n\n\n<p>It is easy to think that criminals need to access the network in order to steal and remove data; however, being able to access the office is just as risky, as hardware such as laptops, external drives and storage, and smart phones can be removed\u2014all of which contain valuable data. It is important to have physical security systems in place to ensure that only those who are authorized can access the building and office spaces that may contain this hardware.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Ensure that all systems and software are up to date<\/h3>\n\n\n\n<p>You must have the latest upgrades and updates to ensure that your firewalls are working; that you have the latest virus definitions; and that your infrastructure can handle the various access points, increased traffic, and is able to stay one step ahead of the hackers and cybercriminals.<\/p>\n\n\n\n<p>Many believe that it is only businesses that are at risk of cybercrime, but in reality, there is so much personal data online on gaming sites and social media that an understanding of cybersecurity is necessary for anyone who is online in anyway. The simple tips mentioned in this article can all be implemented quite simply, and if yours is a managed IT service then your provider should be able to do all of the above, as well as providing a more detailed analysis of your specific threats and the steps you can take to avoid cybercrime.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article will examine a few simple tips that you can use to improve your cybersecurity levels.<\/p>\n","protected":false},"author":4295,"featured_media":179223,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"Why and how cybersecurity must be taken seriously #cybersecurity #endpoint #cybercrime","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[15],"tags":[2907,1821,734],"class_list":["post-179222","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-editorial","tag-cyberattacks","tag-cybersecurity","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why and how cybersecurity must be taken seriously - Armchair Arcade<\/title>\n<meta name=\"description\" content=\"This article will examine a few simple tips that you can use to improve your cybersecurity levels.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why and how cybersecurity must be taken seriously - Armchair Arcade\" \/>\n<meta property=\"og:description\" content=\"This article will examine a few simple tips that you can use to improve your cybersecurity levels.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Armchair Arcade\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Armchair-Arcade\/141237783007\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-22T14:08:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-22T14:09:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-tima-miroshnichenko-5380792.jpg?fit=1280%2C853&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jane Smith\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@armchairarcade\" \/>\n<meta name=\"twitter:site\" content=\"@armchairarcade\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jane Smith\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2021\\\/10\\\/22\\\/cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2021\\\/10\\\/22\\\/cybersecurity\\\/\"},\"author\":{\"name\":\"Jane Smith\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/person\\\/29e411abb521ff8531493f9f33483f2e\"},\"headline\":\"Why and how cybersecurity must be taken seriously\",\"datePublished\":\"2021-10-22T14:08:24+00:00\",\"dateModified\":\"2021-10-22T14:09:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2021\\\/10\\\/22\\\/cybersecurity\\\/\"},\"wordCount\":546,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2021\\\/10\\\/22\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/pexels-tima-miroshnichenko-5380792.jpg?fit=1280%2C853&ssl=1\",\"keywords\":[\"cyberattacks\",\"cybersecurity\",\"security\"],\"articleSection\":[\"Editorial\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2021\\\/10\\\/22\\\/cybersecurity\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2021\\\/10\\\/22\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2021\\\/10\\\/22\\\/cybersecurity\\\/\",\"name\":\"Why and how cybersecurity must be taken seriously - Armchair Arcade\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2021\\\/10\\\/22\\\/cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2021\\\/10\\\/22\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/pexels-tima-miroshnichenko-5380792.jpg?fit=1280%2C853&ssl=1\",\"datePublished\":\"2021-10-22T14:08:24+00:00\",\"dateModified\":\"2021-10-22T14:09:03+00:00\",\"description\":\"This article will examine a few simple tips that you can use to improve your cybersecurity levels.