{"id":1375032,"date":"2023-07-04T14:14:37","date_gmt":"2023-07-04T14:14:37","guid":{"rendered":"https:\/\/www.collaboris.com\/?p=1375032"},"modified":"2023-08-03T11:08:25","modified_gmt":"2023-08-03T11:08:25","slug":"cybersecurity-best-practices-safe-web-browsing","status":"publish","type":"post","link":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/","title":{"rendered":"Cybersecurity best practices : Safe web browsing"},"content":{"rendered":"<h1>Cybersecurity best practices : Safe Web Browsing<\/h1>\n<p><span><img decoding=\"async\" alt=\"image showing safe web browsing\" data-id=\"1373620\" width=\"1078\" data-init-width=\"2560\" height=\"353\" data-init-height=\"838\" title=\"safe web browsing\" loading=\"lazy\" src=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2022\/10\/securepolicyimage-scaled-e1666259172510.jpg?_t=1688481031\" data-link-wrap=\"true\" data-width=\"1078\" data-height=\"353\" style=\"aspect-ratio: auto 2560 \/ 838;\"><\/span><\/p>\n<p>In today&#8217;s digital age, it is crucial to be vigilant and cautious while browsing the internet. With the increasing number of malicious websites, fake online shopping sites, and other online scams, it is important to educate ourselves on how to recognize and avoid these potential threats. By following a few simple steps, we can protect ourselves from falling victim to cybercriminals.<\/p>\n<h2 data-block-id=\"block-3733a0a9-a465-4368-8e11-c3f7ecd3dd23\" style=\"\">Checking for Secure Connections (HTTPS)<\/h2>\n<p>One of the first things to look out for when visiting a website is the presence of a secure connection. This can be identified by checking if the website&#8217;s URL begins with &#8220;https:\/\/&#8221; instead of just &#8220;<a href=\"\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">http:\/\/&#8221;<\/a>. The &#8220;s&#8221; in &#8220;https&#8221; stands for secure, indicating that the website has implemented SSL (Secure Sockets Layer) encryption. SSL encryption ensures that any data exchanged between your browser and the website remains private and cannot be intercepted by hackers.<\/p>\n<p>It is important to note that while the presence of HTTPS is a good indicator of a secure connection, it does not guarantee the legitimacy or trustworthiness of the website itself. Therefore, it is essential to take additional steps to verify the credibility of the website.<\/p>\n<h2 data-block-id=\"block-ca8eb085-19f8-4f36-a68b-ca151a4d2042\" style=\"\">Verifying Website Credibility<\/h2>\n<p>To determine the credibility of a website, there are several factors to consider:<\/p>\n<ol>\n<li><strong>Domain Name<\/strong>: Pay attention to the domain name of the website. Cybercriminals often create fake websites with URLs that closely resemble legitimate ones. For example, they might replace letters with similar-looking characters or add extra words. Always double-check the spelling and ensure that the domain matches the official website you intend to visit.<\/li>\n<li><strong>Website Design<\/strong>: Legitimate websites usually invest in professional design and user experience. If a website appears poorly designed, contains numerous grammatical errors, or lacks contact information, it may be a red flag indicating a potential scam.<\/li>\n<li><strong>Customer Reviews<\/strong>: Look for customer reviews or testimonials about the website. Genuine websites often have a section where customers can share their experiences. Take the time to read these reviews and consider the overall sentiment. If there are numerous negative reviews or if the website lacks any reviews at all, it is wise to exercise caution.<\/li>\n<li><strong>Contact Information<\/strong>: Legitimate websites typically provide clear and easily accessible contact information, including a physical address, phone number, and email address. If this information is missing or difficult to find, it may indicate that the website is not trustworthy.<\/li>\n<li><strong>Trust Seals<\/strong>: Some reputable websites display trust seals or badges from recognized security organizations or certification authorities. These seals indicate that the website has undergone security checks and adheres to certain standards. However, keep in mind that some scammers may also use fake trust seals, so it is important to verify their authenticity.<\/li>\n<\/ol>\n<p>By considering these factors and conducting thorough research, you can make an informed decision about the credibility of a website before providing any personal or financial information.<\/p>\n<p>  <span style=\"\"><img decoding=\"async\" alt=\"\" data-id=\"1375149\" width=\"196\" data-init-width=\"847\" height=\"276\" data-init-height=\"1196\" title=\"essential guide to cybersecurity ebook cropped\" loading=\"lazy\" src=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/08\/essential-guide-to-cybersecurity-ebook-cropped.png?_t=1690979525\" data-link-wrap=\"true\" data-width=\"196\" data-height=\"276\" style=\"aspect-ratio: auto 847 \/ 1196;\" ml-d=\"0\" mt-d=\"0\" center-h-d=\"true\" ml-m=\"0\" mt-m=\"0\" ml-t=\"0\" mt-t=\"0\"><\/span><\/p>\n<h3 style=\"color: rgb(52, 52, 52) !important; --tcb-applied-color:#343434 !important;\">Get your free cybersecurity best practices guide<\/h3>\n<p style=\"\">This eBook contains all 10 posts in our cybersecurity series in one handy downloadable guide so you can read it at your leisure.