{"id":77508,"date":"2024-04-24T12:37:42","date_gmt":"2024-04-24T04:37:42","guid":{"rendered":"https:\/\/version-2.com\/?p=77508"},"modified":"2024-04-18T12:43:16","modified_gmt":"2024-04-18T04:43:16","slug":"even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/04\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/","title":{"rendered":"Even legitimate websites can become traps, and small\/home offices need to be prepared"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"77508\" class=\"elementor elementor-77508\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><div id=\"content-c10439305\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/SOHO_2_250x250.png\" alt=\"\" width=\"250\" height=\"250\" \/><\/p><div id=\"content-c10478983\" class=\"frame frame-default frame-type-text frame-layout-0\"><div><div id=\"content-c10478983\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><em><span lang=\"EN-US\">One\u2019s personal digital life may be a threat to business. Small offices and home offices need proper prevention.\u00a0 <\/span><\/em><\/p><p>Heads of small or home offices most likely know how difficult it is to set boundaries between work and their personal lives. One minute you are doing taxes, and the next, you are browsing the internet looking for leisure-time activities for your family.\u00a0<\/p><p>Having basic cybersecurity knowledge, you also probably know that sometimes you need to be careful out there. Clicking URLs mentioned in unfamiliar emails could bring trouble, and downloading new apps from unknown sources with no background information isn\u2019t a good idea either.<\/p><p>But, what if a legitimate website that you or your employees have been regularly visiting gets compromised? How do you secure your cherished small office when downloading a legitimate application, or when its update suddenly turns out to be malicious?<\/p><p>ESET researchers have recently <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/evasive-panda-leverages-monlam-festival-target-tibetans\/\" target=\"_blank\" rel=\"noopener\">discovered such a campaign<\/a>, which abused several legitimate websites to spread spyware which targeting a wide group of users coming from India, Taiwan, Hong Kong, Australia, and the United States. Facing such elaborate attacks, small offices and home offices need to take a <a href=\"https:\/\/www.eset.com\/int\/home\/small-business-security\/\" target=\"_blank\" rel=\"noopener\">prevention-first approach<\/a>.<\/p><\/div><div id=\"content-c10478984\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Interesting target<\/h3><\/header><p>While, compared with large enterprises, small offices and home offices do not work with such large amounts of data or money, unfortunately, this can create the false impression that they are not interesting targets for cybercriminals. But the opposite is true.<\/p><p>Considering the <a href=\"https:\/\/sbecouncil.org\/about-us\/facts-and-data\/\" target=\"_blank\" rel=\"noopener\">massive numbers of small offices and home offices globally<\/a>, in combination with their <a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2023\/cyber-security-breaches-survey-2023\" target=\"_blank\" rel=\"noopener\">limited budgets for cybersecurity<\/a>, they make appealing targets for threat actors who aim campaigns at indistinct groups of people or businesses, rather than some corporate giant.<\/p><p>Therefore, it is no surprise that <a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2023\/cyber-security-breaches-survey-2023\" target=\"_blank\" rel=\"noopener\">31% of businesses <\/a>with fewer than 10 employees surveyed in the UK during the winter of 2022 &#8211; 2023 experienced a cyberattack or a security breach in the past 12 months.<\/p><p>There are <a href=\"https:\/\/www.statista.com\/statistics\/880155\/number-of-smes-in-united-kingdom-uk\/#:~:text=In%202023%20there%20were%20approximately,UK%20at%20over%205.28%20million.\" target=\"_blank\" rel=\"noopener\">5.28 million such businesses<\/a> in the UK, which means that, theoretically, 1.64 million small offices and home offices experienced a cyber incident within a single year.<\/p><\/div><div id=\"content-c10478985\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Multi-staged attacks<\/h3><\/header><p>ESET researchers <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/evasive-panda-leverages-monlam-festival-target-tibetans\/#Nightdoor\" target=\"_blank\" rel=\"noopener\">discovered a cyberespionage campaign<\/a> well-suited to paint the picture. Since at least September 2023, cybercriminals have been victimizing Tibetans through a multi-staged attack that combines several techniques in order to install spyware on victims\u2019 devices. Researchers attribute this campaign to the China-aligned Evasive Panda <a href=\"https:\/\/www.eset.com\/in\/about\/newsroom\/corporate-blog\/corporate-blog\/advanced-persistent-threat-a-nightmare-for-corporate-cyber-security-professionals\/\" target=\"_blank\" rel=\"noopener\">APT group<\/a>.<\/p><p>Shortly before the 2024 Kagyu Monlam Festival, which is held annually by Tibetan Buddhists in India, cybercriminals abused a website that belongs to the Kagyu International Monlam Trust. Expecting a higher visitor rate ahead of the upcoming festival, the attackers placed a malicious script on the site which showed a fake error page to users. This enticed them to download an \u201cImmediate Fix.\u201d However, the file was in fact a malicious downloader for both Windows and macOS.