{"id":7160,"date":"2016-08-31T09:00:13","date_gmt":"2016-08-31T14:00:13","guid":{"rendered":"http:\/\/www.bluehost.com\/blog\/?p=7160"},"modified":"2016-08-31T09:00:13","modified_gmt":"2016-08-31T14:00:13","slug":"infographic-protect-yourself-7-common-hacks","status":"publish","type":"post","link":"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/","title":{"rendered":"[Infographic] Protect Yourself From These 7 Common Hacks"},"content":{"rendered":"<p><b><\/b><span style=\"font-weight: 400;\">Websites are powerful tools that can do a lot of good for your organization, but they can also expose you and your visitors to security risks. <a href=\"http:\/\/www.applicure.com\/solutions\/hacking-attacks\">Four out of every five websites<\/a> either have vulnerabilities now or have exposed their enterprises and visitors to <a href=\"https:\/\/www.bluehost.com\/blog\/how-to-scan-your-wordpress-site-for-potentially-malicious-code\/\">malicious code<\/a>, viruses, and other cyber-criminal activities in the past<\/span><span style=\"font-weight: 400;\">. And although everyone on the web should always be careful, business owners have an added responsibility to keep data safe and secure. Safeguard your site\u00a0\u2014\u00a0and your customers\u00a0\u2014 from the seven common hacks in this infographic. And spoiler alert:\u00a0there&#8217;s a text-friendly version below.<\/span><br \/>\n<img decoding=\"async\" class=\"aligncenter size-full wp-image-7220\" src=\"\/blog\/wp-content\/uploads\/2016\/08\/Protect-Yourself-Infographic-Final.png\" alt=\"Protect Yourself Infographic Final\" width=\"700\" height=\"10604\" \/><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><b>Cross-site scripting (XSS)<\/b><span style=\"font-weight: 400;\"> attacks typically occur when hackers inject malicious code into an app in an attempt to pass the script onto unsuspecting end-users. Hackers construct a tripwire for visitors, using their malicious script to harvest credentials and personal information to impersonate known users.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>DDOS attacks<\/b><span style=\"font-weight: 400;\"> disrupt a server&#8217;s ability to function normally. These attacks flood the server with legitimate requests beyond scaling capabilities until eventually the site crashes.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b><a href=\"https:\/\/www.bluehost.com\/wordpress\/wordpress-hosting\">WordPress<\/a> attackers<\/b><span style=\"font-weight: 400;\"> leverage code vulnerabilities or plugin weaknesses. Brute Force attacks \u2014 where hackers gain access by trying thousands of password combinations until they \u201cguess\u201d the right combination to access your site \u2014 are a known problem for WordPress websites. Once inside, they change permissions, inject malicious code, and disrupt the normal processes.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Cyber attacks<\/b><span style=\"font-weight: 400;\"> that focus on tricking visitors into performing a certain action like clicking on a button, entering specific information, or visiting target pages seek access to inject malicious content precisely where it will do the most harm. Social engineering attacks are very difficult to control.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Clickjacking<\/b><span style=\"font-weight: 400;\">, where attackers use invisible or opaque layers to trick website visitors into clicking on a layer without knowing it, triggers a script or malicious code string.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>DNS cache poisoning<\/b><span style=\"font-weight: 400;\"> diverts traffic from legitimate servers to fake websites \u2014 and servers \u2014 replicating itself from site to site or server to server.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Symlinking<\/b><span style=\"font-weight: 400;\"> involves a scheme where cyber-criminals breach a vulnerable site to gain root access to the entire server. Once they&#8217;ve gained entrance, they can potentially take down all the websites on the server.<\/span><\/li>\n<\/ol>\n<p><b>How to Keep Your Site Secure<\/b><br \/>\n<span style=\"font-weight: 400;\">With so many different types of attacks, what can you do to protect your assets and your reputation?<\/span><br \/>\n<span style=\"font-weight: 400;\">Do:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Update all software and patches promptly. Software updates help eliminate known vulnerabilities.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Leverage operating system security features that support rigorous authentication protocol.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Implement password protection policies that include two-step authentication. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Lock private files and folders to limit access should a hacker access the network.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Be hyper-vigilant about which websites you visit, especially when surfing with administrative account credentials. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Post a privacy policy to inform consumers about what data you collect and what you intend to do with that data.