{"id":54111,"date":"2023-10-12T19:27:00","date_gmt":"2023-10-12T19:27:00","guid":{"rendered":"http:\/\/9dc94873-88d2-4e65-aab9-eea29f1a9f90"},"modified":"2023-10-12T19:27:00","modified_gmt":"2023-10-12T19:27:00","slug":"6-simple-cybersecurity-rules-you-can-apply-now","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/6-simple-cybersecurity-rules-you-can-apply-now\/","title":{"rendered":"6 simple cybersecurity rules you can apply now"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/562b517ef83ffa20081ee11fd5293cd288e3ebee\/2023\/10\/12\/c6e43bc1-125e-4339-9077-e5e1cc338b2f\/gettyimages-1343280907-1.jpg?auto=webp&amp;precrop=1543,1039,x0,y78&amp;width=768\" alt=\"Woman balancing online data security symbols on finger\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/4ed9d9ddf23dd3ac898d3a745f4982f8eb2b3563\/2023\/10\/12\/c6e43bc1-125e-4339-9077-e5e1cc338b2f\/gettyimages-1343280907-1.jpg?auto=webp&amp;precrop=1543,1039,x0,y78&amp;width=1024\" alt=\"Woman balancing online data security symbols on finger\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/b99c7bafe660345f329e8c5923ab296a4465fb90\/2023\/10\/12\/c6e43bc1-125e-4339-9077-e5e1cc338b2f\/gettyimages-1343280907-1.jpg?auto=webp&amp;precrop=1543,1039,x0,y78&amp;width=1280\" alt=\"Woman balancing online data security symbols on finger\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/b99c7bafe660345f329e8c5923ab296a4465fb90\/2023\/10\/12\/c6e43bc1-125e-4339-9077-e5e1cc338b2f\/gettyimages-1343280907-1.jpg?auto=webp&amp;precrop=1543,1039,x0,y78&amp;width=1280\" alt=\"Woman balancing online data security symbols on finger\" width=\"1280\" height=\"861.9053791315619\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">We Are\/Getty Images<\/span><\/figcaption><\/figure>\n<p>If you&#8217;re an IT pro or a serious PC hobbyist, computers are as logical as Mr. Spock. If you&#8217;re a human being without a technical background, the average Windows error message might as well be written in Klingon.<\/p>\n<p>For that latter audience, computer security often devolves into magical thinking. That&#8217;s unfortunate because the reality is that most of the things you can do to protect yourself online are about simple psychology and basic human behavior.<\/p>\n<div class=\"c-shortcodePinbox c-shortcodePinbox-single g-border-thin-light-top g-outer-spacing-top-medium g-outer-spacing-bottom-medium g-inner-spacing-bottom-small\">\n<h3 class=\"c-sectionHeading\">Special Feature<\/h3>\n<\/p><\/div>\n<p>When a business network is compromised with <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web\/\" rel=\"follow\">ransomware<\/a>, the culprit is rarely an evil genius hacker. The source of the problem is usually far more mundane: Someone was fooled by a clever bit of social engineering.<\/p>\n<p>For anyone who&#8217;s responsible for training others to avoid being online victims, the secret is not to explain how buffer overflows and code injection work.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/best-vpn\/\" rel=\"follow\">The best VPN services right now: Expert tested and reviewed<\/a><\/strong><\/p>\n<p>Instead, help those people focus on how to approach PCs with a healthy dose of skepticism and build up some basic situational awareness. I&#8217;ve reduced the lesson plan to six simple rules, all written in plain language.<\/p>\n<p><!----><\/p>\n<h2>1. Don&#8217;t panic<\/h2>\n<p>A grizzled veteran of the computer security industry once shared a priceless piece of wisdom with me: &#8220;Don&#8217;t just do something. Stand there.&#8221;<\/p>\n<p>Oh, wait. That wasn&#8217;t a security expert, it was the White Rabbit in Disney&#8217;s 1951 animated production of Alice in Wonderland. But it&#8217;s still good advice.<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/scammers-are-using-ai-to-impersonate-your-loved-ones-heres-what-to-watch-for\/\" rel=\"follow\">Scammers are using AI to impersonate your loved ones<\/a><\/strong><\/p>\n<p>The natural human reaction when you see a potential threat is to panic and immediately try to <em>do something<\/em> to solve it. If you get an email alerting you that your credit card&#8217;s about to be charged $480 to renew your non-existent Geek Squad subscription or that your computer is infected with ransomware, you might be tempted to call the toll-free number in that email. That will, of course, connect you to a call center staffed by bad actors who will happily take your credit card details and process some real charges.