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2021\\\/10\\\/22\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2021\\\/10\\\/22\\\/cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2021\\\/10\\\/22\\\/cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/pexels-tima-miroshnichenko-5380792.jpg?fit=1280%2C853&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/pexels-tima-miroshnichenko-5380792.jpg?fit=1280%2C853&ssl=1\",\"width\":1280,\"height\":853,\"caption\":\"Why and how cybersecurity must be taken seriously\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2021\\\/10\\\/22\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why and how cybersecurity must be taken seriously\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#website\",\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/\",\"name\":\"Armchair Arcade\",\"description\":\"Chronicling the complete history of videogames, computers, technology, and pop culture since 2003\",\"publisher\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#organization\"},\"alternateName\":\"AA\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#organization\",\"name\":\"Armchair Arcade\",\"alternateName\":\"AA\",\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Google-250.png?fit=250%2C250&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Google-250.png?fit=250%2C250&ssl=1\",\"width\":250,\"height\":250,\"caption\":\"Armchair Arcade\"},\"image\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/Armchair-Arcade\\\/141237783007\",\"https:\\\/\\\/x.com\\\/armchairarcade\",\"https:\\\/\\\/instagram.com\\\/bill_loguidice\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/billloguidice\",\"https:\\\/\\\/www.pinterest.com\\\/billloguidice\\\/armchair-arcade\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/BillLoguidice\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/person\\\/29e411abb521ff8531493f9f33483f2e\",\"name\":\"Jane Smith\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/Google-250.png?fit=96%2C96&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/Google-250.png?fit=96%2C96&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/Google-250.png?fit=96%2C96&ssl=1\",\"caption\":\"Jane Smith\"},\"description\":\"Correspondent for Armchair Arcade.\",\"sameAs\":[\"http:\\\/\\\/www.armchairarcade.com\"],\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/author\\\/jane-smith\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why and how cybersecurity must be taken seriously - Armchair Arcade","description":"This article will examine a few simple tips that you can use to improve your cybersecurity levels.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Why and how cybersecurity must be taken seriously - Armchair Arcade","og_description":"This article will examine a few simple tips that you can use to improve your cybersecurity levels.","og_url":"https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/","og_site_name":"Armchair Arcade","article_publisher":"https:\/\/www.facebook.com\/pages\/Armchair-Arcade\/141237783007","article_published_time":"2021-10-22T14:08:24+00:00","article_modified_time":"2021-10-22T14:09:03+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-tima-miroshnichenko-5380792.jpg?fit=1280%2C853&ssl=1","type":"image\/jpeg"}],"author":"Jane Smith","twitter_card":"summary_large_image","twitter_creator":"@armchairarcade","twitter_site":"@armchairarcade","twitter_misc":{"Written by":"Jane Smith","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/#article","isPartOf":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/"},"author":{"name":"Jane Smith","@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/person\/29e411abb521ff8531493f9f33483f2e"},"headline":"Why and how cybersecurity must be taken seriously","datePublished":"2021-10-22T14:08:24+00:00","dateModified":"2021-10-22T14:09:03+00:00","mainEntityOfPage":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/"},"wordCount":546,"commentCount":0,"publisher":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#organization"},"image":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-tima-miroshnichenko-5380792.jpg?fit=1280%2C853&ssl=1","keywords":["cyberattacks","cybersecurity","security"],"articleSection":["Editorial"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/","url":"https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/","name":"Why and how cybersecurity must be taken seriously - Armchair Arcade","isPartOf":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-tima-miroshnichenko-5380792.jpg?fit=1280%2C853&ssl=1","datePublished":"2021-10-22T14:08:24+00:00","dateModified":"2021-10-22T14:09:03+00:00","description":"This article will examine a few simple tips that you can use to improve your cybersecurity levels.","breadcrumb":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/#primaryimage","url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-tima-miroshnichenko-5380792.jpg?fit=1280%2C853&ssl=1","contentUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-tima-miroshnichenko-5380792.jpg?fit=1280%2C853&ssl=1","width":1280,"height":853,"caption":"Why and how cybersecurity must be taken