{"id":90258,"date":"2018-07-10T06:00:20","date_gmt":"2018-07-10T13:00:20","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=90258"},"modified":"2025-08-30T03:35:53","modified_gmt":"2025-08-30T10:35:53","slug":"cybersecurity-health","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/","title":{"rendered":"Time to Take a Good, Hard Look at Your Cybersecurity Health"},"content":{"rendered":"<p>What happens when your livelihood is at stake, thanks to someone stealing your identity or draining your account? The real-life possibilities are nerve-wracking, to say the least. The constant barrage of cyberthreats we face as consumers today is exhausting. Just this month, two major situations were revealed.\u00a0 A Florida marketing firm, <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/exactis-data-breach\/\" target=\"_blank\" rel=\"noopener\">Exactis, had their database on a publicly accessible server<\/a>. The information exposed ranged from phone numbers, home, and email addresses to the number, age, and gender of a customer\u2019s children. As of now, social security numbers and credit card data have not been leaked. However, what makes this breach particularly anxiety-inducing is that now cybercriminals have the ability to improve the success rate of socially engineered attacks. For example, phishing attacks could become rampant through social media and email.<\/p>\n<p>To add insult to injury, last week, researchers found a way to discover everything you type and read on your phone simply by studying <a href=\"https:\/\/0f675898-a-62cb3a1a-s-sites.googlegroups.com\/site\/silbersteinmark\/Home\/popets18power.pdf?attachauth=ANoY7cphegkM1y1tiqY6i9Z4a_pdnpODns82UsnME4XjdkVt69dIFRSYKnja8Y1qEPp5oUtymT1tQE1-xMsUCyClH0WS6WdEuOvwIuZE8L6SG_Pn43yWJdreHEwOyV8cyPvJFIn46XNhWCBxqKMn2GeU0uL0xbJKm5txhu_rnbIFopPFQhLkyBS1_Z2mhRUpBNWFof_aeJk6NEXuf2hqQMs44i_5n2-VpBa4nJHCJZvlJhic511tQjw%3D&amp;attredirects=1\" target=\"_blank\" rel=\"noopener\">the differing power levels of a\u00a0smart battery<\/a>. By implanting a\u00a0micro-controller into a phone&#8217;s battery, they could record the power flowing in and out of the device. Then, with the use of AI, power flows were matched with specific keystrokes. Using this technique, the researchers proved that cybercriminals could record passwords, monitor website activity, access call records, and know the last time the camera was used. Smart batteries are attractive targets because they are <a href=\"https:\/\/www.theregister.co.uk\/2018\/06\/25\/the_battery_is_the_smartphones_ibesti_snitch_boffins\" target=\"_blank\" rel=\"noopener\">not as secure as your phone<\/a>. In fact, they expose all personal data. While the possibilities are stressful, the good news is that this attack remains theoretical.<\/p>\n<p>The seemingly endless string of security events and the stress they cause can take a serious toll on our well-being. While we can\u2019t prevent breaches from occurring, it\u2019s important to remember that we can be prepared to take the right steps to minimize any damage when one hits. Whether we\u2019re dealing with the repercussions of a data breach, or adapting to new vulnerabilities, developing positive security habits can help improve and maintain your digital health. Taking care of your mobile devices to ensure they remain secure \u2013 and therefore optimally functional \u2013 is like taking care of your own well-being; to maintain cybersecurity health, you have to perform basic upkeep.<\/p>\n<h2>Tips to Protect Agains Data Breach<\/h2>\n<p>To help you prepare in advance for the next data breach and ensure your device remains in good cybersecurity health, here are some habits you should consider picking up, stat:<\/p>\n<ul>\n<li><span style=\"text-decoration: underline;\">Be aware of your surroundings.<\/span> Mindfulness is a habit that can be developed, provides almost instant results, can support longevity, general awareness and well-being. We can learn a lot from mindfulness when it comes to cybersecurity. By taking a little bit of time to be aware of our surroundings, we can prevent vulnerabilities and potential threats simply by paying attention.<\/li>\n<li><span style=\"text-decoration: underline;\">Set up alerts.<\/span> Just like going to a doctor regularly for check-ups, you should \u201ccheck-up\u201d on your accounts. Not all data breaches expose financial data, but personal data that is leaked can still be used to access your financial accounts. Talk with your bank or financial planner about setting up a fraud alert on your cards to maintain control of your accounts.<\/li>\n<li><span style=\"text-decoration: underline;\">Stay away from untrustworthy emails or messages.