<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/this-ai-generated-crypto-invoice-scam-almost-got-me-and-im-a-security-pro\/\" rel=\"follow\">This AI-generated crypto invoice scam almost got me, and I&#8217;m a security pro<\/a><\/strong><\/p>\n<p>Scammers thrive by making people panic. Take the time you need to figure out what the real threat is before you do anything.<\/p>\n<h2>2. Don&#8217;t open unknown attachments<\/h2>\n<p>Many potential security threats arrive in the form of email attachments. Sometimes they&#8217;re executable files, but these days they&#8217;re just as likely to be Word documents, PDFs, or HTML files. They might be capable of running exploit code, or they might be simply an attempt to convince you to enter credentials for an email or bank account. <\/p>\n<p>If you receive an attachment from someone you don&#8217;t know, the last thing you should do is open it. Even if the attachment appears to be from someone you know, it pays to be cautious, especially if the message is unexpected. The sender&#8217;s account information might be spoofed, or their account might be compromised.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/best-security-key\/\" rel=\"follow\">The best security keys of 2023<\/a><\/strong><\/p>\n<p>If you suspect an attachment is malicious or if a message contains a link to a suspicious site, consider uploading it to <a href=\"https:\/\/virustotal.com\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">Virus Total<\/a>. That free, trusted site (owned by a subsidiary of Google) scans your submission against 70 antivirus engines and a variety of other security-related services and can alert you if it&#8217;s known to be malicious or it&#8217;s a false positive.<\/p>\n<h2>3. Don&#8217;t click unsolicited links, either<\/h2>\n<p>Social engineering works by exploiting people&#8217;s trust. A scammer who puts even minimal effort into a phishing attempt can do a creditable job of mimicking a legitimate email and crafting links that look close enough to the real thing to fool you.<\/p>\n<p>If you receive an email that makes you think, &#8220;Hmmm, that doesn&#8217;t look right,&#8221; your spidey sense is working. Trust it.<\/p>\n<p>And even if the message doesn&#8217;t have any obvious red flags, it&#8217;s still OK to be suspicious, especially if you&#8217;re being asked to click a link to do something you didn&#8217;t ask for. When in doubt, don&#8217;t click that link; instead, use a bookmark you&#8217;ve saved for the site in question or type the URL directly to do whatever you need to do.<\/p>\n<h2>4. You don&#8217;t need to pay for security software<\/h2>\n<p>The security software industry wants you to be afraid. As part of that effort, they try their best to convince you that the core protections built into your PC, Mac, or mobile device cannot possibly be as good as the product they sell.<\/p>\n<p>That might have been true two decades ago, but it&#8217;s certainly not true today. Most third-party security software developed for use by consumers offers only marginal extra protection, at best. That&#8217;s especially true for buzzy features like <a href=\"https:\/\/edbott.substack.com\/p\/the-security-software-industry-wants\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">&#8220;Dark Web monitoring.&#8221;<\/a><\/p>\n<p><strong>Also:<\/strong> <strong><a href=\"https:\/\/www.zdnet.com\/article\/what-is-the-dark-web-everything-you-need-to-know-before-you-access-it\/\" rel=\"follow\">What is the dark web? Everything you need to know before you access it<\/a><\/strong><\/p>\n<p>If you&#8217;re an enterprise network administrator, you can probably benefit from software and services that give you greater visibility into what your users are doing as well as what&#8217;s happening on the periphery of your network. For your personal PC, save your money.<\/p>\n<h2>5. Don&#8217;t mess with a perfectly good PC (or Mac)<\/h2>\n<p>When it comes to keeping your computer secure, I have a slightly different take on the classic management advice: &#8220;If it ain&#8217;t broke, don&#8217;t break it.&#8221;<\/p>\n<p>Drive-by exploits might get all the headlines, but the sad fact is that most malware arrives on PCs because someone willingly, even eagerly, chose to install it.&nbsp;<\/p>\n<p>Maybe they downloaded a cracked program from a sketchy download site, or maybe they followed a sponsored link from a search engine and grabbed a program that included a bundle of adware or even malware in addition to the app they were looking for.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/obsessed-with-privacy-keep-tails-on-a-usb-drive-and-secure-most-any-computer\/\" rel=\"follow\">Obsessed with privacy? Keep Tails on a USB drive and secure most any computer<\/a><\/strong><\/p>\n<p>The obvious solution? Don&#8217;t install random apps.