{"id":116,"date":"2025-06-11T12:12:01","date_gmt":"2025-06-11T06:42:01","guid":{"rendered":"https:\/\/dgsthal.in\/blogs\/?p=116"},"modified":"2025-06-11T12:12:01","modified_gmt":"2025-06-11T06:42:01","slug":"cybersecurity-fundamentals-protecting-yourself-online","status":"publish","type":"post","link":"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/","title":{"rendered":"Cybersecurity Fundamentals: Protecting Yourself Online"},"content":{"rendered":"\n<p>In today&#8217;s digital world, we live much of our lives online \u2013 from connecting with friends and family to managing our finances and shopping. While the internet offers incredible convenience and opportunities, it also comes with risks. Cyber threats are real, and protecting yourself online is no longer optional; it&#8217;s essential cyber hygiene for everyone.<\/p>\n\n\n\n<p>But don&#8217;t worry! You don&#8217;t need to be a tech wizard to stay safe. By understanding a few&nbsp;<strong>cybersecurity fundamentals<\/strong>&nbsp;and adopting some simple habits, you can significantly reduce your risk and enjoy your online experience with more confidence. This guide will walk you through the basics of&nbsp;<strong>internet security for beginners<\/strong>&nbsp;and provide&nbsp;<strong>online safety tips<\/strong>&nbsp;you can start using right away.<\/p>\n\n\n\n<p>Let&#8217;s dive into the core principles of&nbsp;<strong>protecting yourself online<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Foundation: Strong Passwords Are Your First Line of Defense<\/h2>\n\n\n\n<p>Think of your password as the key to your digital home. If it&#8217;s weak or easily guessable, you&#8217;re leaving the front door wide open for cybercriminals.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li><strong>What makes a password strong?<\/strong>\u00a0It should be long (at least 12 characters, but longer is better!), include a mix of uppercase and lowercase letters, numbers, and symbols. Avoid using personal information like your name, birthdate, or pet&#8217;s name.<\/li>\n\n\n\n<li><strong>Why shouldn&#8217;t I reuse passwords?<\/strong>\u00a0If a hacker gets hold of your password for one site (and data breaches happen!), they will immediately try that same password on your other accounts (email, banking, social media, etc.). Reusing passwords is like using the same key for your house, car, and office \u2013 a single compromise unlocks everything.<\/li>\n\n\n\n<li><strong>How can I remember complex passwords?<\/strong>\u00a0This is where password managers come in! A password manager is a secure application that stores all your login information in an encrypted vault, requiring you to only remember one master password. It can also generate strong, unique passwords for all your accounts. Using a password manager is one of the most impactful steps you can take for\u00a0<strong>basic cyber hygiene<\/strong>.<\/li>\n<\/ul>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">Spotting the Wolf in Sheep&#8217;s Clothing: Understanding Phishing<\/h2>\n\n\n\n<p>Phishing is a common type of cyberattack where criminals try to trick you into revealing sensitive information (like passwords, credit card numbers, or personal data) by pretending to be a trustworthy entity, such as a bank, a popular website, or even someone you know.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>How does phishing work?<\/strong>\u00a0It often starts with an email, text message, or phone call that looks legitimate. The message might create a sense of urgency (&#8220;Your account has been suspended!&#8221;) or offer something too good to be true (&#8220;You&#8217;ve won a prize!&#8221;). They usually ask you to click a link or download an attachment.<\/li>\n\n\n\n<li><strong>What are the warning signs?<\/strong><\/li>\n\n\n\n<li><strong>Suspicious Sender Address:<\/strong>\u00a0The email address doesn&#8217;t quite match the legitimate company&#8217;s domain.<\/li>\n\n\n\n<li><strong>Generic Greetings:<\/strong>\u00a0Instead of using your name, they might say &#8220;Dear Customer.&#8221;<\/li>\n\n\n\n<li><strong>Poor Grammar and Spelling:<\/strong>\u00a0Legitimate companies usually proofread their communications.<\/li>\n\n\n\n<li><strong>Urgent or Threatening Language:<\/strong>\u00a0Designed to make you act without thinking.<\/li>\n\n\n\n<li><strong>Links that Don&#8217;t Match:<\/strong>\u00a0Hover your mouse over a link (DON&#8217;T CLICK!) to see the actual URL. Does it look legitimate?<\/li>\n\n\n\n<li><strong>Requests for Personal Information:<\/strong>\u00a0Be wary of unsolicited requests for passwords or financial details.<\/li>\n<\/ol>\n\n\n\n<p>If something feels off, trust your gut. Don&#8217;t click links or open attachments. Go directly to the official website or contact the company through a verified phone number. Learning to identify these signs is crucial for&nbsp;<strong>protecting yourself online<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Adding an Extra Lock: Two-Factor Authentication (2FA)<\/h2>\n\n\n\n<p>Even with a strong password, there&#8217;s still a small chance it could be compromised. Two-Factor Authentication (also known as 2-Step Verification or Multi-Factor Authentication) adds an extra layer of security.