{"id":179873,"date":"2024-01-09T00:24:44","date_gmt":"2024-01-09T08:24:44","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=179873"},"modified":"2024-11-20T21:55:03","modified_gmt":"2024-11-21T05:55:03","slug":"new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/","title":{"rendered":"New Year, New Tech at CES \u2014 The Latest Protection for the Latest Tech"},"content":{"rendered":"<p><span data-contrast=\"none\">New year, new tech. That\u2019s what hits the floor at the CES show each January in Las Vegas. Whether it\u2019s striking, strange, or just pretty cool, plenty of this year\u2019s tech is connected \u2014 and that means it needs to get protected.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Already we\u2019ve seen a personal health scanner that works like a tricorder from Star Trek, smart belts that help people with limited vision get around safely, and smart locks that open your door with the palm of your hand.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Coursing through all these connected devices are data and info \u2014 data and info about you. Your family. Your home. Your comings and goings. The kind of data and info that all kinds of people want to get their hands on.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">That\u2019s where protection comes in.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Any device connected to the internet must be protected. Even if it\u2019s something as innocuous as a smart wall outlet. The reason is, your home network is only as strong as its weakest security link. And many smart devices don\u2019t come with the best security out of the box. Hackers know this. By compromising a device like a smart wall outlet, a hacker can gain access to the rest of the network and the devices and data on it.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">But how do you protect a smart wall outlet, along with that smart coffeemaker, door lock, and refrigerator? We\u2019ll run it down for you, plus advice for keeping the latest in medical, fitness, and mobile devices safe as well.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">How to protect your new tech<\/span><\/b><\/h2>\n<p><span data-contrast=\"none\">Broadly speaking, you can protect most of your tech with a handful of steps. Whether it\u2019s a new Wi-Fi router, smartwatch, or even a connected fridge, they can all benefit from the following basics.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Use strong, unique passwords.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">When it\u2019s time to set up a new account or device, go with a strong, unique password. Strong means a mix of at least 12 characters, if not more. That includes a mix of numbers, symbols, and both letter cases, upper and lower. Unique means you don\u2019t repeat it across accounts. That way, if one password gets compromised, the rest will remain secure.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Why strong and unique? Given today\u2019s computing power, a hacker\u2019s password generator can create millions of passwords in seconds. Weak passwords have no chance against them. It\u2019s a simple matter of statistics.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Consider a password that uses eight numbers, uppercase and lowercase letters, and symbols. Sounds pretty strong, right? Unfortunately, a brute-force attack <\/span><span data-contrast=\"none\">might<\/span><span data-contrast=\"none\"> crack that password in as fast as one second. One second \u2026\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<table data-tablestyle=\"MsoTableGrid\" data-tablelook=\"1184\" aria-rowcount=\"4\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"65536\"><b><span data-contrast=\"none\">Password Length<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">(Using numbers, uppercase<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">and lowercase letters, and symbols)<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><b><span data-contrast=\"none\">Time to Crack<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"65536\"><span data-contrast=\"none\">8<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">One Second<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td data-celllook=\"65536\"><span data-contrast=\"none\">12<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">Eight Months<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"4\">\n<td data-celllook=\"65536\"><span data-contrast=\"none\">16<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"none\">16 Million Years<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">However, increase that password length to twelve numbers, uppercase and lowercase letters, and symbols \u2014 it\u2019d that eight months to crack that password. Bump it up to 16, and it would take 16 million years. The longer it is, the more complex it is. And thus tougher to crack. It\u2019s the difference between one second and 16 million years. And if a hacker\u2019s brute-force attack on one password takes too long, it\u2019ll simply move onto the next one.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">A <a href=\"https:\/\/www.mcafee.com\/learn\/password-manager\/\">password manager<\/a> can help create strong, unique passwords for you. <\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-total-protection.html\"><span data-contrast=\"none\">Also found in comprehensive online protection software, a password manager<\/span><\/a><span data-contrast=\"none\"> can create and securely store strong and unique passwords for your mom and dad, giving them one less thing they need to remember and worry about.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Use multi-factor authentication<\/span><\/b><\/p>\n<p><span data-contrast=\"none\">Online banks, shops, and other services commonly offer <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/\"><span data-contrast=\"none\">multi-factor authentication<\/span><\/a><span data-contrast=\"none\"> to help protect your accounts \u2014 with the typical combination of your username, password, and a security code sent to another device you own (often a mobile phone).\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">If your device or account supports multi-factor authentication, consider using it there too. It throws a big barrier in the way of hackers who try and force their way into your device with a password\/username combination.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Keep everything updated<\/span><\/b><\/p>\n<p><span data-contrast=\"none\">Update your apps and devices regularly.