{"id":30384,"date":"2020-04-24T19:47:50","date_gmt":"2020-04-24T19:47:50","guid":{"rendered":"https:\/\/www.cleverfiles.com\/howto\/?p=30384"},"modified":"2020-05-04T19:31:28","modified_gmt":"2020-05-04T19:31:28","slug":"how-to-protect-your-data-during-the-covid-19-pandemic","status":"publish","type":"post","link":"https:\/\/www.cleverfiles.com\/howto\/protect-computer-coronavirus-ransomware.html","title":{"rendered":"How to Protect Your Data from Cyberattacks"},"content":{"rendered":"<p>In an era dominated by digital data, the menace of cyberattacks looms large. Every click, every download, every online interaction can be a potential gateway for hackers. Here, we arm you with top-notch strategies to fortify your digital fortress, ensuring your personal and professional data remains protected.<\/p>\r\n<p><img class=\"border-gray border-radius-10 aligncenter wp-image-51597 size-full\" src=\"\/howto\/wp-content\/uploads\/2020\/04\/cyber-theft.jpg\" alt=\"Coronavirus covid-19 cyberattack\" width=\"1920\" height=\"971\" srcset=\"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/cyber-theft.jpg 1920w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/cyber-theft-300x152.jpg 300w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/cyber-theft-500x253.jpg 500w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/cyber-theft-768x388.jpg 768w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/cyber-theft-1536x777.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/p>\r\n<p>In the midst of global challenges, computer systems worldwide are facing a surge in cyberattacks. Malicious hackers, with no regard for ethics, are exploiting the public&#8217;s vulnerability, launching sophisticated attacks. These black-hat hackers, known for their lack of moral compass, are seizing opportunities to infiltrate, disrupt, and compromise digital security, marking a disturbing escalation in cyber warfare.<\/p>\r\n<p style=\"border-left: 3px solid #0697f8; background-color: #e5f1f9; padding: 20px;\"><span style=\"font-weight: 400;\">In this article, we will look at some of the <strong>targeted attacks that have emerged in the hopes<\/strong> that you can use this information to strengthen your data protection policies to thwart cybercriminals. We will also talk about a software tool that can be used to recover from data loss if your system is struck by one of these malevolent attacks.<\/span><\/p>\r\n<h2 style=\"padding-top: 30px;\"><span class=\"ez-toc-section\" id=\"the_rising_incidence_of_cyber_attacks\"><\/span><b>The Rising Incidence of Cyber Attacks<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">Threats to the healthcare sector as well as average citizens are on the rise in the wake of the global pandemic. Important health-related agencies like the U.S. Department of Health and Human Services (HHS) and the World Health Organization (WHO) have been repeatedly <\/span><a href=\"https:\/\/thehill.com\/policy\/cybersecurity\/490232-cyber-threats-spike-during-coronavirus-pandemic\">targeted by hackers<\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Fortunately, so far the attacks on these organizations have been unsuccessful. In other cases, a hacker attack has resulted in significant damage to the healthcare infrastructure. In Illinois, the Champaign-Urbana Public Health District\u2019s website <\/span><span style=\"font-weight: 400;\">was down for several days<\/span><span style=\"font-weight: 400;\"> as they recovered from a ransomware attack.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">According to researchers at <\/span><a href=\"https:\/\/www.sonicwall.com\/blog\/coronavirus-trojan-overwriting-the-mbr\"><span style=\"font-weight: 400;\">SonicWall<\/span><\/a><span style=\"font-weight: 400;\">, new and pointedly destructive malware has recently been identified that employs a pandemic-theme to trick users. It is designed to cause destruction rather than attempting to obtain financial gain from their victims. Two of the identified <strong>malware variants rewrote a computer\u2019s master boot record (MBR)<\/strong>, essentially destroying the machine. Another variant posed as a pandemic ransomware attack but in truth was designed to steal passwords before rewriting the MBR.<\/span><\/p>\r\n<p><img class=\"aligncenter wp-image-30385\" style=\"border: 1px solid gray;\" src=\"\/howto\/wp-content\/uploads\/2020\/04\/MBR.jpg\" alt=\"data loss\" width=\"400\" height=\"321\" srcset=\"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/MBR.jpg 773w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/MBR-300x241.jpg 300w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/MBR-500x402.jpg 500w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/MBR-768x617.jpg 768w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/p>\r\n<hr \/>\r\n<p><span style=\"font-weight: 400;\">Security researchers have <\/span><a href=\"https:\/\/blog.barracuda.com\/2020\/03\/26\/threat-spotlight-coronavirus-related-phishing\/\"><span style=\"font-weight: 400;\">identified a 667% increase<\/span><\/a><span style=\"font-weight: 400;\"> in the number of pandemic related spear-phishing attacks. Over 9,000 phishing initiatives were detected and have been steadily on the rise as the pandemic spreads. The goals of the attacks range from malware distribution to ransomware and credential theft. One particularly wicked blackmail attack threatens to infect an individual and their family with the coronavirus unless they pay a ransom.