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Deploy next gen firewalls, sandboxing techniques, and other advanced security protocol to protect both external and internal perimeters.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Download anti-spyware and antivirus software on all devices connected to your network.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Back up frequently and consider off-site storage.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Don\u2019t:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Trust user input. Strip all HTML before passing along user input.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Click on links or attachments included in emails from unknown sources.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Click on pop-ups (including the close tab) from suspicious sources. Just back out of the page. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Use free downloads (unless you\u2019re confident the source is trustworthy).<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Shop on a site that doesn&#8217;t display SSL signals. Look for \u201chttps,\u201d the tiny lock on the left side of the <a href=\"https:\/\/www.bluehost.com\/blog\/what-is-a-url\/\">URL<\/a>, and a green background in the address bar.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Provide hints that could help hackers guess passwords and usernames.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Collect unnecessary data that may be hijacked to implement an XSS scheme. <\/span><\/li>\n<\/ul>\n<p><b>Dealing With the Aftermath of a Security Breach<\/b><br \/>\n<span style=\"font-weight: 400;\">If you discover that your website has been the victim of hackers or if an employee accidentally downloads a file infected with malware, immediately:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Isolate the problem.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Purge infected files and folders.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Download tools to clean your files \u2014 remember only download from a site you trust completely or that trusted sources have recommended.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Own up to the situation \u2014 without making excuses \u2014 to your customers as soon as possible. Explain what happened, tell them what steps they can do to protect themselves, and let them know exactly what you are doing to mitigate damage and prevent future events. <\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Creating a WordPress website with a strong focus on security is one way to build a solid reputation with your customers and site visitors. Make sure you choose a <a href=\"https:\/\/www.bluehost.com\">web hosting partner<\/a> that takes your security as seriously as you do. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Websites are powerful tools that can do a lot of good for your organization, but they can also expose you and your visitors to security risks. Four out of every five websites either have vulnerabilities now or have exposed their enterprises and visitors to malicious code, viruses, and other cyber-criminal activities in the past. And [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":7223,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_title":"[Infographic] Protect Yourself From These 7 Common Hacks","_yoast_wpseo_metadesc":"Bluehost blog offers tips and education on many topics like Protect Yourself From These 7 Common Hacks. Learn more now.","inline_featured_image":false,"footnotes":""},"categories":[14],"tags":[3316,3317,3319,3330],"ppma_author":[590],"class_list":["post-7160","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-cloud","tag-cms","tag-compliance","tag-how-to-guides"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>[Infographic] Protect Yourself From These 7 Common Hacks<\/title>\n<meta name=\"description\" content=\"Bluehost blog offers tips and education on many topics like Protect Yourself From These 7 Common Hacks. Learn more now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/posts\/7160\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[Infographic] Protect Yourself From These 7 Common Hacks\" \/>\n<meta property=\"og:description\" content=\"Bluehost blog offers tips and education on many topics like Protect Yourself From These 7 Common Hacks. Learn more now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Bluehost Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bluehost\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-31T14:00:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2016\/08\/Textless-header-image-V1-blog-header-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Bluehost\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bluehost\" \/>\n<meta name=\"twitter:site\" content=\"@bluehost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bluehost\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/\"},\"author\":{\"name\":\"Bluehost\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/#\/schema\/person\/171185a8861774f37e8204fe1ec98398\"},\"headline\":\"[Infographic] Protect