{"id":413,"date":"2017-05-22T09:35:52","date_gmt":"2017-05-22T09:35:52","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/"},"modified":"2019-05-29T11:58:34","modified_gmt":"2019-05-29T11:58:34","slug":"ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/","title":{"rendered":"Ignoring software updates? You\u2019re making one of five basic security mistakes"},"content":{"rendered":"<p class=\"wls-paragraph\">Cybercrime has quickly become a major problem for businesses, governments and citizens all over the globe.<\/p>\n<p class=\"wls-paragraph\">While awareness of this multifaceted threat is increasing, we\u2019re still making the same blunder when it comes to cybersecurity, as a recent study by the <a href=\"http:\/\/www.pewinternet.org\/2017\/03\/22\/what-the-public-knows-about-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pew Research Center<\/a> alluded to.<\/p>\n<p class=\"wls-paragraph\">Here are a few security mistakes to be aware of.<\/p>\n<h2><strong>Email: This ruse is nothing new<\/strong><\/h2>\n<p class=\"wls-paragraph\"><a href=\"https:\/\/www.welivesecurity.com\/2015\/12\/30\/5-things-need-know-social-engineering\/\" target=\"_blank\" rel=\"noopener noreferrer\">Social engineering<\/a> tactics are as old as the day is long, yet people keep falling for them. Today, phishing via email has become incredibly commonplace.<\/p>\n<p class=\"wls-paragraph\">Although criminals are improving the \u2018quality\u2019 of these emails, with some targeted \u2013 known as spear phishing \u2013 emails looking incredibly authentic most do not (<a href=\"https:\/\/www.welivesecurity.com\/2015\/08\/18\/phishing-unravelled\/\">telltale signs<\/a> include poor spelling, random email address and far-fetched claims that you\u2019ve won millions).<\/p>\n<p class=\"wls-paragraph\">Keep yourself safe by carefully checking the recipient, the request, and use some common sense \u2013 search via Google rather than using the enclosed website address. Also, be cautious of attachments, as they may be malware-infected. It\u2019s important to check file extensions and to only open files deemed safe and from legitimate sources.<\/p>\n<h2><strong>Social media: New hunting ground<\/strong><\/h2>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-93436\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/05\/shutterstock_168318926.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/05\/shutterstock_168318926.jpg 640w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/05\/shutterstock_168318926-300x192.jpg 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/05\/shutterstock_168318926-65x42.jpg 65w\" alt=\"oops wording on keyboard key to illustrate basic security mistakes\" width=\"640\" height=\"410\"><\/p>\n<p class=\"wls-paragraph\">Social media has become the <a href=\"http:\/\/www.bbc.co.uk\/news\/business-36854285\" target=\"_blank\" rel=\"noopener noreferrer\">go-to-market for cybercriminals<\/a> eager to compromise people. It\u2019s no surprise, as many users still fail to adequately look after their networks (for example, a 2016 survey showed that 58% of people do not know how to update their privacy settings).<\/p>\n<p class=\"wls-paragraph\">As with email, and post too, always check the authenticity of the sender (do they look credible?), the message and the link (which will likely be shortened). Beware trending hashtags too, as many as now using these to catch out unsuspecting Twitter and Facebook users trying to catch-up with the latest breaking news.<\/p>\n<h2><strong>Attitude: It won\u2019t happen to me<\/strong><\/h2>\n<p class=\"wls-paragraph\">Forget technology for a second, culture is arguably the biggest issue with security right now, and this has been the case for 20 years. CEOs think they won\u2019t be targeted and citizens think much the same (i.e. <a href=\"https:\/\/www.welivesecurity.com\/2015\/05\/01\/5-signs-youre-hackers-sights\/\" target=\"_blank\" rel=\"noopener noreferrer\">it won\u2019t happen to me<\/a>).<\/p>\n<p class=\"wls-paragraph\">This complacency is misguided, as <a href=\"https:\/\/www.welivesecurity.com\/2016\/10\/17\/84722\/\" target=\"_blank\" rel=\"noopener noreferrer\">everyone is a potential target<\/a>. Accordingly, this attitude can often result in poor security habits, with individuals and organizations treating, for example, password and Wi-Fi security not as seriously as they should.<\/p>\n<p class=\"wls-paragraph\">This is despite the fact that good cybersecurity can be achieved relatively easily, through good password hygiene, regular software updates, anti-virus and even password managers, VPNs and secure encrypted messaging apps.<\/p>\n<h2><strong>Passwords: The easy way in<\/strong><\/h2>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-93438\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/05\/shutterstock_341618303.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/05\/shutterstock_341618303.jpg 640w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/05\/shutterstock_341618303-300x192.jpg 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/05\/shutterstock_341618303-65x42.jpg 65w\" alt=\"password word among green coding to illustrate security mistakes\" width=\"640\" height=\"410\"><\/p>\n<p class=\"wls-paragraph\">Generic, guessable passwords can be easily cracked, and they can open a can of worms if you use the same password across several accounts. Brute-forcing passwords is increasing fast and easy for criminals today equipped with either huge computing power, or access to buy such expertise on the dark web.<\/p>\n<p class=\"wls-paragraph\">Weak passwords, such as 123456; password; 12345678; and qwerty remain <a href=\"https:\/\/www.welivesecurity.com\/2017\/05\/19\/ignoring-software-updates-youre-making-one-five-basic-security-mistakes\/1%20-%20123456%20%28unchanged%20from%202014%29%20%202%20-%20password%20%28unchanged%29%20%203%20-%2012345678%20%28Up%201%29%20%204%20-%20qwerty%20%28Up%201%29%20%205%20-%2012345%20%28Down%202%29\" target=\"_blank\" rel=\"noopener noreferrer\">commonplace<\/a>, with many people failing to see how this \u2018low-hanging fruit\u2019 is an entry point for cybercriminals. According to <a href=\"http:\/\/www.prnewswire.com\/news-releases\/survey-reveals-how-lack-of-social-network-password-security-is-causing-vulnerabilities-at-users-place-of-business-300433021.html\" target=\"_blank\" rel=\"noopener noreferrer\">Forrester<\/a>, 80% of all attacks involve a weak or stolen&nbsp;<em>password<\/em>.