{"id":8869,"date":"2019-09-11T13:03:40","date_gmt":"2019-09-11T20:03:40","guid":{"rendered":"https:\/\/www.inmotionhosting.com\/blog\/?p=8869"},"modified":"2024-12-09T09:53:50","modified_gmt":"2024-12-09T14:53:50","slug":"6-ways-to-secure-your-web-activity-from-your-computer","status":"publish","type":"post","link":"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/","title":{"rendered":"6 Ways to Secure Your Web Activity From Your Computer"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/blog-6-ways-to-secure-web-activity-social-1024x538.jpg\" alt=\"6 Ways to Secure Web Activity From Your Computer\" class=\"wp-image-9005 skip_lazy\" srcset=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/blog-6-ways-to-secure-web-activity-social-1024x538.jpg 1024w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/blog-6-ways-to-secure-web-activity-social-300x158.jpg 300w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/blog-6-ways-to-secure-web-activity-social-768x403.jpg 768w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/blog-6-ways-to-secure-web-activity-social-560x294.jpg 560w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/blog-6-ways-to-secure-web-activity-social.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>We&#8217;re not a computer repair company. But there are many daily tasks that blur the line between your IT helpdesk, or tech savvy friend, and our 24\/7 web hosting technical support. Think about how much of what you do daily relates to <a href=\"https:\/\/www.inmotionhosting.com\/web-hosting\">web hosting<\/a>. You interact with email, websites, and mobile applications every day. When you have issues regarding any of these, we&#8217;re able to at least give you guidance on how to get the right answer if we can&#8217;t resolve the issue.<\/p>\n\n\n\n<p>When working on your website or web application, any issues you encounter could originate from multiple places. The most common choke-points &#8211; your computer, your local network, or a web server.<\/p>\n\n\n\n<p><a aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"https:\/\/www.inmotionhosting.com\/blog\/5-ways-to-improve-your-branding\/\" target=\"_blank\">Branding today requires a lot of social activities<\/a> and openness. But there are proprietary and <em>private<\/em> elements to your brand as well. You want in-depth data on your proprietary products, personally identifiable information (PII), and trademarks to remain secure. The easiest example is <a aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"https:\/\/www.inmotionhosting.com\/support\/domain-names\/why-use-domain-privacy\/\" target=\"_blank\">domain privacy<\/a> which sanitizes contact information. <\/p>\n\n\n\n<p>Reevaluate your workflow for better security often. Security has one major thing in common with customer service. <strong>It&#8217;s everyone&#8217;s job<\/strong>. Technology cannot negate user error. But while we can&#8217;t prevent all malicious events, we can make it harder by adding defense in depth to our lives. This requires increasing user awareness and training.<\/p>\n\n\n\n<p>We don&#8217;t just want to help secure your website on our server. We want you to better secure your private information and data.<\/p>\n\n\n\n<p>Below are ways to secure your web activity during system administration tasks and popular options as of 2019.<\/p>\n\n\n\n<p class=\"alert alert-warning\"><strong>Note:<\/strong> None of these technical controls will completely prevent malicious activity. User awareness and training is required to mitigate risks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"1\">1. Password Manager<\/h2>\n\n\n\n<p><a rel=\"noopener noreferrer\" class=\"rank-math-link\" href=\"https:\/\/www.cnet.com\/news\/the-best-password-managers-of-2019\/\" target=\"_blank\">Password managers<\/a> do more than store passwords.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Having one means you don&#8217;t have to remember as many passwords<\/li>\n\n\n\n<li>Therefore, you&#8217;re encouraged to create complex passwords <\/li>\n\n\n\n<li>Storing passwords in a dedicated app is safer than a browser which is vulnerable to various browser and website-related attacks<\/li>\n\n\n\n<li>Log into websites faster with an auto-type feature (if available) which pastes your username and password at once<\/li>\n<\/ul>\n\n\n\n<p>Password managers can encrypt your passwords file so, if your computer is stolen, there&#8217;s still some protection against malicious activity.