{"id":150,"date":"2021-10-18T04:54:49","date_gmt":"2021-10-18T08:54:49","guid":{"rendered":"https:\/\/www.istratus.com\/blog\/?p=150"},"modified":"2022-08-18T12:01:09","modified_gmt":"2022-08-18T16:01:09","slug":"protecting-your-privacy","status":"publish","type":"post","link":"https:\/\/istratus.com\/blog\/secure-your-data\/protecting-your-privacy\/","title":{"rendered":"Protecting Your Privacy"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Ok, so in previous articles, we\u2019ve looked at the military-grade encryption iStratus provides because it goes without re-emphasizing it, we highly value protecting your information. Yes. We do our part, but we feel it is also important for us to look at how you can do your part to protect yourself from \u201conline gremlins\u201d too.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">And stay cyber safe.<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">It is no surprise that technology is pretty savvy towards what we do.\u00a0 \u2014 By basic definition, marketing technology, in particular, is the industry devoted in part \u201cto tracking people\u201d and merging their information, so advertising can be tailored to suit our interests more effectively.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This tracking occurs on multiple levels: There\u2019s physical tracking, because we carry our cell phones everywhere we go. And virtual tracking, of all the places we visit online.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The more that is understood about how the information is being collected, shared, and sold off, the more people tend to want to protect their privacy. Still, in practice, it\u2019s difficult to know what is effective and what is a waste of time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Everyone wants to protect their stuff, don\u2019t they? So here are some ideas of what we should do.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Employ Good Security<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">This makes sense for most of us. We\u2019ve all seen the words and rating scales of \u201cstrong passwords\u201d at some point when setting up an online account. Passwords are the obvious thing we need to protect, so that doesn\u2019t need repeating here. We think you understand the importance of this.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There has been much debate surrounding online privacy within the last decade. And it must be noted there\u2019s a definite distinction between \u2018<\/span><i><span style=\"font-weight: 400;\">privacy<\/span><\/i><span style=\"font-weight: 400;\">\u2019 and \u2018<\/span><i><span style=\"font-weight: 400;\">security<\/span><\/i><span style=\"font-weight: 400;\">\u2019 when it comes to your data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Generally speaking:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">Security<\/span><\/i><span style=\"font-weight: 400;\">: refers to protecting against unauthorized access of your stuff \u2014 such as phishing credit card information, or hacking bank accounts.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">Privacy: <\/span><\/i><span style=\"font-weight: 400;\">relates to preventing your movements from being tracked for purposes of advertising or monitoring.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">Download The Latest Security Updates.<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">You know those pesky reminders you receive from your computer or phone to install the latest security update? Download those.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As App Designers we at iStratus know Apps can be compromised by problems that people know exist and publicly report. Security \u201cbugs\u201d are always worked upon so such situations can be avoided at a high standard. Thus, update, to get the benefit of security.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Beware of Phishing.<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">There\u2019s that word again\u201d<\/span><span style=\"font-weight: 400;\"> phishing<\/span><span style=\"font-weight: 400;\">\u201d\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Not every attack on our security arises through malware or hackers invisibly breaking into your account. Commonly, we\u2019re hoodwinked into divulging our passwords or personal information to some shockingly awful actors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bear in mind, iStratus won\u2019t send you anything. So if ever you receive anything claiming to us, it\u2019s not us. And please let us know!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We all recognize, scammers enjoy hitting up our phones, in calls, texts, or emails and there are also signs that these messages aren\u2019t legit. ALWAYS check for spelling or grammatical errors, links to third-party websites other than those these should be linked to, or emails coming directly from a strange domain.<\/span><\/p>\n<h2><b>If it feels fishy, it usually is! Trust those instincts!<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">It\u2019s difficult to protect your privacy online if there aren\u2019t exactly laws to protect it in the first place.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, in truth blocking some advertising options on major social media platforms does help. It\u2019s a dead giveaway when things you Google show up in Social Media Advertising!!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That said, privacy settings are only so effective, without any actual laws for privacy protection itself.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are laws involving health and credit and financial information, however, there is much evidence available online that suggests, nationally the U.S. and other countries such as Australia don\u2019t have a universal data privacy law safeguarding our everyday online privacy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Numerous cyber-security experts propose avoiding \u201cblockers\u201d and so forth as they are frequently inadequate in their effectiveness anyway because of the attention such technology requires. Besides this, it is a multibillion-dollar Ad Tech industry out there.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Like all values of communication we\u2019ve spoken of, you would probably be better off to advocate for rights to inform policymakers that you wish to see change with today\u2019s online privacy.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">\u201cThe best lightning rod for your protection is your own spine.\u201d<\/span><\/h3>\n<h3><span style=\"font-weight: 400;\">~ <\/span><a href=\"http:\/\/www.quotationspage.com\/quotes\/Ralph_Waldo_Emerson\/\"><span style=\"font-weight: 400;\">Ralph Waldo Emerson<\/span><\/a><\/h3>\n<h2><span style=\"font-weight: 400;\">Take One Step at a Time\u2026<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">When faced with this daunting issue, digital privacy and security can feel uneasy \u2013 we understand that.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Services such as our iStratus &#8220;Password Vault&#8221; help &#8211; even just employing the basics to strengthen and protect your passwords makes a difference. Always having a vigilant eye for scams will make your accounts and information more secure.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Internet is not going anywhere &#8211; that&#8217;s the reality. Thus, the more aware each of us becomes towards understanding how our data is collected and used \u2014 the more we can tackle our privacy to keep it private. At iStratus, we want you to feel better and safer in mindset regarding how our digital lives will be for years to come. The only way is up!<\/span><\/p>\n<h4><em><span style=\"font-weight: 400;\">Live life and roll well with iStratus.<\/span><\/em><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>Ok, so in previous articles, we\u2019ve looked at the military-grade encryption iStratus provides because it goes without re-emphasizing it, we highly value protecting your information. Yes. We do our part, but we feel it is also important for us to look at how you can do your part to protect yourself from \u201conline gremlins\u201d too.\u00a0 &hellip; <a href=\"https:\/\/istratus.com\/blog\/secure-your-data\/protecting-your-privacy\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Protecting Your Privacy<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":151,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"wds_primary_category":7,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-150","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-your-data"],"_links":{"self":[{"href":"https:\/\/istratus.com\/blog\/wp-json\/wp\/v2\/posts\/150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/istratus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/istratus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/istratus.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/istratus.com\/blog\/wp-json\/wp\/v2\/comments?post=150"}],"version-history":[{"count":3,"href":"https:\/\/istratus.com\/blog\/wp-json\/wp\/v2\/posts\/150\/revisions"}],"predecessor-version":[{"id":495,"href":"https:\/\/istratus.com\/blog\/wp-json\/wp\/v2\/posts\/150\/revisions\/495"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/istratus.com\/blog\/wp-json\/wp\/v2\/media\/151"}],"wp:attachment":[{"href":"https:\/\/istratus.com\/blog\/wp-json\/wp\/v2\/media?parent=150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/istratus.com\/blog\/wp-json\/wp\/v2\/categories?post=150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/istratus.com\/blog\/wp-json\/wp\/v2\/tags?post=150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}