{"id":36557,"date":"2020-08-11T12:50:08","date_gmt":"2020-08-11T12:50:08","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=544410"},"modified":"2020-08-11T12:50:08","modified_gmt":"2020-08-11T12:50:08","slug":"top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/","title":{"rendered":"Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/08\/laptop-facemask-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/08\/laptop-facemask-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/08\/laptop-facemask-1024x683.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/08\/laptop-facemask-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/08\/laptop-facemask-1536x1024.jpg 1536w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/08\/laptop-facemask-2048x1365.jpg 2048w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/08\/laptop-facemask-640x427.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/08\/laptop-facemask-900x600.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/08\/laptop-facemask-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/08\/laptop-facemask-380x253.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"> <\/p>\n<p>Welcome to the new normal. We\u2019re all now living in a post-COVID-19 world characterized by uncertainty, mass home working and remote learning. The lines demarcating normal life have shifted abruptly \u2013 perhaps never to return. That\u2019s not the worst that can happen, as we all know, but it does mean we all need to get used to new ways of living, working and studying from home. This has major implications for the online safety, security and privacy of our families.<\/p>\n<p>To help you adapt to these new conditions while protecting what matters most, Trend Micro has developed a two-part blog series on \u201cThe New Normal.\u201d Part 1 identifies the scope and specific cyber-threats of the new normal. Part 2 provides security tips and products to help address those threats.<\/p>\n<h3><strong>What\u2019s going on?<\/strong><\/h3>\n<p>In April, nearly 300 million Americans <a href=\"https:\/\/www.statista.com\/chart\/21240\/enforced-covid-19-lockdowns-by-people-affected-per-country\/\">were estimated to be<\/a> in government-mandated lockdown. Even as some businesses, municipalities and states begin to relax these rules, experts have warned of subsequent waves of the virus, which could result in new localized lockdowns. In short, a lot of people will continue to work from home, while their children, also at home, attempt to study remotely from their mobile devices.<\/p>\n<p>This has considerable implications for how we spend our time. Without that morning commute to work or school, more of it than ever will involve sitting in front of a desktop, laptop, tablet or smartphone screen. Even the smart TV is enlisted. Dangers include<\/p>\n<table>\n<tbody readability=\"5.445471349353\">\n<tr readability=\"10.890942698706\">\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Use of potentially insecure video conferencing applications. The number of daily meeting participants <a href=\"https:\/\/blog.zoom.us\/a-message-to-our-users\/\">on Zoom surged<\/a> from 10 million in December 2019 to roughly 200 million in March.<\/li>\n<li>Visits to P2P\/torrent sites or platforms for adult content. In search of entertainment, bored kids or teens in your household may have more time and inclination to do this.<\/li>\n<li>Downloads of potentially malicious applications disguised as legitimate entertainment or gaming content.<\/li>\n<li>More online shopping and banking. <a href=\"https:\/\/www.adobe.com\/content\/dam\/www\/us\/en\/experience-cloud\/digital-insights\/pdfs\/adobe_analytics-digital-economy-index-2020.pdf\">June alone generated $73.2 billion in online spend<\/a>, up 76.2% year-on-year. Whenever you shop or bank online, financial data is potentially exposed.<\/li>\n<li>Use of potentially insecure remote learning platforms. Educational mobile app downloads increased by a massive 1087% <a href=\"https:\/\/www.statista.com\/statistics\/1108469\/coronavirus-impact-app-downloads-by-category-usa\/\">between March 2 and 16<\/a>. The trend continues.<\/li>\n<li>Logging on to corporate cloud-based services. This includes Office 365, to do your job remotely, or using a VPN to connect directly into the office.<\/li>\n<li>For recreation, streaming and browsing on your smart TV. But even your smart TV is vulnerable to threats, as the <a href=\"https:\/\/techcrunch.com\/2019\/12\/01\/fbi-smart-tv-security\/\">FBI has warned<\/a>.