<\/p><\/div><div id=\"content-c10478986\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/figure-7-a-fake-graphic-rendered-by-the-javascript.png\" alt=\"\" width=\"894\" height=\"379\" \/><\/div><div class=\"ce-column\" style=\"text-align: center;\">A fake graphic rendered by the JavaScript.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c10478998\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>The same threat actors also compromised a website belonging to a software development company, based in India, that produces Tibetan language translation software. The attackers placed several trojanized installers there for legitimate software that deployed the same malicious downloaders.<\/p><p>These malicious downloaders were designed to download and install backdoors, which can avoid normal authentication procedures and allow access to a system.<\/p><p>When successful, the downloaders compromised devices with a malware capable of receiving commands to collect information about files and running processes and sending them to attackers.<\/p><\/div><div id=\"content-c10479213\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Small offices dealing with big attacks<\/h3><\/header><p>For average users, these advanced multi-staged attacks will be most likely difficult to spot. It is not hard to imagine a user clicking on a link that is part of a warning message coming from a trusted website. And there is no possibility for humans to discover that a legitimate software they are about to download was trojanized.<\/p><p>Considering their limited options in such situations, small offices and home offices need to be smart about their safety.<\/p><p>This means protecting your business as much as possible, and leaving the rest to professional tools that can minimize the threat landscape in a way that average Joes cannot.<\/p><p><u><strong>Here are preemptive measures that businesses can take: <\/strong><\/u><\/p><p><strong>Educate yourself and your employees \u2013<\/strong> Some attacks are difficult to spot, but it does not mean that awareness training is useless. There are plenty of threats in cyberspace that can be easily avoided if you and your employees stay vigilant.<\/p><p><strong>Use strong passwords or passphrases \u2013<\/strong> Minimum length <a href=\"https:\/\/pages.nist.gov\/800-63-3\/sp800-63b.html\" target=\"_blank\" rel=\"noopener\">should be 12 characters<\/a>, with a wide variety of letters, special characters, lower\/upper cases, etc. Hard to remember? <a href=\"https:\/\/www.welivesecurity.com\/2023\/05\/04\/creating-strong-user-friendly-passwords-tips-business-password-policy\/\" target=\"_blank\" rel=\"noopener\">Switch to passphrases!<\/a> They are longer, yet easier to remember.<\/p><p><strong>Stay on top of software updates \u2013 <\/strong>For cybercriminals it is <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-215a\" target=\"_blank\" rel=\"noopener\">not uncommon<\/a> to exploit previously known vulnerabilities simply because users do not update their software.<\/p><p><strong>Split your network into segments \u2013<\/strong> For small offices and home offices, network segmentation <a href=\"https:\/\/www.welivesecurity.com\/2023\/04\/05\/spring-clean-network-backups\/\" target=\"_blank\" rel=\"noopener\">does not have to be difficult<\/a>. For example, use a guest Wi-Fi for devices that only need the internet to operate, then use VLANs to split a network into two segments \u2013 private and work.<\/p><p><strong>Back up your data \u2013<\/strong> If everything fails and your systems get compromised, it is essential to have an effective <a href=\"https:\/\/www.welivesecurity.com\/en\/business-security\/10-tips-build-effective-business-backup-strategy\/\" target=\"_blank\" rel=\"noopener\">backup strategy<\/a> to run your business without unnecessary delays.<\/p><\/div><div id=\"content-c10479214\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Professional protection<\/h3><\/header><p>Adopting the previous measures, you can cover some attack vectors, such as brute-force attacks against passwords or exploitation of known vulnerabilities. But the threat landscape is way bigger.<\/p><p>To cover all small office and home office needs, ESET now delivers its new all-in-one protection, <a href=\"https:\/\/www.eset.com\/int\/home\/small-business-security\/\" target=\"_blank\" rel=\"noopener\">ESET Small Business Security<\/a><\/p><p><strong>ESET Small Business Security offers:\u00a0 <\/strong><\/p><ul><li>Reliable, easy-to-use security, with a minimum system footprint<\/li><li>Multi-OS protection, including Windows, Android, MacOS and Windows Server<\/li><li>Safe Banking<\/li><li>Safe Browsing<\/li><li>Password Manager<\/li><li><a href=\"https:\/\/support.eset.com\/sk\/kb8605\" target=\"_blank\" rel=\"noopener\">VPN<\/a><\/li><li>Ransomware Shield<\/li><li>Anti-Theft<\/li><li>Botnet Protection<\/li><li>Network Inspector<\/li><li>Safe Server \u2013 Protection of company and customer data stored on a file server running on Windows Server OS, automatically scans all inserted USB flash drives, memory cards, and CDs\/DVDs<\/li><li>Support for up to 25 devices<\/li><\/ul><p>The number of features that one person needs to manage may look scary, but do not worry. ESET Small Business Security runs on <a href=\"https:\/\/login.eset.com\/login\" target=\"_blank\" rel=\"noopener\">ESET HOME<\/a>, a complete security management platform that turns home admin duties into a walk in the park.