{"id":2404,"date":"2024-08-20T16:08:18","date_gmt":"2024-08-20T13:08:18","guid":{"rendered":"https:\/\/html-online.com\/articles\/?p=2404"},"modified":"2025-08-27T09:55:40","modified_gmt":"2025-08-27T06:55:40","slug":"make-websites-secure-avoid-online-scams","status":"publish","type":"post","link":"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/","title":{"rendered":"What Makes a Website Secure? Hacks to Avoid Online Scams"},"content":{"rendered":"<p>Website <a href=\"\/articles\/cybersecurity-how-to-protect-yourself-on-the-internet\/\">security<\/a> has grown leaps and bounds compared to the internet&#8217;s early Wild West era. Developers&nbsp;leverage <a href=\"\/articles\/best-internet-security-software-tools\/\">modern&nbsp;tools<\/a>, encryption standards, and practices to help average users interact with the internet without fear. Even&nbsp;so, scam websites and other pitfalls continue to threaten users&#8217; digital&nbsp;safety.<\/p>\n<p><!--more--><\/p>\n<p class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2020\/06\/best-internet-security-tools-2020.jpg\" \/><\/p>\n<p>What&nbsp;building blocks come together to make websites secure? \ud83d\udd10 Also, how can users protect themselves if these prove to be insufficient? Here&#8217;s what you need to&nbsp;know.<\/p>\n<h2>Website Security Fundamentals<\/h2>\n<p>Security is a core part of modern webdev philosophy. Any&nbsp;website not built with it in mind is seen as unprofessional and has severe competitive disadvantages.<\/p>\n<h3>\ud83d\udd00Secure transfer&nbsp;protocols<\/h3>\n<p>The&nbsp;vast majority of websites use HTTPS to ensure their authenticity, preventing attacks via phishing redirects and spoofed&nbsp;sites. <a href=\"https:\/\/aws.amazon.com\/compare\/the-difference-between-ssl-and-tls\/\">SSL and&nbsp;TLS<\/a> security protocols also play a vital role. They&nbsp;encrypt \ud83d\udee1\ufe0f everything users share on the site, from login details and form submissions to links to payment&nbsp;gateways.<\/p>\n<p class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2025\/01\/cool-html-tricks.jpg\" \/><\/p>\n<p>Without these protocols, it would be trivial to intercept data users share on the website or modify the data they receive in a man-in-the-middle attack. Search&nbsp;engines won&#8217;t list websites that don&#8217;t use HTTPS and SSL\/TLS anymore, and browsers flag them as&nbsp;a <a href=\"\/articles\/internet-security-methods\/\">security&nbsp;risk<\/a>.<\/p>\n<h3>\ud83d\udddd\ufe0fAccess&nbsp;controls<\/h3>\n<p>Protecting and monitoring admin access to a website is non-negotiable. Lax&nbsp;measures may allow attackers to gain access not only to the website itself but also to any connected databases containing valuable account and user information.<\/p>\n<p class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2023\/01\/interesting-html-projects.jpg\" \/><\/p>\n<p>Admins&nbsp;need to use unique and complex passwords for all website-related accounts and secure them with multi-factor authentication. If&nbsp;multiple people work on maintaining the website or third parties like writers and web designers are brought in to make&nbsp;updates, <a href=\"https:\/\/www.cloudflare.com\/learning\/access-management\/role-based-access-control-rbac\/\">role-based access&nbsp;control<\/a> needs to be in place as&nbsp;well.<\/p>\n<h3>\ud83d\udc68&zwj;\ud83d\udcbbEnforcing safe coding&nbsp;practices<\/h3>\n<p>Websites with proper transfer protocol implementation are still vulnerable to attacks. Secure&nbsp;practices like input validation and prepared statements prevent attackers from misusing input fields to execute malicious&nbsp;code.<\/p>\n<p class=\"aligncenter\"><a href=\"\/articles\/geek-hacker-typer\/\"><img decoding=\"async\" src=\"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2018\/04\/hacker-typer-screenshot.jpg\" \/><\/a><\/p>\n<p>Coding&nbsp;practice guidelines touch on various aspects of website functioning and interaction. Correct error handling, secure session management, and authentication are just the&nbsp;start.