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><strong>Risky behavior<\/strong><\/h3>\n<p>Unfortunately, the increase in working from home (WFH), especially for those not used to it, may lead to an increase in risky behavior, such as: using non-approved apps for work; visiting non work-related sites on work devices; and using personal devices to access work resources. Recent <a href=\"https:\/\/newsroom.trendmicro.com\/2020-07-01-Trend-Micro-Finds-72-of-Remote-Workers-Have-Gained-Cybersecurity-Awareness-During-Lockdown\">global Trend Micro research<\/a> found that:<\/p>\n<table>\n<tbody readability=\"4\">\n<tr readability=\"8\">\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>80% have used their work laptop for personal browsing, with only 36% fully restricting the sites they visit.<\/li>\n<li>56% of employees have used a non-work app on a corporate device, and 66% have uploaded corporate data to it.<\/li>\n<li>39% often or always access corporate data from a personal device.<\/li>\n<li>8% admit to watching adult content on their work laptop, and 7% access the dark web.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>This is not about restricting your freedom to visit the sites you want to visit while at home. It\u2019s about reducing the risk of exposing corporate data and systems to possible malware.<\/p>\n<h3><strong>What are the bad guys doing? <\/strong><\/h3>\n<p>Unsurprisingly, there has also been a major uptick in the volume of cyber-threats targeting home users. With a captive audience to aim at, it\u2019s a huge opportunity for cyber-criminals to steal your log-ins and personal data to sell to fraudsters, or even to steal corporate passwords and information for a potentially bigger pay-off. They are helped by the fact that many home workers may be more distracted than they usually would be at the office, especially if they have young children. Your kids may even share the same laptops or PCs as you, potentially visiting risky sites and\/or downloading unapproved apps.<\/p>\n<p>There\u2019s also a chance that, unless you have a corporate machine at home, your personal computing equipment is less secure than the kit you had in the office. Add to that the fact that support from the IT department may be less forthcoming than usual, given that stretched teams are overwhelmed with requests, while themselves struggling to WFH. <a href=\"https:\/\/www.isc2.org\/News-and-Events\/Press-Room\/Posts\/2020\/04\/28\/ISC2-Survey-Finds-Cybersecurity-Professionals-Being-Repurposed-During-COVID-19-Pandemic\">One recent report<\/a> claimed that nearly half (47%) of IT security pros have been taken off some or all of their typical security tasks to support other IT-related jobs.<a href=\"https:\/\/www.isaca.org\/why-isaca\/about-us\/newsroom\/press-releases\/2020\/isaca-survey-cybersecurity-attacks-are-rising-during-covid-19\"> In another,<\/a> only 59% of respondents said they believe their cybersecurity team has the right tools and resources at home to perform their job effectively.<\/p>\n<p>It\u2019s time to step up and take security into your own hands. Stay on the lookout for the following threats.<\/p>\n<table>\n<tbody readability=\"6.5489913544669\">\n<tr readability=\"13.097982708934\">\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Unsecured home routers and smart devices might be hijacked in more sophisticated attacks designed to steal data from corporate networks via the home worker.<\/li>\n<li>Phishing attacks spoofing well-known brands or using <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/coronavirus-used-in-spam-malware-file-names-and-malicious-domains\">COVID-19 information\/news as a lure.<\/a> <a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/protecting-against-cyber-threats-during-covid-19-and-beyond\">Google is blocking 18 million malicious<\/a> pandemic-themed emails every day. The end goal may be to hijack your online consumer accounts (Netflix, banking, email, online shopping) or work accounts. Other phishing emails are designed to install data-stealing malware, ransomware and other threats.<\/li>\n<li><a href=\"https:\/\/www.ic3.gov\/media\/2020\/200401.aspx\">Attackers may target vulnerabilities<\/a> in your home PCs and the apps you\u2019re using (video conferencing etc) to gain remote access.<\/li>\n<li>Business Email Compromise (BEC) attackers may try to leverage the lack of internal communications between remote workers to impersonate senior execs via email, and trick finance team members into wiring corporate funds abroad.<\/li>\n<li>Kids exposing home networks and devices to malware on torrent sites, in mobile apps, on social media, and via phishing attacks potentially imitating remote learning\/video conferencing platforms.<\/li>\n<li>Kids searching for adult\/inappropriate content, and\/or those that are bored and over-share on social media. <a href=\"https:\/\/www.unicef.org\/press-releases\/children-increased-risk-harm-online-during-global-covid-19-pandemic\">Unicef has warned<\/a> that millions of children are at increased of online harm as lockdown means they spend more of their days online.