{"id":2945,"date":"2014-02-14T10:19:33","date_gmt":"2014-02-14T15:19:33","guid":{"rendered":"http:\/\/www.kaspersky.co.in\/blog\/?p=2945"},"modified":"2020-02-26T20:27:33","modified_gmt":"2020-02-26T14:57:33","slug":"top-5-tips-to-protect-your-significant-other-this-valentines-day","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/top-5-tips-to-protect-your-significant-other-this-valentines-day\/2945\/","title":{"rendered":"Top 5 Tips to Protect Your Significant Other This Valentine&#8217;s Day"},"content":{"rendered":"<p>Valentine\u2019s Day is upon us and there is no sweeter gift to give to your significant other than the gift of security. If you\u2019ve been following our posts then you\u2019re already familiar with the importance of making sure your devices are guarded, but are you making sure the devices of your loved ones are as well? It\u2019s important to ensure you\u2019re not only protecting your own gadgets, but are also keeping the personal information of your significant other out of the hands of attackers as well, which is why we\u2019ve compiled 5 of our top tips to use to safeguard your other half.<\/p>\n<p style=\"padding-left: 30px;\"><b>1.<b>\u00a0 \u00a0\u00a0<\/b><\/b><b>Use An AV<\/b><\/p>\n<p style=\"padding-left: 30px;\">The very first step you should to take to protect your significant other\u2019s most beloved device (their smartphone) is to set it up with an antivirus. Whether they\u2019re using an <a href=\"https:\/\/www.kaspersky.com\/android-security\" target=\"_blank\" rel=\"noopener nofollow\">Android device<\/a> or <a href=\"https:\/\/www.kaspersky.com\/about\/news\/product\/2013\/kaspersky_lab_launches_free_app_for_secure_web_browsing_on_iphone_and_ipad\" target=\"_blank\" rel=\"noopener nofollow\">an iPhone<\/a>, you have options when it comes to finding an appropriate method of protection. Since we conduct most of our online business on our phones these days, it\u2019s important to remember that they need to be treated just like computers. Attackers are no longer simply targeting PCs, but are increasingly going after users of all devices. Be prepared by using an assured solution.<\/p>\n<p style=\"padding-left: 30px;\"><b>2.\u00a0\u00a0\u00a0 <\/b><b>Keep All Devices In Mind<\/b><\/p>\n<p style=\"padding-left: 30px;\">While you should be focused on protecting your significant other\u2019s smartphone, you should also take steps to protect their PC and tablet as well. This especially holds true if you\u2019re sharing files with one another. One infected file can cause damage to not just his\/her machine, but to yours as well. Not to worry though, if you\u2019re looking to set up a protection plan for multiple devices, you can use Kaspersky <a href=\"https:\/\/usa.kaspersky.com\/products-services\/home-computer-security\/multi-device-security\/\" target=\"_blank\" rel=\"noopener\">Internet Security \u2013 Multi-Device<\/a>, which offers safety for up to 5 shared gadgets, including PCs, Macs, Android smartphones and tablets.<\/p>\n<p style=\"padding-left: 30px;\"><b>3.\u00a0\u00a0\u00a0 <\/b><b>Don\u2019t Be Fooled By Love Letters<\/b><\/p>\n<p style=\"padding-left: 30px;\">Maybe you\u2019re opting to take your Valentine\u2019s Day online this year. With endless options for eGifts, eCards and socially shared offerings, it\u2019s easy enough to spread the love online, but you need to be weary of the malicious schemes that exist. Be vocal about the gifts you intend to give to your other half so they aren\u2019t fooled into opening a malicious \u2018Love Letter\u2019 attachment or clicking on a mischievous link in their inbox. \u00a0Malware creators often send their payloads as attachments to these fake letters, so if you are sending something online, let the recipient know so that they can be on the lookout for your real, secure gift, and avoid anything else that might malevolently come their way.<\/p>\n<div class=\"pullquote\">Never enter your personal data into any website unless you are completely confident of its security.<\/div>\n<p style=\"padding-left: 30px;\"><b>4.\u00a0\u00a0\u00a0 <\/b><b>Use HTTPS Sites<\/b><\/p>\n<p style=\"padding-left: 30px;\">Speaking of sending your loved one a gift online, if you and your other are two of the millions of people that will turn to the Internet to purchase a gift today, make sure you both take a moment to check the security certificates of the sites you\u2019re visiting. Only browse sites that use HTTPS in their URL (as opposed to HTTP) ensure a secured connection. Also note the authenticity of each site before either of you make any purchases, remaining aware of the warning signs of fraudulent sites, like misspelled words and incorrect URLs. Never enter your personal data into any website unless you are completely confident of its security.<\/p>\n<p style=\"padding-left: 30px;\"><b>5.\u00a0\u00a0\u00a0 <\/b><b>Be Prepared For Emergencies<\/b><\/p>\n<p style=\"padding-left: 30px;\">Finally, take some time today to talk about an emergency plan you can put in place if the unfortunate does ever happen and you fall under online attack. Set up a code word with each other so that you can avoid any attempts at device and data kidnapping. Before sending each other any personal information on any of your devices, double check that the person you\u2019re transferring your data to is actually your loved one by using your code word. This simple step could save you from much distress.<\/p>\n<p>The sincerest gift is a safe gift, so be sure to follow these easy steps when you\u2019re sharing the love with your other half today. Have a happy and secure Valentine\u2019s Day!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Valentine\u2019s Day is upon us and there is no sweeter gift to give to your significant other than the gift of security. If you\u2019ve been following our posts then you\u2019re<\/p>\n","protected":false},"author":189,"featured_media":2946,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[93,363,97],"class_list":{"0":"post-2945","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cybercriminals","9":"tag-personal-data","10":"tag-security-2"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/top-5-tips-to-protect-your-significant-other-this-valentines-day\/2945\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/top-5-tips-to-protect-your-significant-other-this-valentines-day\/2838\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/top-5-tips-to-protect-your-significant-other-this-valentines-day\/3194\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/top-5-tips-to-protect-your-significant-other-this-valentines-day\/3145\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/top-5-tips-to-protect-your-significant-other-this-valentines-day\/3749\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/top-5-tips-to-protect-your-significant-other-this-valentines-day\/3749\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/top-5-tips-to-protect-your-significant-other-this-valentines-day\/3749\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/cybercriminals\/","name":"cybercriminals"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/2945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/189"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=2945"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/2945\/revisions"}],"predecessor-version":[{"id":18993,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/2945\/revisions\/18993"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/2946"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=2945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=2945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=2945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}