&nbsp;<\/p>\n<p>If you need to check out a program, and you have Windows 11 Pro or Enterprise, try running it in the Windows Sandbox. If you&#8217;ve never heard of this feature, here&#8217;s <a href=\"https:\/\/www.zdnet.com\/article\/six-things-you-should-do-right-away-with-your-new-windows-11-pc\/\" rel=\"follow\">how I described it when Windows 11 was released<\/a>:<\/p>\n<blockquote readability=\"12\">\n<p>It allows you to instantly spin up a secure virtual machine without any complex setup. The VM is completely isolated from your main system, so you can visit a suspicious website or test an unknown app without risk. When you&#8217;re done, close the sandbox, and it vanishes completely, removing all traces of your experiment.<\/p>\n<\/blockquote>\n<p>It&#8217;s a killer feature, and one you should know about.<\/p>\n<h2>6. Use a password manager<\/h2>\n<p>I&#8217;ve been pounding the table about <a href=\"https:\/\/www.zdnet.com\/article\/best-password-manager\/\" rel=\"follow\">password managers<\/a> for years, so I won&#8217;t repeat those arguments here. (If you need a refresher, read this: <a href=\"https:\/\/www.zdnet.com\/article\/forgot-password-five-reasons-why-you-need-a-password-manager\/\" rel=\"follow\">&#8220;Forgot password? Five reasons why you need a password manager.&#8221;<\/a>)<\/p>\n<p>But the facts are indisputable: Human beings are terrible at generating random passwords, and it&#8217;s literally impossible to remember the kinds of strong, unique credentials that will keep you secure.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/best-password-manager\/\" rel=\"follow\">The best password managers<\/a><\/strong><\/p>\n<p>In fact, using a password manager makes it easier to navigate the modern internet <em>and <\/em>keeps you safer. If you&#8217;ve been putting off this task because you think it&#8217;s too difficult, try <a href=\"https:\/\/edbott.substack.com\/p\/get-your-passwords-organized-in-30\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">my three-step program<\/a>, which you can implement in 30 minutes or less.<\/p>\n<p>Oh, and while you&#8217;re at it, <a href=\"https:\/\/www.zdnet.com\/article\/protect-yourself-how-to-choose-the-right-two-factor-authenticator-app\/\" rel=\"follow\">turn on two-factor authentication<\/a>, too.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/6-simple-cybersecurity-rules-you-can-apply-now\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How do you train others to avoid being victims of online crime? It&#8217;s all about human behavior.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-54111","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>6 simple cybersecurity rules you can apply now 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/6-simple-cybersecurity-rules-you-can-apply-now\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 simple cybersecurity rules you can apply now 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/6-simple-cybersecurity-rules-you-can-apply-now\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-12T19:27:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/b99c7bafe660345f329e8c5923ab296a4465fb90\/2023\/10\/12\/c6e43bc1-125e-4339-9077-e5e1cc338b2f\/gettyimages-1343280907-1.jpg?auto=webp&amp;precrop=1543,1039,x0,y78&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/6-simple-cybersecurity-rules-you-can-apply-now\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/6-simple-cybersecurity-rules-you-can-apply-now\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"6 simple cybersecurity rules you can apply now\",\"datePublished\":\"2023-10-12T19:27:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/6-simple-cybersecurity-rules-you-can-apply-now\\\/\"},\"wordCount\":1261,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/6-simple-cybersecurity-rules-you-can-apply-now\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/b99c7bafe660345f329e8c5923ab296a4465fb90\\\/2023\\\/10\\\/12\\\/c6e43bc1-125e-4339-9077-e5e1cc338b2f\\\/gettyimages-1343280907-1.jpg?auto=webp&amp;precrop=1543,1039,x0,y78&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/6-simple-cybersecurity-rules-you-can-apply-now\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/6-simple-cybersecurity-rules-you-can-apply-now\\\/\",\"name\":\"6 simple cybersecurity rules you can apply now 