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li><strong>How does 2FA work?<\/strong>\u00a0After entering your password, the service requires a second piece of verification. This is often a code sent to your phone via SMS, generated by an authenticator app (like Google Authenticator or Authy), or sometimes a physical security key.<\/li>\n\n\n\n<li><strong>Why is it important?<\/strong>\u00a0Even if a hacker gets your password, they can&#8217;t access your account without that second factor, which they likely don&#8217;t have.<\/li>\n\n\n\n<li><strong>Where should I use 2FA?<\/strong>\u00a0Enable 2FA on every service that offers it, especially for critical accounts like email, banking, social media, and cloud storage. It&#8217;s a simple step that significantly boosts your\u00a0<strong>internet security for beginners<\/strong>.<\/li>\n<\/ul>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">Browsing Safely: Navigating the Web Securely<\/h2>\n\n\n\n<p>Your web browser is your window to the internet, and keeping it secure is vital.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Look for HTTPS:<\/strong>\u00a0Always check that a website&#8217;s address starts with &#8220;https:\/\/&#8221; and shows a padlock icon in the address bar, especially on pages where you log in or enter sensitive information. The &#8216;S&#8217; stands for &#8216;secure&#8217; and means the connection is encrypted, making it harder for others to intercept your data.<\/li>\n\n\n\n<li><strong>Be Cautious with Links:<\/strong>\u00a0As mentioned with phishing, be careful clicking on links in emails or on unfamiliar websites.<\/li>\n\n\n\n<li><strong>Think Before You Download:<\/strong>\u00a0Only download software or files from trusted sources. Be wary of pop-ups telling you your computer is infected and you need to download something immediately \u2013 these are often scams.<\/li>\n\n\n\n<li><strong>Use a Reputable Antivirus\/Antimalware:<\/strong>\u00a0Keep security software installed and updated on your computer and smartphone to detect and remove threats. This is a fundamental part of\u00a0<strong>basic cyber hygiene<\/strong>.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Keeping Your Software Updated: Patching the Holes<\/h2>\n\n\n\n<p>Software developers constantly find and fix security vulnerabilities (weaknesses) in their programs. These fixes are delivered through updates.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Why update?<\/strong>\u00a0Ignoring updates leaves those vulnerabilities open, creating easy entry points for hackers to install malware or steal data.<\/li>\n\n\n\n<li><strong>What should I update?<\/strong>\u00a0Keep your operating system (Windows, macOS, iOS, Android), web browsers, antivirus software, and all other applications updated.<\/li>\n\n\n\n<li><strong>How often?<\/strong>\u00a0Enable automatic updates whenever possible. If not, make a habit of checking for and installing updates regularly. Keeping your software current is a simple yet powerful\u00a0<strong>cybersecurity fundamental<\/strong>.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion: Your Role in Online Safety<\/h2>\n\n\n\n<p><strong>Protecting yourself online<\/strong>&nbsp;is an ongoing process, not a one-time task. Cyber threats evolve, so staying informed is important. By practicing&nbsp;<strong>basic cyber hygiene<\/strong>&nbsp;\u2013 using strong, unique passwords (ideally with a password manager), enabling 2FA, being vigilant against phishing, browsing safely, and keeping your software updated \u2013 you build a strong defense against most common&nbsp;<strong>cyber threats<\/strong>.<\/p>\n\n\n\n<p>Remember, you are the most important layer of security. Be mindful of the information you share, the links you click, and the sources you trust. Taking these steps is empowering and essential for navigating the digital world safely and confidently.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s digital world, we live much of our lives online \u2013 from connecting with friends and family to managing our finances and shopping. While the internet offers incredible convenience&hellip;<\/p>\n","protected":false},"author":1,"featured_media":117,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,2],"tags":[17,16,6,18,11],"class_list":["post-116","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-technologies","tag-beginners","tag-cyber-security","tag-dgsthal","tag-fundamentals","tag-payal-ganguly"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Fundamentals: Protecting Yourself Online - DGsthal<\/title>\n<meta name=\"description\" content=\"Protect yourself online! This beginner&#039;s guide covers cybersecurity fundamentals, including strong passwords, phishing awareness, and 2FA for better internet security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Fundamentals: Protecting Yourself Online - DGsthal\" \/>\n<meta property=\"og:description\" content=\"Protect yourself online! This beginner&#039;s guide covers cybersecurity fundamentals, including strong passwords, phishing awareness, and 2FA for better internet security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/\" \/>\n<meta property=\"og:site_name\" content=\"DGsthal\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-11T06:42:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dgsthal.in\/blogs\/wp-content\/uploads\/2025\/06\/Online-Cyber-Security-Essentials.