<\/p>\n\n\n\n<p><strong>Popular options:<\/strong> Dashlane, LastPass, KeePass<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"2\">2. Virtual Private Network (VPN)<\/h2>\n\n\n\n<p>A virtual private network, or VPN, creates an encrypted tunnel for your web activity. This helps protect your web traffic in-transit against man-in-the-middle attacks. It also prevents internet service provider (ISPs) from logging and selling your network activity. Take time to <a rel=\"noopener noreferrer\" class=\"rank-math-link\" href=\"https:\/\/www.cnet.com\/best-vpn-services-directory\/\" target=\"_blank\">research VPN providers<\/a> as some <em>quietly<\/em> sell your activity as well, negating its usefulness in some cases. Providers in different countries may follow different laws regarding your privacy.<\/p>\n\n\n\n<p>After you set one up, configure the most secure settings possible for your network. By the way, if you can&#8217;t send email with your VPN enabled, you may need to <a aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"https:\/\/www.inmotionhosting.com\/support\/email\/cant-send-email-with-vpn-connected\/\" target=\"_blank\">request your VPN provider whitelist your email configuration<\/a>. Its a small price to pay for your privacy.<\/p>\n\n\n\n<p><strong>Popular:<\/strong> NordVPN, TunnelBear, Private Internet Access<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"3\">3. Firewall<\/h2>\n\n\n\n<p>This is an advanced but worthy addition if you put the time into configuration. It&#8217;s primary function regarding this article is to accept, limit, deny (block), or reject incoming and outgoing traffic to network ports. Note that <em>reject<\/em> notifies the requester of the rejection while <em>deny<\/em> (block) simply discards the request to save network resources.<\/p>\n\n\n\n<p>Blocking unneeded ports helps protects network resources on your server, network, and local workstation from malicious activity including reconnaissance port scans and denial of service attacks. Think of a lower amount of open ports as a smaller attack surface which is easier to monitor for anomalies.<\/p>\n\n\n\n<p>To properly configure a firewall, you need to understand the port numbers and services you need. You may already have one <a rel=\"noopener noreferrer\" class=\"rank-math-link\" href=\"https:\/\/www.techradar.com\/sg\/best\/best-free-firewall\" target=\"_blank\">in your home network<\/a>. A firewall can be implemented as an additional router feature, software installed on your computer, and\/or stand-alone hardware.<\/p>\n\n\n\n<p>We won&#8217;t go too deep, but these are some commonly used ports in web hosting:<\/p>\n\n\n\n<figure class=\"wp-block-table table table-bordered table-striped is-style-regular\"><table><tbody><tr><td><strong>Port<\/strong><\/td><td><strong>Service Name<\/strong><\/td><\/tr><tr><td>21<\/td><td>File Transfer Protocol (FTP)<\/td><\/tr><tr><td>22<\/td><td>Secure Shell (SSH)<\/td><\/tr><tr><td>25 \/ 587<\/td><td>SMTP Authentication \/ Alternative<\/td><\/tr><tr><td>53<\/td><td>Domain Name System (DNS)<\/td><\/tr><tr><td>80 \/ 443<\/td><td>HTTP \/ Secure<\/td><\/tr><tr><td>465<\/td><td>SMTP Authentication Secure<\/td><\/tr><tr><td>110 \/ 995<\/td><td>POP3 \/ Secure<\/td><\/tr><tr><td>143 \/ 993<\/td><td>IMAP \/ Secure<\/td><\/tr><tr><td>2082 \/ 2083<\/td><td>cPanel \/ Secure<\/td><\/tr><tr><td>2086 \/ 2087<\/td><td>WebHost Manager (WHM) \/ Secure<\/td><\/tr><tr><td>2095 \/ 2096<\/td><td>Webmail \/ Secure<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Your required ports increase as you install services like Nginx caching used for our high-performance <a aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"https:\/\/www.inmotionhosting.com\/wordpress-hosting\" target=\"_blank\">WordPress Hosting<\/a>.<\/p>\n\n\n\n<p>For example, when you upload files, do you use FTP (port 21) or SSH (port 22)? If you only use the <a aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"https:\/\/www.inmotionhosting.com\/support\/edu\/cpanel\/using-file-manager-in-cpanel\/\" target=\"_blank\">cPanel File Manager<\/a>, consider blocking these ports on your computer and router. Do you manage online MySQL (port 3306) or PostgreSQL (5432) databases from a desktop application? No? Block the ports. <\/p>\n\n\n\n<p class=\"alert alert-info\"><strong>Did you know<\/strong> our <a aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"https:\/\/www.inmotionhosting.com\/vps-hosting\" target=\"_blank\"><abbr title=\"Virtual Private Server\">VPS<\/abbr><\/a> and <a aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"https:\/\/www.inmotionhosting.com\/dedicated-servers\" target=\"_blank\">Dedicated Hosting<\/a> customers can use <a aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"https:\/\/www.inmotionhosting.com\/support\/security\/server-security-block-ports-csf\/\" target=\"_blank\">ConfigServer &amp; Firewall (CSF) to block ports<\/a> on their web server?