<img class=\"aligncenter wp-image-30387 size-full\" src=\"\/howto\/wp-content\/uploads\/2020\/04\/1587629286.jpg\" alt=\"Covid-19 ransomware\" width=\"400\" height=\"199\" \/><\/span><\/p>\r\n<hr \/>\r\n<p><a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/protecting-against-cyber-threats-during-covid-19-and-beyond\"><span style=\"font-weight: 400;\">Google says<\/span><\/a><span style=\"font-weight: 400;\"> they saw 18 million daily malware and phishing emails related to the pandemic in the past week.<img class=\"aligncenter wp-image-30388\" style=\"border: 1px solid gray;\" src=\"\/howto\/wp-content\/uploads\/2020\/04\/google-coronavirus.jpg\" alt=\"cyber attack Covid-19\" width=\"400\" height=\"217\" srcset=\"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/google-coronavirus.jpg 1100w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/google-coronavirus-300x163.jpg 300w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/google-coronavirus-500x271.jpg 500w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/google-coronavirus-768x416.jpg 768w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">These are just a few examples of the threats to computer systems and their data being perpetrated by criminals using the fear of pandemic to further their aims. Unfortunately, this adds more stress to that already being experienced by society. These cybercriminals are demonstrating that they are bottom-feeders with no semblance of a conscience. Computer users need to take every precaution possible to protect their data resources.<\/span><\/p>\r\n<h2 style=\"padding-top: 30px;\"><span class=\"ez-toc-section\" id=\"protecting_your_data_resources\"><\/span><b>Protecting your Data Resources<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">Several techniques should be used in combination to protect your computer systems from being impacted:<\/span><\/p>\r\n<h3><span class=\"ez-toc-section\" id=\"1_choose_the_right_antivirus_protection\"><\/span>1. Choose the Right Antivirus Protection.<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p>Virus-scanning software is an essential first wave of defense that should be installed on all computer systems. <a href=\"https:\/\/www.kaspersky.com\/resource-center\/preemptive-safety\/antivirus-software-how-to-choose\"><span style=\"font-weight: 400;\">Choose a reputable solution<\/span><\/a><span style=\"font-weight: 400;\"> and make sure you keep its databases updated to address newly discovered threats. Take reports generated from the anti-virus tool seriously and remove any suspicious software from your computer as soon as possible.<\/span><\/p>\r\n<h3><span class=\"ez-toc-section\" id=\"2_secure_a_computer_network\"><\/span>2. Secure a Computer Network.<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p>Password protect networks and network components to minimize the chances of unauthorized access to your systems. Non-trivial passwords should be required for network access. The same can be said for routers and other devices used to provide the network infrastructure. Many devices are installed with default credentials which is like leaving the door wide open and inviting an attack. Change these immediately to raise your level of protection.<\/p>\r\n<h3><span class=\"ez-toc-section\" id=\"3_watch_out_for_phishing_emails\"><\/span>3. Watch out for phishing emails.<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p>Think twice before clicking on links in emails and instant messages. After thinking twice, take a deep breath and think again. Scammers are using fear and misinformation in attempts to lure users to fall victim to phishing attacks. This is a terrible tactic that can only be defeated by individual vigilance. Clicking an infected link can result in delivering malware directly to your machine. In corporate settings, a single wrong click can inadvertently affect the entire enterprise.<\/p>\r\n<h3><span class=\"ez-toc-section\" id=\"4_backup_your_data\"><\/span>4. Backup your Data.<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p>Data backups are a valuable commodity that should be a regular part of your computer maintenance regimen. <span style=\"font-weight: 400;\">The importance of backups<\/span><span style=\"font-weight: 400;\"> is often overlooked until disaster strikes and systems need to be rebuilt. Make sure that you have a viable backup strategy in place and keep the storage media in a safe place. When all else fails, they provide the raw material required to recover your important data.<\/span><\/p>\r\n<h2 style=\"padding-top: 30px;\"><span class=\"ez-toc-section\" id=\"recovering_from_a_hacker_attack\"><\/span><b>Recovering from a Hacker Attack<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">If you are hit by a destructive computer virus or malware attack you may need to perform data recovery to save your important information. Disk Drill is a software solution that can be instrumental in getting your data back and offers additional protection capabilities to keep it safe in the first place. The software offers users a simple and effective way to recover from a variety of data loss scenarios including the damage caused by a cyber attack.<\/span><\/p>\r\n<div id=\"startBanner\"><\/div>\r\n<p><img class=\"aligncenter wp-image-30463 size-full\" src=\"\/howto\/wp-content\/uploads\/2020\/04\/DiskDrill-Against-coronavirus-cyber-attacks.jpg\" alt=\"data protection Covid-19\" width=\"1200\" height=\"280\" srcset=\"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/DiskDrill-Against-coronavirus-cyber-attacks.jpg 1200w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/DiskDrill-Against-coronavirus-cyber-attacks-300x70.jpg 300w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/DiskDrill-Against-coronavirus-cyber-attacks-500x117.jpg 500w, https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/DiskDrill-Against-coronavirus-cyber-attacks-768x179.