<\/p>\n<h3>\ud83e\uddf1Web Application Firewalls &amp; Rate&nbsp;Limiting<\/h3>\n<p><a href=\"https:\/\/www.cloudflare.com\/learning\/ddos\/glossary\/web-application-firewall-waf\/\">WAFs<\/a> complement the security layers we&#8217;ve discussed so far. They&nbsp;filter traffic to the website, further reducing the likelihood of code exploits. WAFs&nbsp;also protect websites from some zero-day exploits and can mitigate DDoS attacks if they have built-in rate&nbsp;limiting.<\/p>\n<h3>\u267b\ufe0fMaintaining regular updates<\/h3>\n<p>Websites now depend on content management systems, custom themes, and intertwining extensions to function as intended. While&nbsp;CMS providers provide regular updates, it&#8217;s common for themes and plugins to&nbsp;be <a href=\"https:\/\/www.sitelock.com\/blog\/outdated-cms-plugins-a-hidden-danger-for-websites\/\">updated rarely or&nbsp;abandoned<\/a>. This&nbsp;lets hackers discover unpatched vulnerabilities. Limiting a site&#8217;s dependence and switching to alternatives as soon as original themes or extensions become outdated helps prevent related&nbsp;exploits.<\/p>\n<h2>How Can Users Address Website&nbsp;Security?<\/h2>\n<p>Other&nbsp;than informing admins of problems or deficiencies they encounter, regular users can&#8217;t do much to influence a website&#8217;s security. However, they can learn to recognize the telltale signs pointing towards scam websites and protect themselves accordingly.<\/p>\n<h3>\ud83d\udea8Recognizing scam&nbsp;websites<\/h3>\n<p>Not&nbsp;<a href=\"https:\/\/ro.wikipedia.org\/wiki\/HTTPS\">using&nbsp;HTTPS<\/a> is a strong first indicator. Since&nbsp;HTTPS acts as an authenticity and trust signal, HTTP versions of established websites are most likely spoofed. Mismatches with a legitimate site&#8217;s layout or color scheme, typos, and pop-ups are also red&nbsp;flags.<\/p>\n<p>Since&nbsp;links to such scam websites are often shared via suspicious emails, users should familiarize themselves with phishing attacks and learn how to avoid&nbsp;them.<\/p>\n<h3>\ud83d\udedcRisks of public&nbsp;networks<\/h3>\n<p>It&#8217;s also possible to unintentionally arrive at a scam site when connected to an unsecure network like public Wi-Fi. Attackers who monitor these networks or create fake ones can alter and redirect user trafic to fake websites designed to collect and steal their account or financial data.<\/p>\n<p class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2020\/09\/1-vpn-virtual-private-network.jpg\" \/><\/p>\n<p>Using&nbsp;the <a href=\"https:\/\/nordvpn.com\/download\/chrome-extension\/\">best VPN for Chrome<\/a>, Mozilla, or the browser of your choice when connecting to public Wi-Fi eliminates this threat. Unlike&nbsp;transfer protocols that secure single&nbsp;websites, <a href=\"\/articles\/vpn-value-for-web-developers\/\">VPNs<\/a> encrypt all the traffic going through a connection on the network level. This&nbsp;makes it impossible for snoops to track one&#8217;s internet usage and intercept or alter&nbsp;data.<\/p>\n<h3>\ud83d\udc64Identity theft protection<\/h3>\n<p>Some&nbsp;people are more susceptible&nbsp;to <a href=\"https:\/\/www.scamwatch.gov.au\/types-of-scams\/website-scams\">scam&nbsp;websites<\/a> than others. Active&nbsp;internet users with multiple email addresses and dozens of online accounts come to mind, as do older and less tech-savvy individuals. Some&nbsp;may have already been data breach victims and need extra assurance.<\/p>\n<p class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2018\/04\/windows.jpg\" \/><\/p>\n<p>The&nbsp;<a href=\"https:\/\/www.reddit.com\/r\/IdentityTheft\/comments\/1hhsxci\/best_identity_theft_protection_services_my\/\">best identity theft protection&nbsp;services<\/a> can give such users peace of mind. These&nbsp;premium tools specialize in monitoring the internet, particularly the dark web, for mention of information like usernames, passwords, or SSNs that the user&nbsp;provides.<\/p>\n<p>Such&nbsp;services inform the user as soon as harmful activity related to this information is detected, giving them time to act. Some&nbsp;even partner with credit monitoring companies and cyber insurance providers to help mitigate the financial and psychological consequences of successful&nbsp;attacks.<\/p>\n<h3>Key Takeaways: Website Security &amp; User Protection<\/h3>\n<ul>\n<li><strong>Secure transfer protocols (HTTPS, SSL\/TLS)<\/strong>: Ecnrypt data, prevent spoofing, and signal trustworthiness.