<\/span> <span data-contrast=\"none\">In addition to fixing the odd bug or adding the occasional new feature, app and device updates often address security gaps. Out-of-date apps and devices might have flaws that hackers can exploit, so regular updating is a must from a security standpoint. If you can set your apps and devices to receive automatic updates, even better.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Keep in mind that this very much applies to smart home devices as well.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Secure your internet router<\/span><\/b><\/p>\n<p><span data-contrast=\"none\">Another device that needs good password protection is your internet router. Make sure you use a strong and unique password there as well to help prevent hackers from breaking into your home network.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Also consider changing the name of your home network so that it doesn\u2019t personally identify you. Fun alternatives to using your name or address include everything from movie lines like \u201cMay the Wi-Fi be with you\u201d to old sitcom references like \u201cCentral Perk.\u201d Also check that your router is using an encryption method, like WPA2 or the newer WPA3, which will keep your signal secure.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Protect (your) everything<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\"><span data-contrast=\"none\">Comprehensive online protection software<\/span><\/a><span data-contrast=\"none\"> can secure your phones, tablets, and computers. Moreover, it can protect your privacy, identity, and spot scam texts, messages, and links \u2014 just to name a few of the many things it can do.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Moreover, these devices often connect to other devices on your home network. In a way, they act as a remote control for smart home devices like thermostats, alarms, and door locks. Protecting phones, tablets, and computers thus protect those other devices by extension.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">How to protect your smart home devices<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">The smarts behind a smart home come from you. At least when it comes to keeping it more private and secure. The thing with smart home devices is this, they\u2019re connected. And anything that gets connected gets protected. That can look a little different for these devices than it does for your computers and phones, yet there are steps you can take.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Reset the factory password<\/span><\/b><\/p>\n<p><span data-contrast=\"none\">Many smart home and internet of things (IOT) devices come with preset usernames and passwords from the factory. So much so, that you can easily find lists of stock usernames and passwords for these devices posted online where hackers can get a hold of them.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">In the past, we\u2019ve seen all kinds of attacks occur when these credentials don\u2019t get changed. Among them are stories of hacked baby monitors where attackers take control of the camera and speakers. So just as you do for your other devices and accounts, create a fresh username and pair it with a strong, unique password as outlined above.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Upgrade to a newer internet router<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Likewise, older routers might have outdated security measures, which might make them more prone to attacks. If you\u2019re renting yours from your internet provider, contact them for an upgrade. If you\u2019re using your own, visit a reputable news or review site such as Consumer Reports for a list of the best routers that combine speed, capacity, and security.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Set up a guest network specifically for your IoT devices<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Just as you can offer your guests secure access that\u2019s separate from your own devices, creating an additional network on your router allows you to keep your computers and smartphones separate from IoT devices. This way, if an IoT device is compromised, a hacker will still have difficulty accessing your other devices on your primary network, the one where you connect your computers and smartphones.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">One more note \u2014 research the manufacturer<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">One of the strongest security measures you can take is research. Before purchasing, look up the manufacturer. Have they had security issues with their devices in the past? Are their devices well-reviewed? How about their privacy policy? What are they doing with your data?\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">It can get a little tricky tracking down that kind of info, yet you have a couple of great places to start. One is Consumer Reports and their thorough reviews of devices and tech. Another resource is <\/span><a href=\"https:\/\/foundation.mozilla.org\/en\/privacynotincluded\/\"><span data-contrast=\"none\">Mozilla Foundation\u2019s \u201cPrivacy Not Included\u201d site<\/span><\/a><span data-contrast=\"none\">, which reviews connected products like smart home and IoT devices for safety and security.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">How to protect your telemedicine visits<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">For a quick check-in, a prescription consultation, or just a conversation with a healthcare pro, telemedicine has firmly established itself as a viable option for many types of care. Of course, the info discussed and shared in such a visit can be sensitive.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Use a VPN<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">A <a href=\"https:\/\/www.mcafee.com\/en-us\/vpn.html\">VPN<\/a>, or virtual private network, offers a strong layer of additional protection when you\u2019re transmitting health data or having a private conversation about your health with a professional. A VPN creates an encrypted tunnel to keep you and your activity anonymous. In effect, your data is scrambled and hidden to anyone outside your VPN tunnel, thus making your private info difficult to collect. Check with the care provider to see if their telemedicine solution uses a VPN. If not, <\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/vpn.html\"><span data-contrast=\"none\">you can always get a VPN as part of your online protection software<\/span><\/a><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Check in with your provider<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">If you\u2019re considering a virtual doctor visit, now\u2019s a great chance to check in with your care provider before your appointment. This way, you can get comfortable with what your visit will look like, find out what special apps (if any) are used, and how your care provider will protect your privacy. Also, you can decide which device you\u2019ll use and where you\u2019ll use it so that you feel at ease during your virtual visit.