{"id":2878,"date":"2022-07-20T11:00:31","date_gmt":"2022-07-20T08:00:31","guid":{"rendered":"https:\/\/www.virtono.com\/community\/?p=2878"},"modified":"2022-07-20T11:00:37","modified_gmt":"2022-07-20T08:00:37","slug":"what-is-phishing-dont-bite-the-bait%ef%bf%bc","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/what-is-phishing-dont-bite-the-bait%ef%bf%bc\/","title":{"rendered":"What is Phishing, don\u2019t bite the bait!\ufffc"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"422\" data-attachment-id=\"2879\" data-permalink=\"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/what-is-phishing-dont-bite-the-bait%ef%bf%bc\/attachment\/dont-bite-the-bait\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/dont-bite-the-bait.png?fit=2240%2C1260&amp;ssl=1\" data-orig-size=\"2240,1260\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"dont-bite-the-bait\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/dont-bite-the-bait.png?fit=750%2C422&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/dont-bite-the-bait.png?resize=750%2C422&#038;ssl=1\" alt=\"Phishing illustrations.\" class=\"wp-image-2879\" srcset=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/dont-bite-the-bait.png?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/dont-bite-the-bait.png?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/dont-bite-the-bait.png?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/dont-bite-the-bait.png?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/dont-bite-the-bait.png?resize=2048%2C1152&amp;ssl=1 2048w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure>\n\n\n\n<p>What do you imagine a phishing attack looks like? If your answer has anything to do with a <strong>fish<\/strong> or <strong>fishing<\/strong> <strong>pole<\/strong> I have bad news for you\u2026<\/p>\n\n\n\n<p>In this instance, we\u2019re spelling \u201cfishing\u201d with a <em>PH<\/em>, and this method is one of the most common online scams around.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_73 counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/what-is-phishing-dont-bite-the-bait%ef%bf%bc\/#So_what_is_Phishing\" title=\"So what is Phishing?\">So what is Phishing?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/what-is-phishing-dont-bite-the-bait%ef%bf%bc\/#What_does_one_of_these_Phishing_attempts_looks_like\" title=\"What does one of these Phishing attempts looks like?\">What does one of these Phishing attempts looks like?<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"So_what_is_Phishing\"><\/span>So what is Phishing?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Well\u2026 let\u2019s say you receive an <strong>email from your bank<\/strong>, they\u2019re asking you to <strong>log in to your account<\/strong> and <strong>update your details<\/strong>. They\u2019ve even provided a handy link that will take you straight to the relevant page. Amazing!<\/p>\n\n\n\n<p>Not really\u2026 that email isn\u2019t from your bank it\u2019s from ME.<\/p>\n\n\n\n<p>And I\u2019ve set up a very convincing website that looks just like your bank site, so when you click my link and follow the \u201cbank\u2019s\u201d instructions, what you are actually doing is giving me all your login information, and whatever personal or banking data I\u2019ve asked for. Thanks!<\/p>\n\n\n\n<p>These kinds of emails have become commonplace in recent years, to the point that they\u2019re a bit of a joke. Have you ever laughed at the \u201cNigerian Prince\u201d that wants to send you a bit of his fortune? That\u2019s exactly my point.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u201cIt\u2019s so obviously a scam! How does anyone fall for it?\u201d <\/p><cite>You might have thought.<\/cite><\/blockquote>\n\n\n\n<p><strong>Firstly,<\/strong> if it didn\u2019t work at least some of the time, no one would do it. <\/p>\n\n\n\n<p><strong>Secondly,<\/strong> and more importantly, by making you believe that all phishing emails are that obvious, you have been lured into a false sense of security, meaning you\u2019re much less likely to spot a better-executed attempt.<\/p>\n\n\n\n<p>In a 2015 study, <a href=\"https:\/\/www.businesswire.com\/news\/home\/20150512005245\/en\/97-Of-People-Globally-Unable-to-Correctly-Identify-Phishing-Emails\" target=\"_blank\" rel=\"noopener\">97% of people were unable to identify sophisticated phishing emails<\/a>. How many of those people thought they were too smart to be fooled? Part of the problem is that many people don\u2019t realize how personalized phishing can be.<\/p>\n\n\n\n<p>Targeted attacks are called \u201cspear phishing\u201d and they\u2019re geared towards YOU. Usually, these \u201cphishers\u201d will have some prior information on you, taken from social media or online public records. They use this to tailor an email that seems too specific to be a generic scam, and so is far more believable and likely to yield results, and scammers know this.<\/p>\n\n\n\n<p>In a review of over half a million mailboxes, it was found that <a href=\"https:\/\/www.duocircle.com\/content\/spear-phishing-protection\/how-common-is-spear-phishing\" target=\"_blank\" rel=\"noopener\">77% of spear phishing attacks targeted ten people or less, and more alarmingly 33% targeted just one.<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_does_one_of_these_Phishing_attempts_looks_like\"><\/span><strong>What does one of these Phishing attempts looks like?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Well, say your colleague has gone on holiday to Mexico, <strong>lucky guy<\/strong>. You know he\u2019s in Mexico because you saw him check into the airport on Facebook. A few days later, he sends you an email, he\u2019s really sorry to reach out that his phone, wallet, and passport had been stolen, but fortunately, he remembered your email address. Could you possibly wire him some money, using this link?