<\/p>\n<p>__CONFIG_colors_palette__{&#8220;active_palette&#8221;:0,&#8221;config&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;name&#8221;:&#8221;Main Accent&#8221;,&#8221;parent&#8221;:-1}},&#8221;gradients&#8221;:[]},&#8221;palettes&#8221;:[{&#8220;name&#8221;:&#8221;Default Palette&#8221;,&#8221;value&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;val&#8221;:&#8221;rgb(0, 47, 64)&#8221;}},&#8221;gradients&#8221;:[]},&#8221;original&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;val&#8221;:&#8221;rgb(19, 114, 211)&#8221;,&#8221;hsl&#8221;:{&#8220;h&#8221;:210,&#8221;s&#8221;:0.83,&#8221;l&#8221;:0.45,&#8221;a&#8221;:1}}},&#8221;gradients&#8221;:[]}}]}__CONFIG_colors_palette__ <a href=\"https:\/\/www.collaboris.com\/cybersecurity-guide\/\" target=\"_blank\" rel=\"noopener\"><span style=\"\">    <\/span> <span style=\"\"><span data-tcb_hover_state_parent=\"\" style=\"\">Get y<span style=\"background-color: transparent;\"><\/span>our free eBook<\/span><\/span> <\/a>  <\/p>\n<h2 style=\"\">Using Ad-blockers and Pop-up Blockers<\/h2>\n<p>Another effective way to protect yourself while browsing the internet is by using ad-blockers and pop-up blockers. These tools help prevent intrusive advertisements and pop-ups from appearing on your screen. While not directly related to identifying malicious websites, they can significantly reduce the chances of accidentally clicking on deceptive ads or falling victim to phishing attempts.<\/p>\n<p>Ad-blockers work by blocking advertisements from loading on web pages, which can help prevent malicious ads from being displayed. Pop-up blockers, on the other hand, prevent unwanted pop-up windows from opening automatically. By using these tools, you can create a safer and more streamlined browsing experience.<\/p>\n<p>In conclusion, recognizing and avoiding malicious websites, fake online shopping sites, and other online scams requires a combination of vigilance, knowledge, and the use of appropriate tools. By checking for secure connections (HTTPS), verifying website credibility, and utilizing ad-blockers and pop-up blockers, you can significantly reduce the risk of falling victim to cybercriminals. Stay informed, stay cautious, and protect yourself while enjoying the vast opportunities that the internet has to offer.<\/p>\n<h2 style=\"\">Other posts in this series:<\/h2>\n<p><a href=\"https:\/\/www.collaboris.com\/essential-cybersecurity-guide\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Introduction to cyber security<\/a><\/p>\n<ol>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-password-management\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Password management<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-malware\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Social engineering<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Phishing scams<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Social media security<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Wi-Fi and network security<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Mobile device security<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Data protection and backup<\/a><\/li>\n<li>Safe web browsing (this post)<\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Incident reporting<\/a><\/li>\n<\/ol>\n<h2 style=\"\">You may also like:<\/h2>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\" title=\"Cybersecurity best practices : Incident reporting\" data-css=\"\">Cybersecurity best practices : Incident reporting<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Incident reportingThe security of systems and data is of utmost <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#more-1375042\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\" title=\"Cybersecurity best practices : Safe web browsing\" data-css=\"\">Cybersecurity best practices : Safe web browsing<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Safe Web BrowsingIn today&#8217;s digital age, it is crucial to <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#more-1375032\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\" title=\"Cybersecurity best practices : Data protection and back up\" data-css=\"\">Cybersecurity best practices : Data protection and back up<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Data protection and backupRegularly backing up important data and storing <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#more-1375019\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/\" title=\"Cybersecurity best practices : Mobile device security\" data-css=\"\">Cybersecurity best practices : Mobile device security<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Mobile device securityMobile devices pose various security risks that can <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/#more-1375003\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/\" title=\"Cybersecurity best practices : Wi-Fi and Network security\" data-css=\"\">Cybersecurity best practices : Wi-Fi and Network security<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Wi-Fi and Network securityThe