<\/span> The mantra \u201cno bad vibes\u201d is surprisingly full of wisdom. Ridding your life of energy suckers and toxic people supports health \u2013 and the same goes for malicious messages. If you see a suspect item from an unknown source in your inbox or via a direct message or comment on social media, do not click on the message. If you do open it, be sure not to click on any links. To be safe, delete the email or message altogether.<\/li>\n<li><span style=\"text-decoration: underline;\">Avoid public Wi-Fi when possible.<\/span> Just as sleep is a panacea of sorts that helps to fight off bugs, giving your phone a break from public Wi-Fi is one of the best things you can do to ensure your cybersafety. The use of public Wi-Fi can offer cybercriminals a backdoor into your phone. By spoofing a legitimate website, they can gain access to your sensitive information. Give your device a much-needed break until you can use Wi-Fi you trust, you\u2019ll save yourself a serious headache.<\/li>\n<li><span style=\"text-decoration: underline;\">Switch up your passwords.<\/span>\u00a0It\u2019s been said that variety is the spice of life, the secret to a happy relationship, and a way to stay engaged and aware in old age. The same is true when it comes to your passwords. When you mix it up, you keep cybercriminals guessing. Passwords are your data\u2019s <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/security-world-password-day\/\" target=\"_blank\" rel=\"noopener\">first defense against cybercriminals<\/a>. Be sure to change them every so often and never use \u201c1234\u201d or \u201cpassword.\u201d If remembering a difficult password or remembering a multitude of them is hard, consider using a password manager.<\/li>\n<li><span style=\"text-decoration: underline;\">Consider investing in identity theft protection.<\/span> Vitamins are excellent supplements to a healthy diet, adding in additional nutrition when and where you need it \u2014 but not meant to be taken as the sole way to maintain health. Identity theft protection can be a supplement of sorts to your already positive security habits. With <a href=\"https:\/\/www.mcafee.com\/consumer\/en-us\/microsite\/identity-protection\/overview.html?culture=EN-US&amp;cid=210317&amp;pir=1\" target=\"_blank\" rel=\"noopener\">McAfee Identity Theft Protection<\/a>, users can take proactive steps toward protecting their identities with personal and financial monitoring and recovery tools.<\/li>\n<\/ul>\n<p>The power of habit actually dictates <a href=\"https:\/\/hbr.org\/2012\/06\/habits-why-we-do-what-we-do\" target=\"_blank\" rel=\"noopener\">40% of our day<\/a>. As with your body and mind, the more you create healthy, positive habits, the easier it is to maintain health. The same is true for your security \u201chealth.\u201d The more you express safe habits, the easier it will become and the safer you will be \u2013 both in the short and long term.<\/p>\n<p>Interested in learning more about IoT and mobile security tips and trends? Stop by\u00a0<a href=\"https:\/\/home.mcafee.com\/root\/campaign.aspx?cid=235367\" target=\"_blank\" rel=\"noopener\">ProtectWhatMatters.online<\/a>, and follow\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a>\u00a0on Twitter, and \u2018Like\u201d us on\u00a0<a href=\"https:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener\">Facebook.<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-68611\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Radhika.jpg\" alt=\"\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika.jpg 200w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-50x50.jpg 50w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-128x128.jpg 128w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What happens when your livelihood is at stake, thanks to someone stealing your identity or draining your account? The real-life&#8230;<\/p>\n","protected":false},"author":674,"featured_media":124261,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,1838],"tags":[3949,4452,32,214],"coauthors":[3973],"class_list":["post-90258","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-mobile-security","tag-cybersafety","tag-cybersecurity","tag-data-protection","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Time to Take a Good, Hard Look at Your Cybersecurity Health<\/title>\n<meta name=\"description\" content=\"What happens when your livelihood is at stake, thanks to someone stealing your identity or draining your account? The real-life possibilities are nerve-wracking, to say the least. The constant barrage of cyberthreats we face as consumers today is exhausting.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Time to Take a Good, Hard Look at Your Cybersecurity Health\" \/>\n<meta property=\"og:description\" content=\"What happens when your livelihood is at stake, thanks to someone stealing your identity or draining your account? The real-life possibilities are nerve-wracking, to say the least. The constant barrage of cyberthreats we face as consumers today is exhausting.