<\/li>\n<li><strong>Access controls<\/strong>: Strong passwords, multi-factor authentication, and role-based permissions for admins.<\/li>\n<li><strong>Safe coding practices<\/strong>: Input validation, prepared statements, secure session handling, and error management.<\/li>\n<li><strong>Web Application Firewalls and Rate Limiting<\/strong>: Block malicious traffic, reduce exploit risks, and defend against&nbsp;DDoS.<\/li>\n<li><strong>Regular updates<\/strong>: Keep CMS, plugins, and themes up-to-date to fix vulnerabilities.<\/li>\n<\/ul>\n<h3>For Users:<\/h3>\n<ul>\n<li><strong>Spot scam websites<\/strong>: Look for HTTPS, check design consistency, be aware of phishing links.<\/li>\n<li><strong>Avoid risky networks<\/strong>: Public Wi-Fi can redirect traffic! Use a VPN for encrypted browsing.<\/li>\n<li><strong>Identity theft protection<\/strong>: Services can monitor the dark web and alert you of stolen credentials.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Website security has grown leaps and bounds compared to the internet&#8217;s early Wild West era. Developers&nbsp;leverage modern&nbsp;tools, encryption standards, and practices to help average users interact with the internet without fear. Even&nbsp;so, scam websites and other pitfalls continue to threaten users&#8217; digital&nbsp;safety.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2404","post","type-post","status-publish","format-standard","hentry","category-articles"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Makes a Website Secure? Hacks to Avoid Online Scams<\/title>\n<meta name=\"description\" content=\"Website security has grown leaps and bounds compared to the internet&#039;s early Wild West era. Developers\u00a0leverage modern\u00a0tools, encryption\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Makes a Website Secure? Hacks to Avoid Online Scams\" \/>\n<meta property=\"og:description\" content=\"Website security has grown leaps and bounds compared to the internet&#039;s early Wild West era. Developers\u00a0leverage modern\u00a0tools, encryption\" \/>\n<meta property=\"og:url\" content=\"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"HTML Online\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/htmlcoding\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-20T13:08:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-27T06:55:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2020\/06\/best-internet-security-tools-2020.jpg\" \/>\n<meta name=\"author\" content=\"HTML Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"HTML Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/\"},\"author\":{\"name\":\"HTML Editor\",\"@id\":\"https:\/\/html-online.com\/articles\/#\/schema\/person\/019f9afa07f209153df0fecfc90b8c1d\"},\"headline\":\"What Makes a Website Secure? Hacks to Avoid Online Scams\",\"datePublished\":\"2024-08-20T13:08:18+00:00\",\"dateModified\":\"2025-08-27T06:55:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/\"},\"wordCount\":1008,\"publisher\":{\"@id\":\"https:\/\/html-online.com\/articles\/#organization\"},\"image\":{\"@id\":\"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2020\/06\/best-internet-security-tools-2020.jpg\",\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/\",\"url\":\"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/\",\"name\":\"What Makes a Website Secure? Hacks to Avoid Online Scams\",\"isPartOf\":{\"@id\":\"https:\/\/html-online.com\/articles\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2020\/06\/best-internet-security-tools-2020.jpg\",\"datePublished\":\"2024-08-20T13:08:18+00:00\",\"dateModified\":\"2025-08-27T06:55:40+00:00\",\"description\":\"Website security has grown leaps and bounds compared to the internet's early Wild West era. Developers\u00a0leverage modern\u00a0tools, encryption\",\"breadcrumb\":{\"@id\":\"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/#primaryimage\",\"url\":\"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2020\/06\/best-internet-security-tools-2020.jpg\",\"contentUrl\":\"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2020\/06\/best-internet-security-tools-2020.