<\/li>\n<li>Mobile apps represent a potential source of malware, especially those found on unofficial app stores. There has also been a <a href=\"https:\/\/www.prnewswire.com\/news-releases\/51-increase-in-the-use-of-online-spying-and-stalking-apps-during-lockdown-301090012.html\">reported 51% rise in stalkerware<\/a> \u2013 covert surveillance apps used by domestic abusers and stalkers to target victims.<\/li>\n<li>The pandemic has led to a surge in <a href=\"https:\/\/www.scmagazineuk.com\/16-million-lost-ecommerce-fraud-during-lockdown\/article\/1687225\">e-commerce fraud<\/a> where consumers are tricked into buying <a href=\"https:\/\/www.scmagazineuk.com\/16-million-lost-ecommerce-fraud-during-lockdown\/article\/1687225\">non-existent products<\/a> or counterfeit goods <a href=\"https:\/\/www.interpol.int\/en\/News-and-Events\/News\/2020\/Global-operation-sees-a-rise-in-fake-medical-products-related-to-COVID-19\">including medical items<\/a>.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>So what\u2019s a remote worker\/concerned parent to do to protect themselves and the family in the midst of the \u201cnew normal?\u201d<\/p>\n<p><em>Read Part 2 in this mini-series, which we\u2019re publishing simultaneously with Part 1, where we share some best practice advice on how to keep your digital lives and work systems safe from online threats during lockdown\u2014and where we provide tools to help you do just that.<\/em><!-- AddThis Advanced Settings above via filter on the_content --><!-- AddThis Advanced Settings below via filter on the_content --><!-- AddThis Button BEGIN --><\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the new normal. We\u2019re all now living in a post-COVID-19 world characterized by uncertainty, mass home working and remote learning. The lines demarcating normal life have shifted abruptly \u2013 perhaps never to return. That\u2019s not the worst that can happen, as we all know, but it does mean we all need to get&#8230;<br \/>\nThe post Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36558,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[8855,2461,390,8856,8544,8857,712,1443,29,1061,3693,307,8858,8859,5987],"class_list":["post-36557","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-antimalware","tag-antivirus","tag-consumer","tag-coronavirus","tag-covid-19","tag-fraud-prevention","tag-identity-theft","tag-lockdown","tag-mobile-security","tag-network-security","tag-password-manager","tag-security","tag-security-software","tag-the-new-normal","tag-virtual-private-network"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-11T12:50:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World\",\"datePublished\":\"2020-08-11T12:50:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\\\/\"},\"wordCount\":1132,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world.jpg\",\"keywords\":[\"Antimalware\",\"antivirus\",\"Consumer\",\"coronavirus\",\"covid-19\",\"fraud prevention.\",\"identity theft\",\"lockdown\",\"Mobile Security\",\"Network Security\",\"password manager\",\"Security\",\"security software\",\"The New Normal\",\"virtual private network\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\\\/\",\"name\":\"Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world.jpg\",\"datePublished\":\"2020-08-11T12:50:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Antimalware\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/antimalware\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/","og_locale":"en_US","og_type":"article","og_title":"Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-08-11T12:50:08+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World","datePublished":"2020-08-11T12:50:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/"},"wordCount":1132,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world.jpg","keywords":["Antimalware","antivirus","Consumer","coronavirus","covid-19","fraud prevention.","identity theft","lockdown","Mobile Security","Network Security","password manager","Security","security software","The New Normal","virtual private network"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/","url":"https:\/\/www.threatshub.org\/blog\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/","name":"Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world.jpg","datePublished":"2020-08-11T12:50:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Antimalware","item":"https:\/\/www.threatshub.org\/blog\/tag\/antimalware\/"},{"@type":"ListItem","position":3,"name":"Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36557"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36557\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36558"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}