<\/p><\/div><div id=\"content-c10479215\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Never let your guard down<\/h3><\/header><p>When average users browse trusted websites or download software from trusted sources, they often let their guard down, and it\u2019s quite understandable. Heads of small offices or home offices already have enough problems just running their businesses and taking care of their families.<\/p><p>With comprehensive solutions, such as ESET Small Business Security, you can be sure that your business is protected, even when facing similar threats.<\/p><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>One\u2019s personal digital life may be a threat to business [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,40,61],"tags":[1272,41],"class_list":["post-77508","post","type-post","status-publish","format-standard","hentry","category-1273","category-eset","category-press-release","tag-1272","tag-eset"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Even legitimate websites can become traps, and small\/home offices need to be prepared - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/consumer\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Even legitimate websites can become traps, and small\/home offices need to be prepared - Version 2\" \/>\n<meta property=\"og:description\" content=\"One\u2019s personal digital life may be a threat to business [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/consumer\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-24T04:37:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/SOHO_2_250x250.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/04\\\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Even legitimate websites can become traps, and small\\\/home offices need to be prepared\",\"datePublished\":\"2024-04-24T04:37:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/04\\\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\\\/\"},\"wordCount\":1102,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/SOHO_2_250x250.png\",\"keywords\":[\"2024\",\"ESET\"],\"articleSection\":[\"2024\",\"ESET\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/04\\\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\\\/\",\"name\":\"Even legitimate websites can become traps, and small\\\/home offices need to be prepared - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/SOHO_2_250x250.png\",\"datePublished\":\"2024-04-24T04:37:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/SOHO_2_250x250.png\",\"contentUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/SOHO_2_250x250.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Even legitimate websites can become traps, and small\\\/home offices need to be prepared\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Even legitimate websites can become traps, and small\/home offices need to be prepared - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/consumer\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/","og_locale":"en_US","og_type":"article","og_title":"Even legitimate websites can become traps, and small\/home offices need to be prepared - Version 2","og_description":"One\u2019s personal digital life may be a threat to business [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/consumer\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/","og_site_name":"Version 2","article_published_time":"2024-04-24T04:37:42+00:00","og_image":[{"url":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/SOHO_2_250x250.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/consumer\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/04\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Even legitimate websites can become traps, and small\/home offices need to be prepared","datePublished":"2024-04-24T04:37:42+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/04\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/"},"wordCount":1102,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/SOHO_2_250x250.png","keywords":["2024","ESET"],"articleSection":["2024","ESET","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/consumer\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/04\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/","url":"https:\/\/www.eset.com\/blog\/consumer\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/","name":"Even legitimate websites can become traps, and small\/home offices need to be prepared - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/SOHO_2_250x250.png","datePublished":"2024-04-24T04:37:42+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/consumer\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eset.com\/blog\/consumer\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/#primaryimage","url":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/SOHO_2_250x250.png","contentUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/SOHO_2_250x250.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/consumer\/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Even legitimate websites can become traps, and small\/home offices need to be prepared"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-ka8","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/77508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=77508"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/77508\/revisions"}],"predecessor-version":[{"id":77515,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/77508\/revisions\/77515"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=77508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=77508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=77508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}