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/html-online.com\/articles\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Makes a Website Secure? Hacks to Avoid Online Scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/html-online.com\/articles\/#website\",\"url\":\"https:\/\/html-online.com\/articles\/\",\"name\":\"HTML Online Articles\",\"description\":\"Tips, tricks, tutorials\u2026\",\"publisher\":{\"@id\":\"https:\/\/html-online.com\/articles\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/html-online.com\/articles\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/html-online.com\/articles\/#organization\",\"name\":\"HTML Online\",\"url\":\"https:\/\/html-online.com\/articles\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/html-online.com\/articles\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2022\/06\/logo.jpg\",\"contentUrl\":\"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2022\/06\/logo.jpg\",\"width\":350,\"height\":350,\"caption\":\"HTML Online\"},\"image\":{\"@id\":\"https:\/\/html-online.com\/articles\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/htmlcoding\/\",\"https:\/\/www.linkedin.com\/in\/ferencdenes\/\",\"https:\/\/www.youtube.com\/channel\/UCn38Jw1sJzbjVHO95Zp0Sww\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/html-online.com\/articles\/#\/schema\/person\/019f9afa07f209153df0fecfc90b8c1d\",\"name\":\"HTML Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/html-online.com\/articles\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7c1d8f5e7f1dc3e261766a96ac50c6a907fa5c236e87ab73379c57c9114e92cd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7c1d8f5e7f1dc3e261766a96ac50c6a907fa5c236e87ab73379c57c9114e92cd?s=96&d=mm&r=g\",\"caption\":\"HTML Editor\"},\"description\":\"In 2013, while wrestling with a mountain of client articles and an uncooperative CMS, I decided enough was enough. So, I created an online HTML editor purely out of necessity (and mild frustration). What began as a tool for my own sanity quickly evolved into a gift for the world\u2014or at least for anyone trying to avoid breaking their website's code. Since then, I've shared my tech notes on my blog, which serves as both a handy reference and a digital diary of the adventures and misadventures of a coder.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/ferencdenes\/\",\"https:\/\/www.youtube.com\/@htmlg\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Makes a Website Secure? Hacks to Avoid Online Scams","description":"Website security has grown leaps and bounds compared to the internet's early Wild West era. Developers\u00a0leverage modern\u00a0tools, encryption","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/","og_locale":"en_GB","og_type":"article","og_title":"What Makes a Website Secure? Hacks to Avoid Online Scams","og_description":"Website security has grown leaps and bounds compared to the internet's early Wild West era. Developers\u00a0leverage modern\u00a0tools, encryption","og_url":"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/","og_site_name":"HTML Online","article_publisher":"https:\/\/www.facebook.com\/htmlcoding\/","article_published_time":"2024-08-20T13:08:18+00:00","article_modified_time":"2025-08-27T06:55:40+00:00","og_image":[{"url":"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2020\/06\/best-internet-security-tools-2020.jpg","type":"","width":"","height":""}],"author":"HTML Editor","twitter_card":"summary_large_image","twitter_misc":{"Written by":"HTML Editor","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/#article","isPartOf":{"@id":"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/"},"author":{"name":"HTML Editor","@id":"https:\/\/html-online.com\/articles\/#\/schema\/person\/019f9afa07f209153df0fecfc90b8c1d"},"headline":"What Makes a Website Secure? Hacks to Avoid Online Scams","datePublished":"2024-08-20T13:08:18+00:00","dateModified":"2025-08-27T06:55:40+00:00","mainEntityOfPage":{"@id":"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/"},"wordCount":1008,"publisher":{"@id":"https:\/\/html-online.com\/articles\/#organization"},"image":{"@id":"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2020\/06\/best-internet-security-tools-2020.jpg","articleSection":["Articles"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/","url":"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/","name":"What Makes a Website Secure? Hacks to Avoid Online