<\/p>\n\n\n\n<p>Obviously, he\u2019ll pay you back, he\u2019s just in a bit of a tight spot right now and needs to pay the consulate for his new passport. None of this is particularly far-fetched or difficult to believe, but all the same, it\u2019s not true. This is a spear phishing attempt.<\/p>\n\n\n\n<p>Your colleague\u2019s Facebook privacy settings are wide open, so his airport check-in was visible to the whole world, including our scammer, who only needed five minutes to google your colleague\u2019s workplace to find you and your email address, and then fire off a compelling sob-story.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"422\" data-attachment-id=\"2880\" data-permalink=\"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/what-is-phishing-dont-bite-the-bait%ef%bf%bc\/attachment\/dont-bite-the-bait-1\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/dont-bite-the-bait-1.png?fit=2240%2C1260&amp;ssl=1\" data-orig-size=\"2240,1260\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"dont-bite-the-bait-1\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/dont-bite-the-bait-1.png?fit=750%2C422&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/dont-bite-the-bait-1.png?resize=750%2C422&#038;ssl=1\" alt=\"Phishing attempt Mexico vacation.\" class=\"wp-image-2880\" srcset=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/dont-bite-the-bait-1.png?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/dont-bite-the-bait-1.png?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/dont-bite-the-bait-1.png?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/dont-bite-the-bait-1.png?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/dont-bite-the-bait-1.png?resize=2048%2C1152&amp;ssl=1 2048w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure>\n\n\n\n<p>But often time, it doesn\u2019t even need to be that specific, how many people are going to question a Google Calendar meeting invitation from their boss? Just click here to RSVP, sign into \u201cGoogle\u201d and as easy as that you\u2019ve given away your login details.<\/p>\n\n\n\n<p>So, aside from ignoring emergency emails from your friends, and deleting anything your boss sends you without opening it, what can you do to stay safe?<\/p>\n\n\n\n<p>Firstly, when you get an email, check, I mean really check that it is what it says it is. Secondly, never click any links provided. If someone wants you to log in, go to their website independently and log in from there. If you\u2019re still unsure, find a legitimate number and call the company involved to ask about the email.<\/p>\n\n\n\n<p><strong>Customer security is a big deal, and they won\u2019t be fazed by being asked questions like this.<\/strong><\/p>\n\n\n\n<p><strong>Thirdly,<\/strong> if you absolutely have to follow a link, triple-check the URL of the website that you\u2019ve been sent to, and make sure it matches up with where you log in normally. Just seeing a padlock is not enough. There are all kinds of tricks to fool even those with a deep understanding of URL schemas, so you need to exercise extreme caution.<\/p>\n\n\n\n<p>Phishing attacks are called that for a reason, a lot of the time those behind them are just throwing out a line and seeing who bites, but by being aware of how these kinds of scams operate and exercising vigilance, you\u2019re making it far less likely that you\u2019ll be the one to take the bait.<\/p>\n\n\n\n<p><strong>If you found this interesting share it with your friends!<\/strong><\/p>\n\n\n\n<p>Follow us on <a href=\"https:\/\/www.facebook.com\/virtononetworks\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/virtononetworks\/\" target=\"_blank\" rel=\"noopener\">Instagram<\/a>, <a href=\"https:\/\/twitter.com\/Virtono\" target=\"_blank\" rel=\"noopener\">Twitter<\/a> &amp; <a href=\"https:\/\/www.tiktok.com\/@virtono1\" target=\"_blank\" rel=\"noopener\">TikTok<\/a>.<\/p>\n\n\n\n<p>Check other interesting articles in our <a href=\"https:\/\/virtono.com\/community\" target=\"_blank\" rel=\"noopener\">community<\/a>, such as <a href=\"https:\/\/www.virtono.com\/community\/news-announcements\/affiliate-marketing\/\">How to make money with affiliate marketing?<\/a> &amp; <a href=\"https:\/\/www.virtono.com\/community\/news-announcements\/instagram-marketing-new-algorithm\/\">Instagram&#8217;s New Algorithm explained.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What do you imagine a phishing attack looks like? If your answer has anything to do with a fish or fishing pole I have bad news for you\u2026 In this instance, we\u2019re spelling \u201cfishing\u201d with a PH, and this method is one of the most common online scams around. So<\/p>\n","protected":false},"author":6,"featured_media":2879,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"What do you imagine a phishing attack looks like? \nIf your answer has anything to do with a fish or fishing pole I have bad news for you\u2026\n\n#hacking #hackers #hack #phishing #malware #coding","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[25,1],"tags":[180,179],"class_list":["post-2878","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-and-technology-news","category-news-announcements","tag-info","tag-phishing"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/dont-bite-the-bait.png?fit=2240%2C1260&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-Kq","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":1060,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/freemilk-new-phishing-campaign-to-hijack-email-conversations\/","url_meta":{"origin":2878,"position":0},"title":"FreeMilk : New phishing