{"id":130,"date":"2020-01-23T06:31:36","date_gmt":"2020-01-23T06:31:36","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=130"},"modified":"2020-02-05T08:25:53","modified_gmt":"2020-02-05T08:25:53","slug":"dealing-with-common-cyber-problems","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/dealing-with-common-cyber-problems\/","title":{"rendered":"Dealing with common cyber problems"},"content":{"rendered":"\n<ul class=\"wp-block-list\"><li>I have been hacked. How do I recover my account?<\/li><li>Should I pay a ransom to unlock my computer?<\/li><li>My username and password have been stolen<\/li><li>I might have malware on my device<\/li><li>I&#8217;ve received a suspicious email<\/li><li>I am worried that my banking details have been stolen<\/li><\/ul>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed    solutions to automated, manage threat intelligence, forensic    investigations and cyber security training. Our objective is to support    organisations and consumers at every step of their cyber maturity    journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a>  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>I have been hacked. How do I recover my account? Should I pay a ransom to unlock my computer? My username and password have been stolen I might have malware on my device I&#8217;ve received a suspicious email I am worried that my banking details have been stolen iTM covers all aspects of cybersecurity from &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/dealing-with-common-cyber-problems\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Dealing with common cyber problems&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[16,18,19,10,9],"tags":[],"class_list":["post-130","post","type-post","status-publish","format-standard","hentry","category-cyber-crime","category-cyber-security-best-practice","category-home-cyber-security","category-ransomware","category-training"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=130"}],"version-history":[{"count":2,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/130\/revisions"}],"predecessor-version":[{"id":156,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/130\/revisions\/156"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}