-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathblog.html
52 lines (47 loc) · 2.41 KB
/
blog.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="Cybersecurity blog with tips, news, and guides on security best practices.">
<meta name="author" content="CyberSec Blog">
<title>CyberSec Blog - Latest in Cybersecurity</title>
<link rel="stylesheet" href="blog.css">
</head>
<body>
<header>
<div class="container">
<h1>CyberSec Blog</h1>
</div>
</header>
<main>
<div class="container">
<section class="blog-posts">
<article class="post">
<img src="images/Phishing attack copy.jpg" alt="Phishing Attack" class="post-image">
<h2>Understanding Phishing Attacks</h2>
<p class="date">December 10, 2024</p>
<p>Phishing attacks are one of the most common cyber threats today. In this blog post, we'll break down what phishing is, how to spot a phishing attempt, and what you can do to protect yourself from these types of attacks...</p>
</article>
<article class="post">
<img src="images/Three-Security-Best-Practices-for-Online-Consumers copy.webp" alt="Two-Factor Authentication" class="post-image">
<h2>The Importance of Two-Factor Authentication</h2>
<p class="date">December 5, 2024</p>
<p>Two-factor authentication (2FA) adds an extra layer of security to your online accounts. In this blog post, we discuss why 2FA is crucial for protecting your data and how you can set it up for your accounts...</p>
</article>
<article class="post">
<img src="images/Two-Factor-Authentication-2FA-scaled copy.jpg" alt="Secure Online Behavior" class="post-image">
<h2>Top 10 Tips for Secure Online Behavior</h2>
<p class="date">December 1, 2024</p>
<p>Staying safe online isn't just about using the right software; it's about having the right habits. Here are 10 key tips to help you maintain a secure digital presence...</p>
</article>
</section>
</div>
</main>
<footer>
<div class="container">
<p>© 2024 CyberSec Blog | All rights reserved</p>
</div>
</footer>
</body>
</html>