seriously"},{"@type":"BreadcrumbList","@id":"https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/armchairarcade.com\/perspectives\/"},{"@type":"ListItem","position":2,"name":"Why and how cybersecurity must be taken seriously"}]},{"@type":"WebSite","@id":"https:\/\/armchairarcade.com\/perspectives\/#website","url":"https:\/\/armchairarcade.com\/perspectives\/","name":"Armchair Arcade","description":"Chronicling the complete history of videogames, computers, technology, and pop culture since 2003","publisher":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#organization"},"alternateName":"AA","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/armchairarcade.com\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/armchairarcade.com\/perspectives\/#organization","name":"Armchair Arcade","alternateName":"AA","url":"https:\/\/armchairarcade.com\/perspectives\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/08\/Google-250.png?fit=250%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/08\/Google-250.png?fit=250%2C250&ssl=1","width":250,"height":250,"caption":"Armchair Arcade"},"image":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/Armchair-Arcade\/141237783007","https:\/\/x.com\/armchairarcade","https:\/\/instagram.com\/bill_loguidice\/","https:\/\/www.linkedin.com\/in\/billloguidice","https:\/\/www.pinterest.com\/billloguidice\/armchair-arcade\/","https:\/\/www.youtube.com\/user\/BillLoguidice\/"]},{"@type":"Person","@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/person\/29e411abb521ff8531493f9f33483f2e","name":"Jane Smith","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2015\/05\/Google-250.png?fit=96%2C96&ssl=1","url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2015\/05\/Google-250.png?fit=96%2C96&ssl=1","contentUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2015\/05\/Google-250.png?fit=96%2C96&ssl=1","caption":"Jane Smith"},"description":"Correspondent for Armchair Arcade.","sameAs":["http:\/\/www.armchairarcade.com"],"url":"https:\/\/armchairarcade.com\/perspectives\/author\/jane-smith\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-tima-miroshnichenko-5380792.jpg?fit=1280%2C853&ssl=1","jetpack-related-posts":[{"id":189284,"url":"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/","url_meta":{"origin":179222,"position":0},"title":"How Cybersecurity Frameworks Like NIST 800-171 Protect Your Data","author":"Jonathan Adams","date":"May 31, 2025","format":false,"excerpt":"Adhering to NIST SP 800-171 regulations results in a strong security posture for the whole organization.","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"teal LED panel","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/teal-LED-panel.jpg?fit=1200%2C801&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/teal-LED-panel.jpg?fit=1200%2C801&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/teal-LED-panel.jpg?fit=1200%2C801&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/teal-LED-panel.jpg?fit=1200%2C801&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/teal-LED-panel.jpg?fit=1200%2C801&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":189780,"url":"https:\/\/armchairarcade.com\/perspectives\/2025\/07\/08\/how-small-businesses-can-leverage-technology-to-stay-ahead\/","url_meta":{"origin":179222,"position":1},"title":"How Small Businesses Can Leverage Technology to Stay Ahead","author":"Jonathan Adams","date":"July 8, 2025","format":false,"excerpt":"Running a small business today means balancing many moving parts.","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"Electronics Engineer Fixing Cables on Server","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/07\/Electronics-Engineer-Fixing-Cables-on-Server.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/07\/Electronics-Engineer-Fixing-Cables-on-Server.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/07\/Electronics-Engineer-Fixing-Cables-on-Server.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/07\/Electronics-Engineer-Fixing-Cables-on-Server.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/07\/Electronics-Engineer-Fixing-Cables-on-Server.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":8011,"url":"https:\/\/armchairarcade.com\/perspectives\/2018\/07\/30\/pay-what-you-want-for-the-humble-book-bundle-cybersecurity-2-0-by-wiley\/","url_meta":{"origin":179222,"position":2},"title":"Pay what you want for The Humble Book Bundle: Cybersecurity 2.0 by Wiley","author":"Bill Loguidice","date":"July 30, 2018","format":false,"excerpt":"The Humble Book Bundle: Cybersecurity 2.0 by Wiley Here's the link. Offer ends 2018-08-13 11:00:00 PDT. Secure yourself a new bundle.\u00a0We've teamed up with Wiley for the next generation of cybersecurity book bundle. Get titles like\u00a0Advanced Penetration Testing, Investigating Cryptocurrencies, The Shellcoder's Handbook, The Art of Memory Forensics, and\u00a0Security Engineering.