Yourself From These 7 Common Hacks\",\"datePublished\":\"2016-08-31T14:00:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/\"},\"wordCount\":748,\"publisher\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2016\/08\/Textless-header-image-V1-blog-header-1.png\",\"keywords\":[\"Cloud\",\"CMS\",\"Compliance\",\"How-To Guides\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/\",\"url\":\"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/\",\"name\":\"[Infographic] Protect Yourself From These 7 Common Hacks\",\"isPartOf\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2016\/08\/Textless-header-image-V1-blog-header-1.png\",\"datePublished\":\"2016-08-31T14:00:13+00:00\",\"description\":\"Bluehost blog offers tips and education on many topics like Protect Yourself From These 7 Common Hacks. Learn more now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/#primaryimage\",\"url\":\"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2016\/08\/Textless-header-image-V1-blog-header-1.png\",\"contentUrl\":\"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2016\/08\/Textless-header-image-V1-blog-header-1.png\",\"width\":1201,\"height\":629},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.bluehost.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Websites\",\"item\":\"https:\/\/www.bluehost.com\/blog\/category\/websites\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"[Infographic] Protect Yourself From These 7 Common Hacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/#website\",\"url\":\"https:\/\/www.bluehost.com\/blog\/\",\"name\":\"Bluehost\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.bluehost.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/#organization\",\"name\":\"Bluehost\",\"url\":\"https:\/\/www.bluehost.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2023\/08\/bluehost-logo.svg\",\"contentUrl\":\"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2023\/08\/bluehost-logo.svg\",\"width\":136,\"height\":24,\"caption\":\"Bluehost\"},\"image\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/bluehost\/\",\"https:\/\/x.com\/bluehost\",\"https:\/\/www.linkedin.com\/company\/bluehost-com\/\",\"https:\/\/www.youtube.com\/user\/bluehost\",\"https:\/\/en.wikipedia.org\/wiki\/Bluehost\"],\"description\":\"Bluehost is a leading web hosting provider empowering millions of websites worldwide. \\u2028Discover how Bluehost's expertise, reliability, and innovation can help you achieve your online goals.\",\"telephone\":\"+1-888-401-4678\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/#\/schema\/person\/171185a8861774f37e8204fe1ec98398\",\"name\":\"Bluehost\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/#\/schema\/person\/image\/8aa2875a56e9f236cbfa24b4fee7685f\",\"url\":\"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2024\/06\/bluehost.png\",\"contentUrl\":\"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2024\/06\/bluehost.png\",\"caption\":\"Bluehost\"},\"description\":\"Bluehost is a leading web hosting solutions provider specializing in WordPress. Trusted by over 5 million WordPress users, Bluehost simplifies the process of building, growing, and managing successful websites and online stores on WordPress. Our comprehensive suite of WordPress solutions combines expert guidance, powerful tools and unmatched expertise for effortless website creation. Since 2003, Bluehost has been offering reliable domain name registration and website hosting services, helping users establish a strong online presence. Seamlessly integrated with WordPress, our hosting solutions deliver exceptional reliability, speed and security.\",\"url\":\"https:\/\/www.bluehost.com\/blog\/author\/bluehost\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"[Infographic] Protect Yourself From These 7 Common Hacks","description":"Bluehost blog offers tips and education on many topics like Protect Yourself From These 7 Common Hacks. Learn more now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/posts\/7160\/","og_locale":"en_US","og_type":"article","og_title":"[Infographic] Protect Yourself From These 7 Common Hacks","og_description":"Bluehost blog offers tips and education on many topics like Protect Yourself From These 7 Common Hacks. Learn more now.","og_url":"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/","og_site_name":"Bluehost Blog","article_publisher":"https:\/\/www.facebook.com\/bluehost\/","article_published_time":"2016-08-31T14:00:13+00:00","og_image":[{"width":1201,"height":629,"url":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2016\/08\/Textless-header-image-V1-blog-header-1.png","type":"image\/png"}],"author":"Bluehost","twitter_card":"summary_large_image","twitter_creator":"@bluehost","twitter_site":"@bluehost","twitter_misc":{"Written by":"Bluehost","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/#article","isPartOf":{"@id":"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/"},"author":{"name":"Bluehost","@id":"https:\/\/www.bluehost.com\/blog\/#\/schema\/person\/171185a8861774f37e8204fe1ec98398"},"headline":"[Infographic] Protect Yourself From These 7 Common Hacks","datePublished":"2016-08-31T14:00:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/"},"wordCount":748,"publisher":{"@id":"https:\/\/www.bluehost.