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/6-simple-cybersecurity-rules-you-can-apply-now\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/6-simple-cybersecurity-rules-you-can-apply-now\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/b99c7bafe660345f329e8c5923ab296a4465fb90\\\/2023\\\/10\\\/12\\\/c6e43bc1-125e-4339-9077-e5e1cc338b2f\\\/gettyimages-1343280907-1.jpg?auto=webp&amp;precrop=1543,1039,x0,y78&amp;width=1280\",\"datePublished\":\"2023-10-12T19:27:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/6-simple-cybersecurity-rules-you-can-apply-now\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/6-simple-cybersecurity-rules-you-can-apply-now\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/6-simple-cybersecurity-rules-you-can-apply-now\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/b99c7bafe660345f329e8c5923ab296a4465fb90\\\/2023\\\/10\\\/12\\\/c6e43bc1-125e-4339-9077-e5e1cc338b2f\\\/gettyimages-1343280907-1.jpg?auto=webp&amp;precrop=1543,1039,x0,y78&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/b99c7bafe660345f329e8c5923ab296a4465fb90\\\/2023\\\/10\\\/12\\\/c6e43bc1-125e-4339-9077-e5e1cc338b2f\\\/gettyimages-1343280907-1.jpg?auto=webp&amp;precrop=1543,1039,x0,y78&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/6-simple-cybersecurity-rules-you-can-apply-now\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 simple cybersecurity rules you can apply now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 simple cybersecurity rules you can apply now 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/6-simple-cybersecurity-rules-you-can-apply-now\/","og_locale":"en_US","og_type":"article","og_title":"6 simple cybersecurity rules you can apply now 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/6-simple-cybersecurity-rules-you-can-apply-now\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-10-12T19:27:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/b99c7bafe660345f329e8c5923ab296a4465fb90\/2023\/10\/12\/c6e43bc1-125e-4339-9077-e5e1cc338b2f\/gettyimages-1343280907-1.jpg?auto=webp&amp;precrop=1543,1039,x0,y78&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/6-simple-cybersecurity-rules-you-can-apply-now\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/6-simple-cybersecurity-rules-you-can-apply-now\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"6 simple cybersecurity rules you can apply now","datePublished":"2023-10-12T19:27:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/6-simple-cybersecurity-rules-you-can-apply-now\/"},"wordCount":1261,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/6-simple-cybersecurity-rules-you-can-apply-now\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/b99c7bafe660345f329e8c5923ab296a4465fb90\/2023\/10\/12\/c6e43bc1-125e-4339-9077-e5e1cc338b2f\/gettyimages-1343280907-1.jpg?auto=webp&amp;precrop=1543,1039,x0,y78&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/6-simple-cybersecurity-rules-you-can-apply-now\/","url":"https:\/\/www.threatshub.org\/blog\/6-simple-cybersecurity-rules-you-can-apply-now\/","name":"6 simple cybersecurity rules you can apply now 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/6-simple-cybersecurity-rules-you-can-apply-now\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/6-simple-cybersecurity-rules-you-can-apply-now\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/b99c7bafe660345f329e8c5923ab296a4465fb90\/2023\/10\/12\/c6e43bc1-125e-4339-9077-e5e1cc338b2f\/gettyimages-1343280907-1.jpg?auto=webp&amp;precrop=1543,1039,x0,y78&amp;width=1280","datePublished":"2023-10-12T19:27:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/6-simple-cybersecurity-rules-you-can-apply-now\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/6-simple-cybersecurity-rules-you-can-apply-now\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/6-simple-cybersecurity-rules-you-can-apply-now\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/b99c7bafe660345f329e8c5923ab296a4465fb90\/2023\/10\/12\/c6e43bc1-125e-4339-9077-e5e1cc338b2f\/gettyimages-1343280907-1.jpg?auto=webp&amp;precrop=1543,1039,x0,y78&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/b99c7bafe660345f329e8c5923ab296a4465fb90\/2023\/10\/12\/c6e43bc1-125e-4339-9077-e5e1cc338b2f\/gettyimages-1343280907-1.jpg?auto=webp&amp;precrop=1543,1039,x0,y78&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/6-simple-cybersecurity-rules-you-can-apply-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"6 simple cybersecurity rules you can apply now"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54111"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54111\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}