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/p>\r\n<p><span style=\"font-weight: 400;\">Systems that are infected with malware or a virus may be subjected to random data deletion, leaving users scrambling for a solution. <\/span><a href=\"\/data-recovery-software.html\"><span style=\"font-weight: 400;\">Data recovery software<\/span><\/a><span style=\"font-weight: 400;\"> can help Windows and Mac users scan their systems for deleted data and recover it safely. The <strong>tool recognizes over 400 filetypes<\/strong> and supports virtually any type of disk-based storage device. Its advanced scanning algorithms will examine the storage media on a sector-by-sector basis and reconstruct files that appeared to be lost forever.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Disk Drill\u2019s main functionality is in data recovery, but the application also offers data protection features that can be used to safeguard your valuable information. The tool lets you <strong>create a byte-level backup<\/strong> of your disks which can be used to recover your files when necessary. This type of backup includes deleted data which makes it possible to perform recovery on files that had been lost before the backup\u2019s creation.<\/span><\/p>\r\n<div id=\"endBanner\"><\/div>","protected":false},"excerpt":{"rendered":"In an era dominated by digital data, the menace of cyberattacks looms large. Every click, every download, every online interaction can be a potential gateway for hackers. Here, we arm you with top-notch strategies to fortify your digital fortress, ensuring&#8230;","protected":false},"author":7840,"featured_media":30388,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2648],"tags":[],"class_list":{"0":"post-30384","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech-related-articles"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Protect Your Computer from Cyberattacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cleverfiles.com\/howto\/protect-computer-coronavirus-ransomware.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Your Computer from Cyberattacks\" \/>\n<meta property=\"og:description\" content=\"In an era dominated by digital data, the menace of cyberattacks looms large. Every click, every download, every online interaction can be a potential gateway for hackers. Here, we arm you with top-notch strategies to fortify your digital fortress, ensuring...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cleverfiles.com\/howto\/protect-computer-coronavirus-ransomware.html\" \/>\n<meta property=\"og:site_name\" content=\"Data recovery tips. Recover deleted files on Mac, Windows.\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/google-coronavirus.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"596\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arthur Cole\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How to Protect Your Computer from Cyberattacks\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/covid19-ransomware.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Arthur_Cole_\" \/>\n<meta name=\"twitter:site\" content=\"@Cleverfiles\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arthur Cole\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Your Computer from Cyberattacks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cleverfiles.com\/howto\/protect-computer-coronavirus-ransomware.html","og_locale":"en_US","og_type":"article","og_title":"How to Protect Your Computer from Cyberattacks","og_description":"In an era dominated by digital data, the menace of cyberattacks looms large. Every click, every download, every online interaction can be a potential gateway for hackers. Here, we arm you with top-notch strategies to fortify your digital fortress, ensuring...","og_url":"https:\/\/www.cleverfiles.com\/howto\/protect-computer-coronavirus-ransomware.html","og_site_name":"Data recovery tips. Recover deleted files on Mac, Windows.","og_image":[{"width":1100,"height":596,"url":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/google-coronavirus.jpg","type":"image\/jpeg"}],"author":"Arthur Cole","twitter_card":"summary_large_image","twitter_title":"How to Protect Your Computer from Cyberattacks","twitter_image":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/covid19-ransomware.jpg","twitter_creator":"@Arthur_Cole_","twitter_site":"@Cleverfiles","twitter_misc":{"Written by":"Arthur Cole","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cleverfiles.com\/howto\/protect-computer-coronavirus-ransomware.html#article","isPartOf":{"@id":"https:\/\/www.cleverfiles.com\/howto\/protect-computer-coronavirus-ransomware.html"},"author":{"name":"Arthur Cole","@id":"https:\/\/www.cleverfiles.com\/howto\/#\/schema\/person\/dee18a97943741568d531f8473a6e560"},"headline":"How to Protect Your Data from Cyberattacks","datePublished":"2020-04-24T19:47:50+00:00","dateModified":"2020-05-04T19:31:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cleverfiles.com\/howto\/protect-computer-coronavirus-ransomware.html"},"wordCount":1035,"publisher":{"@id":"https:\/\/www.cleverfiles.com\/howto\/#organization"},"image":{"@id":"https:\/\/www.cleverfiles.com\/howto\/protect-computer-coronavirus-ransomware.html#primaryimage"},"thumbnailUrl":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/google-coronavirus.jpg","articleSection":["Tech