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">A reputable care provider will likely put all this pre-appointment info together for you on their website or \u201cfrequently asked questions\u201d (FAQ) page, which will include helpful links and numbers to call if you need help or have questions. For an example of what that might look like, <\/span><a href=\"https:\/\/www.vmfh.org\/our-services\/virtual-urgent-care\"><span data-contrast=\"none\">check out the telemedicine page that Virginia Mason\/Franciscan Health designed for its patients<\/span><\/a><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Pick a private place<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">We\u2019ve talked plenty about digital security, yet there\u2019s the old-fashioned issue of physical eavesdropping to think about too. When it\u2019s time for your actual appointment, pick a place in your home where you can ensure yourself some privacy. (Of course, don\u2019t go online for your virtual appointment in a public place.) Look for a space where you can\u2019t be overheard by neighbors and passers-by \u2014 preferably someplace like your bedroom where you can be comfortable as well.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">How to protect your fitness and wearable devices<\/span><\/b><\/h2>\n<p><span data-contrast=\"none\">By design, many wearables are big on data collection. Coursing through them are all kinds of data, about your vital signs, sleep patterns, not to mention your whereabouts \u2014 like when and where you like to run on your hill training days. Keeping these devices secure means keeping some of your most personal info secure as well.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">As always, research the manufacturer<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Very similar to what we mentioned about smart home and IoT devices, check the manufacturer\u2019s track record. Read reviews. Hit up trusted sources. In all, find out how private and secure your device is. The same resources listed above can help you make an informed purchase.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">When it comes to privacy, not all privacy policies are equal. The same goes for their privacy policies. Reading the privacy policy will tell you what kind of data the device collects. Further, it will show if and how it\u2019s shared with the manufacturer and if they sell or share it with others. Likewise, you can factor what you find into your purchasing decision.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Adjust the privacy settings<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">This will vary from device to device as well, yet one more way you can lock down your privacy is in the device settings. Look for options around location tracking, social media sharing, and what types of data are shared online in addition to the device. Overall, consider what kind of fitness data it gathers and where it goes. If you\u2019re not comfortable with that data ending up in the hands of a stranger, make it private.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">When upgrading to a new device, wipe your old one.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Along the same lines, that old wearable of yours might be chock full of data. Before passing it along, selling it, or recycling it, wipe it. Remove all the old data by restoring it to factory settings (your manufacturer can show you how).\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Also, delete any old online account associated with it if you have no more use for it. See to it that any data with that account gets deleted as well, which leaves you with one less account that could wind up the target of a data breach. A service like our own McAfee Online Account Cleanup can help, which you can find in <\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\"><span data-contrast=\"none\">our McAfee+ plans<\/span><\/a><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">How to protect your mobile devices<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Certainly, if there\u2019s one device that works like the remote control for our lives, it\u2019s our smartphone. Smartphones and mobile devices like them need protection too \u2014 in their own right, and because they connect to so much more.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Avoid third-party app stores<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Google Play and Apple\u2019s App Store have measures in place to review and vet apps to help ensure that they are safe and secure. Third-party sites might very well not, and they might intentionally host malicious apps as part of a front. Further, Google and Apple are quick to remove malicious apps from their stores when discovered, making shopping there safer still.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Review apps carefully<\/span><\/b><\/p>\n<p><span data-contrast=\"none\">Check out the developer \u2014 have they published several other apps with many downloads and good reviews? A legit app typically has quite a few reviews, whereas malicious apps might have only a handful of (phony) five-star reviews. Lastly, look for typos and poor grammar in both the app description and screenshots. They could be a sign that a hacker slapped the app together and quickly deployed it.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Yet better than combing through user reviews yourself is getting a recommendation from a trusted source, like a well-known publication or from app store editors themselves. In this case, much of the vetting work has been done for you by an established reviewer. A quick online search like \u201cbest fitness apps\u201d or \u201cbest apps for travelers\u201d should turn up articles from legitimate sites that can suggest good options and describe them in detail before you download.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Keep an eye on app permissions<\/span><\/b><\/p>\n<p><span data-contrast=\"none\">Another way hackers weasel their way into your device is by getting permissions to access things like your location, contacts, and photos \u2014 and they\u2019ll use malicious apps to do it. If an app asks for way more than you bargained for, like a simple puzzle game that asks for access to your camera or microphone, it might be a scam. Delete the app.