Risks of Unsecured Wi-Fi NetworksConnecting to <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/#more-1374983\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\" title=\"Cybersecurity best practices : Social media security\" data-css=\"\">Cybersecurity best practices : Social media security<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Social media securitySocial media security refers to the measures taken <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#more-1374967\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity best practices : Safe Web Browsing In today&#8217;s digital age, it is crucial to be vigilant and cautious while browsing the internet. With the increasing number of malicious websites, fake online shopping sites, and other online scams, it is important to educate ourselves on how to recognize and avoid these potential threats. By following [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":2109,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[6],"tags":[],"class_list":["post-1375032","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-policy-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity best practices : Safe web browsing<\/title>\n<meta name=\"description\" content=\"With increasing numbers of malicious websites, fake online shopping sites, and other scams, it is important know how to recognize and avoid them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity best practices : Safe web browsing\" \/>\n<meta property=\"og:description\" content=\"In today&#039;s digital age, it is crucial to be vigilant and cautious while browsing the internet. With the increasing number of malicious websites, fake online shopping sites, and other online scams, it is important to educate ourselves on how to recognize and avoid these potential threats. By following a few simple steps, we can protect ourselves from falling victim to cybercriminals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\" \/>\n<meta property=\"og:site_name\" content=\"Collaboris\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Collaboris\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-04T14:14:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-03T11:08:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2022\/10\/securepolicyimage-scaled-e1666259172510.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"838\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Helen Jones\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@helen.jones@collaboris.co.uk\" \/>\n<meta name=\"twitter:site\" content=\"@Collaboris\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Helen Jones\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\"},\"author\":{\"name\":\"Helen Jones\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef\"},\"headline\":\"Cybersecurity best practices : Safe web browsing\",\"datePublished\":\"2023-07-04T14:14:37+00:00\",\"dateModified\":\"2023-08-03T11:08:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\"},\"wordCount\":908,\"publisher\":{\"@id\":\"https:\/\/www.collaboris.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"articleSection\":[\"Policy Management\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\",\"url\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\",\"name\":\"Cybersecurity best practices : Safe web browsing\",\"isPartOf\":{\"@id\":\"https:\/\/www.collaboris.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"datePublished\":\"2023-07-04T14:14:37+00:00\",\"dateModified\":\"2023-08-03T11:08:25+00:00\",\"description\":\"With increasing numbers of malicious websites, fake online shopping sites, and other scams, it is important know how to recognize and avoid them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#primaryimage\",\"url\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"contentUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"width\":820,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.collaboris.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity best practices : Safe web browsing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.collaboris.com\/#website\",\"url\":\"https:\/\/www.collaboris.com\/\",\"name\":\"Collaboris\",\"description\":\"We make compliance simple\",\"publisher\":{\"@id\":\"https:\/\/www.collaboris.com\/#organization\"},\"alternateName\":\"DocRead\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.collaboris.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.collaboris.com\/#organization\",\"name\":\"Collaboris\",\"alternateName\":\"DocRead\",\"url\":\"https:\/\/www.collaboris.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png\",\"contentUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png\",\"width\":150,\"height\":40,\"caption\":\"Collaboris\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Collaboris\/\",\"https:\/\/x.com\/Collaboris\",\"https:\/\/www.linkedin.com\/company\/collaboris\"],\"description\":\"Collaboris is a Software company that created a policy management tool called DocRead.