\u2026","rel":"","context":"In &quot;Sale&quot;","block_context":{"text":"Sale","link":"https:\/\/armchairarcade.com\/perspectives\/category\/sale\/"},"img":{"alt_text":"Pay what you want for The Humble Book Bundle: Cybersecurity 2.0 by Wiley","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/07\/cybersecurity2_book_bundle-twitter-post2.png?fit=1024%2C512&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/07\/cybersecurity2_book_bundle-twitter-post2.png?fit=1024%2C512&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/07\/cybersecurity2_book_bundle-twitter-post2.png?fit=1024%2C512&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/07\/cybersecurity2_book_bundle-twitter-post2.png?fit=1024%2C512&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":7747,"url":"https:\/\/armchairarcade.com\/perspectives\/2018\/06\/19\/pay-what-you-want-for-the-humble-software-bundle-cybersecurity\/","url_meta":{"origin":179222,"position":3},"title":"Pay what you want for The Humble Software Bundle: Cybersecurity!","author":"Bill Loguidice","date":"June 19, 2018","format":false,"excerpt":"The Humble Software Bundle: Cybersecurity Here's the link. Offer expires 2018-07-03 11:00:00 PDT. Feeling insecure? Get this bundle.\u00a0Keep yourself safe on the net with our newest software bundle! Get applications like Dashlane Premium, Private Internet Access, and SpiderOak One Backup. Plus, your purchase can support Electronic Frontier\u00a0Foundation \u2013 or a\u2026","rel":"","context":"In &quot;Sale&quot;","block_context":{"text":"Sale","link":"https:\/\/armchairarcade.com\/perspectives\/category\/sale\/"},"img":{"alt_text":"Pay what you want for The Humble Software Bundle: Cybersecurity!","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/06\/cybersecurity_softwarebundle-facebook-post-mpa.png?fit=1200%2C630&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/06\/cybersecurity_softwarebundle-facebook-post-mpa.png?fit=1200%2C630&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/06\/cybersecurity_softwarebundle-facebook-post-mpa.png?fit=1200%2C630&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/06\/cybersecurity_softwarebundle-facebook-post-mpa.png?fit=1200%2C630&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/06\/cybersecurity_softwarebundle-facebook-post-mpa.png?fit=1200%2C630&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":185612,"url":"https:\/\/armchairarcade.com\/perspectives\/2024\/01\/24\/fortifying-the-virtual-fortress\/","url_meta":{"origin":179222,"position":4},"title":"Fortifying the Virtual Fortress: Cybersecurity, Crypto Payments, and the Shielding of Online Casino Platforms","author":"Jane Smith","date":"January 24, 2024","format":false,"excerpt":"his article delves into the evolving landscape of cyber threats, the role of cryptocurrency in online transactions, and the measures taken by online casinos to ensure a secure gaming environment.","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"Cryptocurrency security - Generated with AI","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/01\/4a8f050f-66ef-414a-a570-e58b48c9cdb7.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/01\/4a8f050f-66ef-414a-a570-e58b48c9cdb7.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/01\/4a8f050f-66ef-414a-a570-e58b48c9cdb7.jpg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/01\/4a8f050f-66ef-414a-a570-e58b48c9cdb7.jpg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":192058,"url":"https:\/\/armchairarcade.com\/perspectives\/2026\/02\/04\/the-rise-of-fraudulent-game-download-sites-and-how-to-avoid-them\/","url_meta":{"origin":179222,"position":5},"title":"The Rise of Fraudulent Game Download Sites and How to Avoid Them","author":"Andrei Kuznetsov","date":"February 4, 2026","format":false,"excerpt":"With domain risk assessment knowledge and the right tools, you can easily spot and avoid malicious game download sites.","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"Close-up of gaming mouse.","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2026\/02\/pexels-photo-2115256.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2026\/02\/pexels-photo-2115256.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2026\/02\/pexels-photo-2115256.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2026\/02\/pexels-photo-2115256.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2026\/02\/pexels-photo-2115256.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_shortlink":"https:\/\/wp.me\/p5dH5R-KCG","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/posts\/179222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/users\/4295"}],"replies":[{"embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/comments?post=179222"}],"version-history":[{"count":0,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/posts\/179222\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/media\/179223"}],"wp:attachment":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/media?parent=179222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/categories?post=179222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/tags?post=179222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}