<\/p>\n\n\n\n<p><strong>Popular:<\/strong> Firewalld (Linux), ZoneAlarm (Windows), Firewall (Mac pre-installed), Cisco ASA 5500-X (Hardware \/ Included with our <a aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"https:\/\/www.inmotionhosting.com\/dedicated-servers\" target=\"_blank\">Dedicated Hosting<\/a>)<\/p>\n\n\n\n<p>Need a break from reading? Check out this infographic comparing our three major types of web hosting.<\/p>\n\n\n\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.inmotionhosting.com\/img\/infographics\/where_does_your_website_live.png\" alt=\"Where Does Your Website Live?\" width=\"800\" height=\"1487\" border=\"0\"><div>InMotion Hosting &#8211; <a href=\"https:\/\/www.inmotionhosting.com\/\">Types of Web Hosting Plans<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"4\">4. Backups<\/h2>\n\n\n\n<p>Backups are a valuable last line of defense. When cleaning malicious code, changing passwords, and enhancing security implementations don&#8217;t help recover from website hacks, the best option may be to restore your last known good backup <strong>from<\/strong><strong> an external location<\/strong>. There are multiple backup types, but you should have at least two up-to-date verified backups stored in at least two locations.<\/p>\n\n\n\n<p><strong>cPanel backups<\/strong> include all website, email, and database data in one compressed tar.gz file. This is the best option and easy to create in cPanel. <\/p>\n\n\n\n<p class=\"alert alert-info\">VPS and Dedicated server administrators can <a aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"https:\/\/www.inmotionhosting.com\/support\/edu\/cpanel\/setup-scheduled-cpanel-backups\/\" target=\"_blank\">schedule and forward cPanel backups<\/a> in WHM to external locations including Amazon S3 and Google Drive.<\/p>\n\n\n\n<p><strong>Database backups<\/strong> (MySQL, PostgreSQL, etc.) are great for systems where database data is modified often compared to the web application or the only data needed for a particular web application.<\/p>\n\n\n\n<p><strong>Website backup<\/strong> options differ between content management systems (CMSs) and frameworks. Some CMSs have native backup features &#8211; <em>e.g. <\/em><a aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"https:\/\/www.inmotionhosting.com\/support\/edu\/opencart\/backup-opencart-database\/\" target=\"_blank\">OpenCart<\/a><em> and <\/em><a href=\"https:\/\/www.inmotionhosting.com\/support\/website\/grav-backups\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Grav<\/a>. <a aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"https:\/\/www.inmotionhosting.com\/support\/edu\/wordpress\/plugins\/recommended-wordpress-backup-plugins\/\" target=\"_blank\">WordPress<\/a>, <a aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"https:\/\/www.inmotionhosting.com\/support\/edu\/wordpress\/plugins\/matomo-analytics\/\" target=\"_blank\">MatomoAnalytics<\/a>, and others will require a third party plugin. Note that website backups don&#8217;t store emails.<\/p>\n\n\n\n<p>Backups should be downloaded from the server and stored on at least one other location. That&#8217;s two external locations if you backup your computer regularly.<\/p>\n\n\n\n<p><a aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"https:\/\/www.inmotionhosting.com\/support\/security\/create-checksum-locally\/\" target=\"_blank\">Store a SHA512 checksum<\/a> of verified backup files to ensure they&#8217;re not corrupt.<\/p>\n\n\n\n<p><strong>Popular:<\/strong> Fab&#8217;s AutoBackup (Windows), Time Machine (Mac pre-installed), rsync (Linux), <a href=\"https:\/\/www.inmotionhosting.com\/support\/edu\/wordpress\/plugins\/updraftplus-backup-plugin\/\" target=\"_blank\" aria-label=\"Updraft (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Updraft<\/a> (WordPress)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"5\">5.Updates<\/h2>\n\n\n\n<p>Update early and often. Check changelogs for your software or operating system (OS), and you&#8217;ll notice many updates fix security vulnerabilities. Whether those issues were reported in GitHub Issues, support forums, or the <a rel=\"noopener noreferrer\" class=\"rank-math-link\" href=\"https:\/\/nvd.nist.gov\/\" target=\"_blank\">National Vulnerability Database (NVD)<\/a>, someone is trying to exploit it in unpatched systems.<\/p>\n\n\n\n<p>How does this relate to web hosting? Easy. The <a rel=\"noopener noreferrer\" class=\"rank-math-link\" href=\"https:\/\/blog.sucuri.net\/2019\/06\/why-is-your-website-a-target-the-seo-value-of-a-website.html\" target=\"_blank\">most common reason for a successful attack is outdated software<\/a>. Your email client, FTP program, browser, and CMS are popular attack vectors. Popular software are the most popular targets.