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-10T13:00:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-30T10:35:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Time to Take a Good, Hard Look at Your Cybersecurity Health\",\"datePublished\":\"2018-07-10T13:00:20+00:00\",\"dateModified\":\"2025-08-30T10:35:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/\"},\"wordCount\":963,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/Lock-copy-1-e1625073720182.jpeg\",\"keywords\":[\"cybersafety\",\"cybersecurity\",\"data protection\",\"mobile security\"],\"articleSection\":[\"Internet Security\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/\",\"name\":\"Time to Take a Good, Hard Look at Your Cybersecurity Health\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/Lock-copy-1-e1625073720182.jpeg\",\"datePublished\":\"2018-07-10T13:00:20+00:00\",\"dateModified\":\"2025-08-30T10:35:53+00:00\",\"description\":\"What happens when your livelihood is at stake, thanks to someone stealing your identity or draining your account? The real-life possibilities are nerve-wracking, to say the least. The constant barrage of cyberthreats we face as consumers today is exhausting.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/Lock-copy-1-e1625073720182.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/Lock-copy-1-e1625073720182.jpeg\",\"width\":247,\"height\":237,\"caption\":\"hacker attack, cyber crime concept, cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Time to Take a Good, Hard Look at Your Cybersecurity Health\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Time to Take a Good, Hard Look at Your Cybersecurity Health","description":"What happens when your livelihood is at stake, thanks to someone stealing your identity or draining your account? The real-life possibilities are nerve-wracking, to say the least. The constant barrage of cyberthreats we face as consumers today is exhausting.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Time to Take a Good, Hard Look at Your Cybersecurity Health","og_description":"What happens when your livelihood is at stake, thanks to someone stealing your identity or draining your account? The real-life possibilities are nerve-wracking, to say the least. The constant barrage of cyberthreats we face as consumers today is exhausting.","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-07-10T13:00:20+00:00","article_modified_time":"2025-08-30T10:35:53+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Time to Take a Good, Hard Look at Your Cybersecurity Health","datePublished":"2018-07-10T13:00:20+00:00","dateModified":"2025-08-30T10:35:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/"},"wordCount":963,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/Lock-copy-1-e1625073720182.jpeg","keywords":["cybersafety","cybersecurity","data protection","mobile security"],"articleSection":["Internet Security","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/","name":"Time to Take a Good, Hard Look at Your Cybersecurity Health","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/Lock-copy-1-e1625073720182.jpeg","datePublished":"2018-07-10T13:00:20+00:00","dateModified":"2025-08-30T10:35:53+00:00","description":"What happens when your livelihood is at stake, thanks to someone stealing your identity or draining your account? The real-life possibilities are nerve-wracking, to say the least. The constant barrage of cyberthreats we face as consumers today is exhausting.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/Lock-copy-1-e1625073720182.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/Lock-copy-1-e1625073720182.jpeg","width":247,"height":237,"caption":"hacker attack, cyber crime concept, cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/cybersecurity-health\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Time to Take a Good, Hard Look at Your Cybersecurity Health"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/90258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=90258"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/90258\/revisions"}],"predecessor-version":[{"id":221696,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/90258\/revisions\/221696"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/124261"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=90258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=90258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=90258"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=90258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}