\",\"email\":\"info@collaboris.com\",\"telephone\":\"02079935140\",\"legalName\":\"Collaboris Ltd\",\"foundingDate\":\"2007-12-03\",\"vatID\":\"GB928895360\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef\",\"name\":\"Helen Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g\",\"caption\":\"Helen Jones\"},\"sameAs\":[\"https:\/\/x.com\/helen.jones@collaboris.co.uk\"],\"url\":\"https:\/\/www.collaboris.com\/author\/helen-jones\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity best practices : Safe web browsing","description":"With increasing numbers of malicious websites, fake online shopping sites, and other scams, it is important know how to recognize and avoid them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersecurity best practices : Safe web browsing","og_description":"In today's digital age, it is crucial to be vigilant and cautious while browsing the internet. With the increasing number of malicious websites, fake online shopping sites, and other online scams, it is important to educate ourselves on how to recognize and avoid these potential threats. By following a few simple steps, we can protect ourselves from falling victim to cybercriminals.","og_url":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/","og_site_name":"Collaboris","article_publisher":"https:\/\/www.facebook.com\/Collaboris\/","article_published_time":"2023-07-04T14:14:37+00:00","article_modified_time":"2023-08-03T11:08:25+00:00","og_image":[{"width":2560,"height":838,"url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2022\/10\/securepolicyimage-scaled-e1666259172510.jpg","type":"image\/jpeg"}],"author":"Helen Jones","twitter_card":"summary_large_image","twitter_creator":"@helen.jones@collaboris.co.uk","twitter_site":"@Collaboris","twitter_misc":{"Written by":"Helen Jones","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#article","isPartOf":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/"},"author":{"name":"Helen Jones","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef"},"headline":"Cybersecurity best practices : Safe web browsing","datePublished":"2023-07-04T14:14:37+00:00","dateModified":"2023-08-03T11:08:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/"},"wordCount":908,"publisher":{"@id":"https:\/\/www.collaboris.com\/#organization"},"image":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","articleSection":["Policy Management"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/","url":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/","name":"Cybersecurity best practices : Safe web browsing","isPartOf":{"@id":"https:\/\/www.collaboris.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#primaryimage"},"image":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","datePublished":"2023-07-04T14:14:37+00:00","dateModified":"2023-08-03T11:08:25+00:00","description":"With increasing numbers of malicious websites, fake online shopping sites, and other scams, it is important know how to recognize and avoid them.","breadcrumb":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#primaryimage","url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","contentUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","width":820,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.collaboris.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity best practices : Safe web browsing"}]},{"@type":"WebSite","@id":"https:\/\/www.collaboris.com\/#website","url":"https:\/\/www.collaboris.com\/","name":"Collaboris","description":"We make compliance simple","publisher":{"@id":"https:\/\/www.collaboris.com\/#organization"},"alternateName":"DocRead","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.collaboris.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.collaboris.com\/#organization","name":"Collaboris","alternateName":"DocRead","url":"https:\/\/www.collaboris.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png","contentUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png","width":150,"height":40,"caption":"Collaboris"},"image":{"@id":"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Collaboris\/","https:\/\/x.com\/Collaboris","https:\/\/www.linkedin.com\/company\/collaboris"],"description":"Collaboris is a Software company that created a policy management tool called DocRead.","email":"info@collaboris.com","telephone":"02079935140","legalName":"Collaboris Ltd","foundingDate":"2007-12-03","vatID":"GB928895360","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef","name":"Helen Jones","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g","caption":"Helen Jones"},"sameAs":["https:\/\/x.com\/helen.jones@collaboris.co.uk"],"url":"https:\/\/www.collaboris.com\/author\/helen-jones\/"}]}},"modified_by":"Helen Jones","_links":{"self":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1375032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/comments?post=1375032"}],"version-history":[{"count":32,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1375032\/revisions"}],"predecessor-version":[{"id":1375172,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1375032\/revisions\/1375172"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/media\/2109"}],"wp:attachment":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/media?parent=1375032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/categories?post=1375032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/tags?post=1375032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}