Related Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cleverfiles.com\/howto\/protect-computer-coronavirus-ransomware.html","url":"https:\/\/www.cleverfiles.com\/howto\/protect-computer-coronavirus-ransomware.html","name":"How to Protect Your Computer from Cyberattacks","isPartOf":{"@id":"https:\/\/www.cleverfiles.com\/howto\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cleverfiles.com\/howto\/protect-computer-coronavirus-ransomware.html#primaryimage"},"image":{"@id":"https:\/\/www.cleverfiles.com\/howto\/protect-computer-coronavirus-ransomware.html#primaryimage"},"thumbnailUrl":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/google-coronavirus.jpg","datePublished":"2020-04-24T19:47:50+00:00","dateModified":"2020-05-04T19:31:28+00:00","breadcrumb":{"@id":"https:\/\/www.cleverfiles.com\/howto\/protect-computer-coronavirus-ransomware.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cleverfiles.com\/howto\/protect-computer-coronavirus-ransomware.html"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cleverfiles.com\/howto\/protect-computer-coronavirus-ransomware.html#primaryimage","url":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/google-coronavirus.jpg","contentUrl":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2020\/04\/google-coronavirus.jpg","width":1100,"height":596,"caption":"cyber attack"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cleverfiles.com\/howto\/protect-computer-coronavirus-ransomware.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f","item":"https:\/\/www.cleverfiles.com\/howto\/fr\/"},{"@type":"ListItem","position":2,"name":"How to Protect Your Data from Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.cleverfiles.com\/howto\/#website","url":"https:\/\/www.cleverfiles.com\/howto\/","name":"Data recovery tips. Recover deleted files on Mac, Windows.","description":"","publisher":{"@id":"https:\/\/www.cleverfiles.com\/howto\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cleverfiles.com\/howto\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cleverfiles.com\/howto\/#organization","name":"CleverFiles","url":"https:\/\/www.cleverfiles.com\/howto\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cleverfiles.com\/howto\/#\/schema\/logo\/image\/","url":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/07\/dd-mac-1024-flat.png","contentUrl":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2021\/07\/dd-mac-1024-flat.png","width":512,"height":512,"caption":"CleverFiles"},"image":{"@id":"https:\/\/www.cleverfiles.com\/howto\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Cleverfiles"]},{"@type":"Person","@id":"https:\/\/www.cleverfiles.com\/howto\/#\/schema\/person\/dee18a97943741568d531f8473a6e560","name":"Arthur Cole","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cleverfiles.com\/howto\/#\/schema\/person\/image\/","url":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2019\/07\/Arthur_Cole-96x96.jpg","contentUrl":"https:\/\/www.cleverfiles.com\/howto\/wp-content\/uploads\/2019\/07\/Arthur_Cole-96x96.jpg","caption":"Arthur Cole"},"description":"Arthur Cole is a freelance content creator. He also has a more than 10-year experience in program development for macOS, Windows, iOS, Android. Arthur Cole is a writer with deep expertise in programming, who can easily jump into development processes on any modern platform, be it Windows, Mac, iOS, or Android, being at the same time a capable storyteller of all things IT. He often comes up with great ideas and innovative input, which makes him an indispensable part on his myriad of teams. He really likes writing. Unlike others, he also likes seeing others reading his content, of course. He created articles about Technology, Podcast and Gaming Industries, End-User and Corporate Software, Hardware, and so on. Over the years, he wrote hundreds of articles and tutorials on sites such as DZone, Simpleprogrammer, Ingeniumweb, Themanifest, Enterprisenetworkingplanet, aboutssl.org and many more. Arthur has been an essential part of various marketing campaigns for CleverFiles, maintained great relationships with our partners, and was pretty much always a frontman at various conferences, ensuring a connection with fellow IT entrepreneurs. He is a great animal lover and hiking enthusiast. Loves exploring new trails and beaches with his dog Angus and has recently been getting his hands and knees dirty in the garden.","sameAs":["https:\/\/x.com\/Arthur_Cole_"],"url":"https:\/\/www.cleverfiles.com\/howto\/author\/arthur-cole\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/posts\/30384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/users\/7840"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/comments?post=30384"}],"version-history":[{"count":12,"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/posts\/30384\/revisions"}],"predecessor-version":[{"id":30472,"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/posts\/30384\/revisions\/30472"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/media\/30388"}],"wp:attachment":[{"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/media?parent=30384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/categories?post=30384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cleverfiles.com\/howto\/wp-json\/wp\/v2\/tags?post=30384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}