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Lock your phone \u2014 and keep an eye on it too<\/span><\/b><\/p>\n<p><span data-contrast=\"none\">Some bad actors will try to install spyware on phones themselves. However, this requires access, time, and effort to pull off. Locking your phone and always keeping it close can help prevent bad actors from infecting your phone this way.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Another step you can take is to familiarize yourself with the remote locking and wiping features of your mobile device. Many manufacturers offer this feature on mobile devices. Strongly consider using it in the event of loss or theft.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>New year, new tech. That\u2019s what hits the floor at the CES show each January in Las Vegas. Whether it\u2019s&#8230;<\/p>\n","protected":false},"author":1407,"featured_media":179964,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661],"tags":[],"coauthors":[15735],"class_list":["post-179873","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Year, New Tech at CES \u2014 The Latest Protection for the Latest Tech | McAfee Blog<\/title>\n<meta name=\"description\" content=\"New year, new tech. That\u2019s what hits the floor at the CES show each January in Las Vegas. Whether it\u2019s striking, strange, or just pretty cool, plenty of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Year, New Tech at CES \u2014 The Latest Protection for the Latest Tech | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"New year, new tech. That\u2019s what hits the floor at the CES show each January in Las Vegas. Whether it\u2019s striking, strange, or just pretty cool, plenty of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-09T08:24:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-21T05:55:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/01\/300x200_headphones.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jasdev Dhaliwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jasdev Dhaliwal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/\"},\"author\":{\"name\":\"Jasdev Dhaliwal\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\"},\"headline\":\"New Year, New Tech at CES \u2014 The Latest Protection for the Latest Tech\",\"datePublished\":\"2024-01-09T08:24:44+00:00\",\"dateModified\":\"2024-11-21T05:55:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/\"},\"wordCount\":2534,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/01\/300x200_headphones.jpg\",\"articleSection\":[\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/\",\"name\":\"New Year, New Tech at CES \u2014 The Latest Protection for the Latest Tech | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/01\/300x200_headphones.jpg\",\"datePublished\":\"2024-01-09T08:24:44+00:00\",\"dateModified\":\"2024-11-21T05:55:03+00:00\",\"description\":\"New year, new tech. That\u2019s what hits the floor at the CES show each January in Las Vegas. Whether it\u2019s striking, strange, or just pretty cool, plenty of\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/01\/300x200_headphones.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/01\/300x200_headphones.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"New Year, New Tech at CES \u2014 The Latest Protection for the Latest Tech\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\",\"name\":\"Jasdev Dhaliwal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"caption\":\"Jasdev Dhaliwal\"},\"description\":\"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jasdhaliwal\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Year, New Tech at CES \u2014 The Latest Protection for the Latest Tech | McAfee Blog","description":"New year, new tech. That\u2019s what hits the floor at the CES show each January in Las Vegas. Whether it\u2019s striking, strange, or just pretty cool, plenty of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"New Year, New Tech at CES \u2014 The Latest Protection for the Latest Tech | McAfee Blog","og_description":"New year, new tech. That\u2019s what hits the floor at the CES show each January in Las Vegas. Whether it\u2019s striking, strange, or just pretty cool, plenty of","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-01-09T08:24:44+00:00","article_modified_time":"2024-11-21T05:55:03+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/01\/300x200_headphones.jpg","type":"image\/jpeg"}],"author":"Jasdev Dhaliwal","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Jasdev Dhaliwal","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/"},"author":{"name":"Jasdev Dhaliwal","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f"},"headline":"New Year, New Tech at CES \u2014 The Latest Protection for the Latest Tech","datePublished":"2024-01-09T08:24:44+00:00","dateModified":"2024-11-21T05:55:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/"},"wordCount":2534,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/01\/300x200_headphones.jpg","articleSection":["Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/","name":"New Year, New Tech at CES \u2014 The Latest Protection for the Latest Tech | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/01\/300x200_headphones.jpg","datePublished":"2024-01-09T08:24:44+00:00","dateModified":"2024-11-21T05:55:03+00:00","description":"New year, new tech. That\u2019s what hits the floor at the CES show each January in Las Vegas. Whether it\u2019s striking, strange, or just pretty cool, plenty of","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/01\/300x200_headphones.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/01\/300x200_headphones.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/new-year-new-tech-at-ces-the-latest-protection-for-the-latest-tech\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"New Year, New Tech at CES \u2014 The Latest Protection for the Latest Tech"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f","name":"Jasdev Dhaliwal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","caption":"Jasdev Dhaliwal"},"description":"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.","sameAs":["https:\/\/www.linkedin.com\/in\/jasdhaliwal\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/179873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1407"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=179873"}],"version-history":[{"count":8,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/179873\/revisions"}],"predecessor-version":[{"id":205037,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/179873\/revisions\/205037"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/179964"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=179873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=179873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=179873"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=179873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}