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Payal Ganguly\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Payal Ganguly\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/\"},\"author\":{\"name\":\"Payal Ganguly\",\"@id\":\"https:\/\/dgsthal.in\/blogs\/#\/schema\/person\/2a5781070f1f8fc37d1d41e043e0c36d\"},\"headline\":\"Cybersecurity Fundamentals: Protecting Yourself Online\",\"datePublished\":\"2025-06-11T06:42:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/\"},\"wordCount\":1088,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/dgsthal.in\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dgsthal.in\/blogs\/wp-content\/uploads\/2025\/06\/Online-Cyber-Security-Essentials.jpg\",\"keywords\":[\"Beginners\",\"Cyber security\",\"Dgsthal\",\"Fundamentals\",\"Payal Ganguly\"],\"articleSection\":[\"Blog\",\"Technologies\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/\",\"url\":\"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/\",\"name\":\"Cybersecurity Fundamentals: Protecting Yourself Online - DGsthal\",\"isPartOf\":{\"@id\":\"https:\/\/dgsthal.in\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dgsthal.in\/blogs\/wp-content\/uploads\/2025\/06\/Online-Cyber-Security-Essentials.jpg\",\"datePublished\":\"2025-06-11T06:42:01+00:00\",\"description\":\"Protect yourself online! This beginner's guide covers cybersecurity fundamentals, including strong passwords, phishing awareness, and 2FA for better internet security.\",\"breadcrumb\":{\"@id\":\"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/#primaryimage\",\"url\":\"https:\/\/dgsthal.in\/blogs\/wp-content\/uploads\/2025\/06\/Online-Cyber-Security-Essentials.jpg\",\"contentUrl\":\"https:\/\/dgsthal.in\/blogs\/wp-content\/uploads\/2025\/06\/Online-Cyber-Security-Essentials.jpg\",\"width\":1536,\"height\":1024,\"caption\":\"Cybersecurity Fundamentals\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dgsthal.in\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Fundamentals: Protecting Yourself Online\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dgsthal.in\/blogs\/#website\",\"url\":\"https:\/\/dgsthal.in\/blogs\/\",\"name\":\"DGsthal\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\/\/dgsthal.in\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dgsthal.in\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dgsthal.in\/blogs\/#organization\",\"name\":\"DGsthal\",\"url\":\"https:\/\/dgsthal.in\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dgsthal.in\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dgsthal.in\/blogs\/wp-content\/uploads\/2025\/03\/cropped-DGsthal-Logo.png\",\"contentUrl\":\"https:\/\/dgsthal.in\/blogs\/wp-content\/uploads\/2025\/03\/cropped-DGsthal-Logo.png\",\"width\":1920,\"height\":629,\"caption\":\"DGsthal\"},\"image\":{\"@id\":\"https:\/\/dgsthal.in\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/dgsthal\/\",\"https:\/\/www.instagram.com\/dgsthal_it_solutions\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dgsthal.in\/blogs\/#\/schema\/person\/2a5781070f1f8fc37d1d41e043e0c36d\",\"name\":\"Payal Ganguly\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dgsthal.in\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d381aab0a2817410af89dbfd39bac693?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d381aab0a2817410af89dbfd39bac693?s=96&d=mm&r=g\",\"caption\":\"Payal Ganguly\"},\"sameAs\":[\"https:\/\/dgsthal.in\/blogs\",\"https:\/\/www.linkedin.com\/in\/payal-ganguly-447436285\/\"],\"url\":\"https:\/\/dgsthal.in\/blogs\/author\/payalganguly\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Fundamentals: Protecting Yourself Online - DGsthal","description":"Protect yourself online! This beginner's guide covers cybersecurity fundamentals, including strong passwords, phishing awareness, and 2FA for better internet security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Fundamentals: Protecting Yourself Online - DGsthal","og_description":"Protect yourself online! This beginner's guide covers cybersecurity fundamentals, including strong passwords, phishing awareness, and 2FA for better internet security.","og_url":"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/","og_site_name":"DGsthal","article_published_time":"2025-06-11T06:42:01+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/dgsthal.in\/blogs\/wp-content\/uploads\/2025\/06\/Online-Cyber-Security-Essentials.jpg","type":"image\/jpeg"}],"author":"Payal