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2016\/08\/Textless-header-image-V1-blog-header-1.png","keywords":["Cloud","CMS","Compliance","How-To Guides"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/","url":"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/","name":"[Infographic] Protect Yourself From These 7 Common Hacks","isPartOf":{"@id":"https:\/\/www.bluehost.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/#primaryimage"},"image":{"@id":"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2016\/08\/Textless-header-image-V1-blog-header-1.png","datePublished":"2016-08-31T14:00:13+00:00","description":"Bluehost blog offers tips and education on many topics like Protect Yourself From These 7 Common Hacks. Learn more now.","breadcrumb":{"@id":"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/#primaryimage","url":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2016\/08\/Textless-header-image-V1-blog-header-1.png","contentUrl":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2016\/08\/Textless-header-image-V1-blog-header-1.png","width":1201,"height":629},{"@type":"BreadcrumbList","@id":"https:\/\/www.bluehost.com\/blog\/infographic-protect-yourself-7-common-hacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.bluehost.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Websites","item":"https:\/\/www.bluehost.com\/blog\/category\/websites\/"},{"@type":"ListItem","position":3,"name":"[Infographic] Protect Yourself From These 7 Common Hacks"}]},{"@type":"WebSite","@id":"https:\/\/www.bluehost.com\/blog\/#website","url":"https:\/\/www.bluehost.com\/blog\/","name":"Bluehost","description":"","publisher":{"@id":"https:\/\/www.bluehost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bluehost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.bluehost.com\/blog\/#organization","name":"Bluehost","url":"https:\/\/www.bluehost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bluehost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2023\/08\/bluehost-logo.svg","contentUrl":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2023\/08\/bluehost-logo.svg","width":136,"height":24,"caption":"Bluehost"},"image":{"@id":"https:\/\/www.bluehost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/bluehost\/","https:\/\/x.com\/bluehost","https:\/\/www.linkedin.com\/company\/bluehost-com\/","https:\/\/www.youtube.com\/user\/bluehost","https:\/\/en.wikipedia.org\/wiki\/Bluehost"],"description":"Bluehost is a leading web hosting provider empowering millions of websites worldwide. \u2028Discover how Bluehost's expertise, reliability, and innovation can help you achieve your online goals.","telephone":"+1-888-401-4678"},{"@type":"Person","@id":"https:\/\/www.bluehost.com\/blog\/#\/schema\/person\/171185a8861774f37e8204fe1ec98398","name":"Bluehost","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bluehost.com\/blog\/#\/schema\/person\/image\/8aa2875a56e9f236cbfa24b4fee7685f","url":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2024\/06\/bluehost.png","contentUrl":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2024\/06\/bluehost.png","caption":"Bluehost"},"description":"Bluehost is a leading web hosting solutions provider specializing in WordPress. Trusted by over 5 million WordPress users, Bluehost simplifies the process of building, growing, and managing successful websites and online stores on WordPress. Our comprehensive suite of WordPress solutions combines expert guidance, powerful tools and unmatched expertise for effortless website creation. Since 2003, Bluehost has been offering reliable domain name registration and website hosting services, helping users establish a strong online presence. Seamlessly integrated with WordPress, our hosting solutions deliver exceptional reliability, speed and security.","url":"https:\/\/www.bluehost.com\/blog\/author\/bluehost\/"}]}},"authors":[{"term_id":590,"user_id":3,"is_guest":0,"slug":"bluehost","display_name":"Bluehost","avatar_url":{"url":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2024\/06\/bluehost.png","url2x":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2024\/06\/bluehost.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":"","9":"","10":"","11":"","12":"","13":"","14":"","15":""}],"_links":{"self":[{"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/posts\/7160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/comments?post=7160"}],"version-history":[{"count":0,"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/posts\/7160\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/media\/7223"}],"wp:attachment":[{"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/media?parent=7160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/categories?post=7160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/tags?post=7160"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=7160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}