<\/p>\n\n\n\n<p>This is the easiest entry on the list. Everything is stored in a file &#8211; passwords, backups, VPN and firewall settings included. Create backups before major updates in case something goes wrong afterwards. But ensure applications check for stable updates often and notify you immediately.<\/p>\n\n\n\n<p><strong>Popular:<\/strong> Auto-update options<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"6\">6. Trusted Wi-Fi<\/h2>\n\n\n\n<p>Configure your home network with WPA2 (or stronger) and a complex admin password (updated every 30-90 days) for better security. Many <a rel=\"noopener noreferrer\" class=\"rank-math-link\" href=\"https:\/\/www.cnet.com\/news\/wi-fi-protected-set-up-not-so-protected-after-all\/\" target=\"_blank\">security professionals recommend disabling WiFi Protected Setup (WPS)<\/a> on home routers as it&#8217;s convenience negates network security. The goal here is to prevent hackers from sessionjacking your server login credentials.<\/p>\n\n\n\n<p>Ensure your firewall and VPN are enabled with the strictest settings possible whenever you work on your website on public Wi-Fi networks such as restaurants and public transportation. Also, be sure to connect to the correct network instead of a rogue wireless access point, or \u201cevil twin,\u201d created for malicious activity.<\/p>\n\n\n\n<p><strong>Popular:<\/strong> Mobile phone tethering if possible<\/p>\n\n\n\n<p>Read more about website s<a aria-label=\" (opens in a new tab)\" class=\"rank-math-link\" href=\"https:\/\/www.inmotionhosting.com\/support\/website\/website-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">ecurity, server security, or securing your web hosting with Sucuri. Want t<\/a>o help us help others. <a aria-label=\"undefined (opens in a new tab)\" class=\"rank-math-link\" rel=\"noreferrer noopener\" href=\"https:\/\/www.inmotionhosting.com\/employment\/position-openings\" target=\"_blank\">Join our Technical Support team<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"1280\" height=\"720\" src=\"https:\/\/www.youtube.com\/embed\/Mb3oAjMlILM?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span>\n<\/div><figcaption class=\"wp-element-caption\">We recommend our video &#8211; 4 Tips To Surf Safe On The Web<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;re not a computer repair company. But there are many daily tasks that blur the line between your IT helpdesk, or tech savvy friend, and our 24\/7 web hosting technical support. Think about how much of what you do daily relates to web hosting. You interact with email, websites, and mobile applications every day. When<a class=\"moretag\" href=\"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/\"> Read More ><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[371],"tags":[],"class_list":["post-8869","post","type-post","status-publish","format-standard","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>6 Ways to Secure Your Web Activity From Your Computer<\/title>\n<meta name=\"description\" content=\"Web security issues originate from multiple places. Find out how to protect yourself and secure your web activity with these 6 helpful tips.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Ways to Secure Your Web Activity From Your Computer\" \/>\n<meta property=\"og:description\" content=\"Web security issues originate from multiple places. Find out how to protect yourself and secure your web activity with these 6 helpful tips.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/\" \/>\n<meta property=\"og:site_name\" content=\"InMotion Hosting Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inmotionhosting\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-11T20:03:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-09T14:53:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/blog-6-ways-to-secure-web-activity-social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"InMotion Hosting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@inmotionhosting\" \/>\n<meta name=\"twitter:site\" content=\"@inmotionhosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"InMotion Hosting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 Ways to Secure Your Web Activity From Your Computer","description":"Web security issues originate from multiple places. Find out how to protect yourself and secure your web activity with these 6 helpful tips.