Scams","isPartOf":{"@id":"https:\/\/html-online.com\/articles\/#website"},"primaryImageOfPage":{"@id":"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/#primaryimage"},"image":{"@id":"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2020\/06\/best-internet-security-tools-2020.jpg","datePublished":"2024-08-20T13:08:18+00:00","dateModified":"2025-08-27T06:55:40+00:00","description":"Website security has grown leaps and bounds compared to the internet's early Wild West era. Developers\u00a0leverage modern\u00a0tools, encryption","breadcrumb":{"@id":"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/#primaryimage","url":"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2020\/06\/best-internet-security-tools-2020.jpg","contentUrl":"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2020\/06\/best-internet-security-tools-2020.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/html-online.com\/articles\/make-websites-secure-avoid-online-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/html-online.com\/articles\/"},{"@type":"ListItem","position":2,"name":"What Makes a Website Secure? Hacks to Avoid Online Scams"}]},{"@type":"WebSite","@id":"https:\/\/html-online.com\/articles\/#website","url":"https:\/\/html-online.com\/articles\/","name":"HTML Online Articles","description":"Tips, tricks, tutorials\u2026","publisher":{"@id":"https:\/\/html-online.com\/articles\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/html-online.com\/articles\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/html-online.com\/articles\/#organization","name":"HTML Online","url":"https:\/\/html-online.com\/articles\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/html-online.com\/articles\/#\/schema\/logo\/image\/","url":"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2022\/06\/logo.jpg","contentUrl":"https:\/\/html-online.com\/articles\/wp-content\/uploads\/2022\/06\/logo.jpg","width":350,"height":350,"caption":"HTML Online"},"image":{"@id":"https:\/\/html-online.com\/articles\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/htmlcoding\/","https:\/\/www.linkedin.com\/in\/ferencdenes\/","https:\/\/www.youtube.com\/channel\/UCn38Jw1sJzbjVHO95Zp0Sww"]},{"@type":"Person","@id":"https:\/\/html-online.com\/articles\/#\/schema\/person\/019f9afa07f209153df0fecfc90b8c1d","name":"HTML Editor","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/html-online.com\/articles\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7c1d8f5e7f1dc3e261766a96ac50c6a907fa5c236e87ab73379c57c9114e92cd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7c1d8f5e7f1dc3e261766a96ac50c6a907fa5c236e87ab73379c57c9114e92cd?s=96&d=mm&r=g","caption":"HTML Editor"},"description":"In 2013, while wrestling with a mountain of client articles and an uncooperative CMS, I decided enough was enough. So, I created an online HTML editor purely out of necessity (and mild frustration). What began as a tool for my own sanity quickly evolved into a gift for the world\u2014or at least for anyone trying to avoid breaking their website's code. Since then, I've shared my tech notes on my blog, which serves as both a handy reference and a digital diary of the adventures and misadventures of a coder.","sameAs":["https:\/\/www.linkedin.com\/in\/ferencdenes\/","https:\/\/www.youtube.com\/@htmlg"]}]}},"_links":{"self":[{"href":"https:\/\/html-online.com\/articles\/wp-json\/wp\/v2\/posts\/2404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/html-online.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/html-online.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/html-online.com\/articles\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/html-online.com\/articles\/wp-json\/wp\/v2\/comments?post=2404"}],"version-history":[{"count":2,"href":"https:\/\/html-online.com\/articles\/wp-json\/wp\/v2\/posts\/2404\/revisions"}],"predecessor-version":[{"id":2408,"href":"https:\/\/html-online.com\/articles\/wp-json\/wp\/v2\/posts\/2404\/revisions\/2408"}],"wp:attachment":[{"href":"https:\/\/html-online.com\/articles\/wp-json\/wp\/v2\/media?parent=2404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/html-online.com\/articles\/wp-json\/wp\/v2\/categories?post=2404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/html-online.com\/articles\/wp-json\/wp\/v2\/tags?post=2404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}