campaign to hijack email conversations","author":"Shreyash Sharma","date":"October 8, 2017","format":false,"excerpt":"A new threat has been identified by\u00a0\u00a0Palo Alto Networks security researchers, it is a\u00a0phishing campaign used by hackers to intercept ongoing email conversations between individuals and hijack them to deploy malware.The focus on even now believes they are in contact with the particular person they had been at first messaging,\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/FreeMilk_1.png?fit=571%2C879&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/FreeMilk_1.png?fit=571%2C879&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/FreeMilk_1.png?fit=571%2C879&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":784,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/targeted-attacks\/","url_meta":{"origin":2878,"position":1},"title":"Targeted Attacks.","author":"Daniel Draga","date":"December 2, 2016","format":false,"excerpt":"More Data than Sense. As we look at the responses, most of these detection and correction efforts combine human expertise with tools and data. All efforts can be improved through access to and better interpretation of relevant data, policy-based workflows, and appropriate and facilitated automation. So what\u2019s holding these valiant\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1040,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/locky-ransomwares-authors-big-fans-of-game-of-thrones\/","url_meta":{"origin":2878,"position":2},"title":"Locky Ransomware&#8217;s Authors : Big Fans of Game Of Thrones","author":"Daniel Draga","date":"September 26, 2017","format":false,"excerpt":"One of the most viewed T.V shows of our time\u00a0Game Of Thrones has found its viewers in all forms of diversities the most recent ones are criminal-type more particularly the Authors of\u00a0Locky Ransomware. Researchers at PhishMe have found the names of various\u00a0Game Of Thrones characters and other references in the\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/09\/WhatsApp-Image-2017-09-25-at-07.12.16.jpeg?fit=768%2C254&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/09\/WhatsApp-Image-2017-09-25-at-07.12.16.jpeg?fit=768%2C254&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/09\/WhatsApp-Image-2017-09-25-at-07.12.16.jpeg?fit=768%2C254&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/09\/WhatsApp-Image-2017-09-25-at-07.12.16.jpeg?fit=768%2C254&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":760,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/3-major-challenges-in-cloud-security\/","url_meta":{"origin":2878,"position":3},"title":"3 major challenges in Cloud security","author":"Daniel Draga","date":"November 17, 2016","format":false,"excerpt":"Is your institution planning to leverage cloud computing and mobile computing in order to improve service agility, increase increase student and research success and lower costs of ownership, and lower capital expenses? If so, you are no doubt aware that your institution is also increasing its attack surface. Cloud-based technologies,\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2116,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/reasons-your-business-chooses-or-should-choose-open-source-tools-for-remote-employees\/","url_meta":{"origin":2878,"position":4},"title":"Reasons your business chooses or should choose open-source tools for remote employees","author":"Shreyash Sharma","date":"December 13, 2020","format":false,"excerpt":"No one expected for Work from Home conditions to be so drastic and necessary when Covid first started spreading. But with the benefit of hindsight we can surely say that it is high time for businesses to change the way they operate work flow. The growth of accessible, affordable, linked\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/12\/1586366506.png?fit=624%2C351&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/12\/1586366506.png?fit=624%2C351&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/12\/1586366506.png?fit=624%2C351&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":744,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/ways-to-guard-a-vanishing-network-perimeter\/","url_meta":{"origin":2878,"position":5},"title":"WAYS TO GUARD A VANISHING NETWORK PERIMETER","author":"Daniel Draga","date":"November 8, 2016","format":false,"excerpt":"WITH DISTRIBUTED WORKFORCES and mobile technologies, the network perimeter has evolved beyond the physical limits of most corporate campuses. The days when the perimeter was an actual boundary are a fond memory. Back then, firewalls did a decent job of protecting the network from outside threats, and intrusion prevention tools\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/itsecurity.jpg?fit=1200%2C900&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/itsecurity.jpg?fit=1200%2C900&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/itsecurity.jpg?fit=1200%2C900&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/itsecurity.jpg?fit=1200%2C900&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/itsecurity.jpg?fit=1200%2C900&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/2878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=2878"}],"version-history":[{"count":1,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/2878\/revisions"}],"predecessor-version":[{"id":2881,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/2878\/revisions\/2881"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/2879"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=2878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=2878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=2878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}