<\/p>\n<p class=\"wls-paragraph\">Fortunately, some web providers now forcing you to generate random passwords, or create complex ones. You may want to consider a password manager, as well as <a href=\"https:\/\/www.welivesecurity.com\/2016\/05\/05\/forget-about-passwords-you-need-a-passphrase\/\" target=\"_blank\" rel=\"noopener noreferrer\">passphrases<\/a>.<\/p>\n<h2>Software updates: A lack of<\/h2>\n<p class=\"wls-paragraph\">Whether on desktop, laptop or mobile, there\u2019s always <a href=\"https:\/\/www.welivesecurity.com\/2017\/01\/24\/apple-issues-security-patches-just-everything\/\" target=\"_blank\" rel=\"noopener noreferrer\">another software update<\/a> for an app, our operating system or security solution. Interestingly, the constant pop-ups irritate us, with many people failing to understand just how important they are.<\/p>\n<p class=\"wls-paragraph\">If we fail to update, we\u2019re effectively leaving our software and devices vulnerable to attack, as cybercriminals look to exploit out-of-date flaws. Configuring automatic updates from trusted providers can make sure these are installed regularly.<\/p>\n<p class=\"wls-paragraph\">Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"https:\/\/www.welivesecurity.com\/2017\/05\/19\/ignoring-software-updates-youre-making-one-five-basic-security-mistakes\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercrime has quickly become a major problem for businesses, governments and citizens all over the globe. While awareness of this multifaceted threat is increasing, we\u2019re still making the same blunder when it comes to cybersecurity, as a recent study by the Pew Research Center alluded to. Here are a few security mistakes to be aware<\/p>\n","protected":false},"author":5,"featured_media":1807,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[147,160],"tags":[],"class_list":["post-413","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","category-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ignoring software updates? You\u2019re making one of five basic security mistakes - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ignoring software updates? You\u2019re making one of five basic security mistakes\" \/>\n<meta property=\"og:description\" content=\"Cybercrime has quickly become a major problem for businesses, governments and citizens all over the globe. While awareness of this multifaceted threat is increasing, we\u2019re still making the same blunder when it comes to cybersecurity, as a recent study by the Pew Research Center alluded to. Here are a few security mistakes to be aware\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-22T09:35:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T11:58:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_291627647-623x410-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/22\\\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/22\\\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Ignoring software updates? You\u2019re making one of five basic security mistakes\",\"datePublished\":\"2017-05-22T09:35:52+00:00\",\"dateModified\":\"2019-05-29T11:58:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/22\\\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\\\/\"},\"wordCount\":614,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/22\\\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_291627647-623x410-1.jpg\",\"articleSection\":[\"cybercrime\",\"malware\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/22\\\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/22\\\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\\\/\",\"name\":\"Ignoring software updates? You\u2019re making one of five basic security mistakes - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/22\\\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/22\\\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_291627647-623x410-1.jpg\",\"datePublished\":\"2017-05-22T09:35:52+00:00\",\"dateModified\":\"2019-05-29T11:58:34+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/22\\\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/22\\\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/22\\\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_291627647-623x410-1.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_291627647-623x410-1.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/22\\\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ignoring software updates? You\u2019re making one of five basic security mistakes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/22\\\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ignoring software updates? You\u2019re making one of five basic security mistakes - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/","og_locale":"en_US","og_type":"article","og_title":"Ignoring software updates? You\u2019re making one of five basic security mistakes","og_description":"Cybercrime has quickly become a major problem for businesses, governments and citizens all over the globe. While awareness of this multifaceted threat is increasing, we\u2019re still making the same blunder when it comes to cybersecurity, as a recent study by the Pew Research Center alluded to. Here are a few security mistakes to be aware","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-05-22T09:35:52+00:00","article_modified_time":"2019-05-29T11:58:34+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_291627647-623x410-1.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Ignoring software updates? You\u2019re making one of five basic security mistakes","datePublished":"2017-05-22T09:35:52+00:00","dateModified":"2019-05-29T11:58:34+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/"},"wordCount":614,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_291627647-623x410-1.jpg","articleSection":["cybercrime","malware"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/","name":"Ignoring software updates? You\u2019re making one of five basic security mistakes - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_291627647-623x410-1.jpg","datePublished":"2017-05-22T09:35:52+00:00","dateModified":"2019-05-29T11:58:34+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_291627647-623x410-1.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_291627647-623x410-1.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Ignoring software updates? You\u2019re making one of five basic security mistakes"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/22\/ignoring-software-updates-youre-making-one-of-five-basic-security-mistakes\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=413"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/413\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1807"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}