Ganguly","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Payal Ganguly","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/#article","isPartOf":{"@id":"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/"},"author":{"name":"Payal Ganguly","@id":"https:\/\/dgsthal.in\/blogs\/#\/schema\/person\/2a5781070f1f8fc37d1d41e043e0c36d"},"headline":"Cybersecurity Fundamentals: Protecting Yourself Online","datePublished":"2025-06-11T06:42:01+00:00","mainEntityOfPage":{"@id":"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/"},"wordCount":1088,"commentCount":0,"publisher":{"@id":"https:\/\/dgsthal.in\/blogs\/#organization"},"image":{"@id":"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/#primaryimage"},"thumbnailUrl":"https:\/\/dgsthal.in\/blogs\/wp-content\/uploads\/2025\/06\/Online-Cyber-Security-Essentials.jpg","keywords":["Beginners","Cyber security","Dgsthal","Fundamentals","Payal Ganguly"],"articleSection":["Blog","Technologies"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/","url":"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/","name":"Cybersecurity Fundamentals: Protecting Yourself Online - DGsthal","isPartOf":{"@id":"https:\/\/dgsthal.in\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/#primaryimage"},"image":{"@id":"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/#primaryimage"},"thumbnailUrl":"https:\/\/dgsthal.in\/blogs\/wp-content\/uploads\/2025\/06\/Online-Cyber-Security-Essentials.jpg","datePublished":"2025-06-11T06:42:01+00:00","description":"Protect yourself online! This beginner's guide covers cybersecurity fundamentals, including strong passwords, phishing awareness, and 2FA for better internet security.","breadcrumb":{"@id":"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/#primaryimage","url":"https:\/\/dgsthal.in\/blogs\/wp-content\/uploads\/2025\/06\/Online-Cyber-Security-Essentials.jpg","contentUrl":"https:\/\/dgsthal.in\/blogs\/wp-content\/uploads\/2025\/06\/Online-Cyber-Security-Essentials.jpg","width":1536,"height":1024,"caption":"Cybersecurity Fundamentals"},{"@type":"BreadcrumbList","@id":"https:\/\/dgsthal.in\/blogs\/cybersecurity-fundamentals-protecting-yourself-online\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dgsthal.in\/blogs\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Fundamentals: Protecting Yourself Online"}]},{"@type":"WebSite","@id":"https:\/\/dgsthal.in\/blogs\/#website","url":"https:\/\/dgsthal.in\/blogs\/","name":"DGsthal","description":"Blog","publisher":{"@id":"https:\/\/dgsthal.in\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dgsthal.in\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dgsthal.in\/blogs\/#organization","name":"DGsthal","url":"https:\/\/dgsthal.in\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dgsthal.in\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/dgsthal.in\/blogs\/wp-content\/uploads\/2025\/03\/cropped-DGsthal-Logo.png","contentUrl":"https:\/\/dgsthal.in\/blogs\/wp-content\/uploads\/2025\/03\/cropped-DGsthal-Logo.png","width":1920,"height":629,"caption":"DGsthal"},"image":{"@id":"https:\/\/dgsthal.in\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/dgsthal\/","https:\/\/www.instagram.com\/dgsthal_it_solutions\/"]},{"@type":"Person","@id":"https:\/\/dgsthal.in\/blogs\/#\/schema\/person\/2a5781070f1f8fc37d1d41e043e0c36d","name":"Payal Ganguly","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dgsthal.in\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d381aab0a2817410af89dbfd39bac693?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d381aab0a2817410af89dbfd39bac693?s=96&d=mm&r=g","caption":"Payal Ganguly"},"sameAs":["https:\/\/dgsthal.in\/blogs","https:\/\/www.linkedin.com\/in\/payal-ganguly-447436285\/"],"url":"https:\/\/dgsthal.in\/blogs\/author\/payalganguly\/"}]}},"_links":{"self":[{"href":"https:\/\/dgsthal.in\/blogs\/wp-json\/wp\/v2\/posts\/116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dgsthal.in\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dgsthal.in\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dgsthal.in\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dgsthal.in\/blogs\/wp-json\/wp\/v2\/comments?post=116"}],"version-history":[{"count":1,"href":"https:\/\/dgsthal.in\/blogs\/wp-json\/wp\/v2\/posts\/116\/revisions"}],"predecessor-version":[{"id":118,"href":"https:\/\/dgsthal.in\/blogs\/wp-json\/wp\/v2\/posts\/116\/revisions\/118"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dgsthal.in\/blogs\/wp-json\/wp\/v2\/media\/117"}],"wp:attachment":[{"href":"https:\/\/dgsthal.in\/blogs\/wp-json\/wp\/v2\/media?parent=116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dgsthal.in\/blogs\/wp-json\/wp\/v2\/categories?post=116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dgsthal.in\/blogs\/wp-json\/wp\/v2\/tags?post=116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}