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/","og_locale":"en_US","og_type":"article","og_title":"6 Ways to Secure Your Web Activity From Your Computer","og_description":"Web security issues originate from multiple places. Find out how to protect yourself and secure your web activity with these 6 helpful tips.","og_url":"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/","og_site_name":"InMotion Hosting Blog","article_publisher":"https:\/\/www.facebook.com\/inmotionhosting","article_published_time":"2019-09-11T20:03:40+00:00","article_modified_time":"2024-12-09T14:53:50+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/blog-6-ways-to-secure-web-activity-social.jpg","type":"image\/jpeg"}],"author":"InMotion Hosting","twitter_card":"summary_large_image","twitter_creator":"@inmotionhosting","twitter_site":"@inmotionhosting","twitter_misc":{"Written by":"InMotion Hosting","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/#article","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/"},"author":{"name":"InMotion Hosting","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/person\/f21a89c83c7697a760c96cfe58e646bc"},"headline":"6 Ways to Secure Your Web Activity From Your Computer","datePublished":"2019-09-11T20:03:40+00:00","dateModified":"2024-12-09T14:53:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/"},"wordCount":1359,"commentCount":0,"publisher":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/blog-6-ways-to-secure-web-activity-social-1024x538.jpg","articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/","url":"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/","name":"6 Ways to Secure Your Web Activity From Your Computer","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/#primaryimage"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/blog-6-ways-to-secure-web-activity-social-1024x538.jpg","datePublished":"2019-09-11T20:03:40+00:00","dateModified":"2024-12-09T14:53:50+00:00","description":"Web security issues originate from multiple places. Find out how to protect yourself and secure your web activity with these 6 helpful tips.","breadcrumb":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/#primaryimage","url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/blog-6-ways-to-secure-web-activity-social.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/09\/blog-6-ways-to-secure-web-activity-social.jpg","width":1200,"height":630,"caption":"6 Ways to Secure Web Activity From Your Computer"},{"@type":"BreadcrumbList","@id":"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inmotionhosting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.inmotionhosting.com\/blog\/security\/"},{"@type":"ListItem","position":3,"name":"6 Ways to Secure Your Web Activity From Your Computer"}]},{"@type":"WebSite","@id":"https:\/\/www.inmotionhosting.com\/blog\/#website","url":"https:\/\/www.inmotionhosting.com\/blog\/","name":"InMotion Hosting Blog","description":"Web Hosting Strategy, Trends and Security","publisher":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inmotionhosting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization","name":"InMotion Hosting","url":"https:\/\/www.inmotionhosting.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/11\/imh-logo-all-colors-big.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/11\/imh-logo-all-colors-big.jpg","width":1630,"height":430,"caption":"InMotion Hosting"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inmotionhosting","https:\/\/x.com\/inmotionhosting"]},{"@type":"Person","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/person\/f21a89c83c7697a760c96cfe58e646bc","name":"InMotion Hosting","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/eb965eada0c0513dd2e1976b21fe270fa4f19ac273960fc080f9d46b81b353a4?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/eb965eada0c0513dd2e1976b21fe270fa4f19ac273960fc080f9d46b81b353a4?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eb965eada0c0513dd2e1976b21fe270fa4f19ac273960fc080f9d46b81b353a4?s=96&r=g","caption":"InMotion Hosting"},"url":"https:\/\/www.inmotionhosting.com\/blog\/author\/imhmainadmin\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"primary_category":{"id":371,"name":"Security","slug":"security","link":"https:\/\/www.inmotionhosting.com\/blog\/security\/"},"_links":{"self":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/8869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/comments?post=8869"}],"version-history":[{"count":20,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/8869\/revisions"}],"predecessor-version":[{"id":77564,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/8869\/revisions\/77564"}],"wp:attachment":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/media?parent=8869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/categories?post=8869"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/tags?post=8869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}