{"id":28302,"date":"2019-11-26T12:40:05","date_gmt":"2019-11-26T17:40:05","guid":{"rendered":"https:\/\/www.escapeartist.com\/?p=28302"},"modified":"2020-12-31T09:39:46","modified_gmt":"2020-12-31T14:39:46","slug":"digital-privacy-guidelines-for-everyone","status":"publish","type":"post","link":"https:\/\/www.escapeartist.com\/blog\/digital-privacy-guidelines-for-everyone\/","title":{"rendered":"Digital Privacy Guidelines For Everyone"},"content":{"rendered":"

Digital Privacy Guidelines For Everyone<\/strong><\/h2>\n

The recent rise in cyber attacks against organizations and individuals alike requires us to focus on a whole new form of financial exploitation\u2014exploitation through the internet. Research indicates that the financial cost of cybercrime <\/span>will exceed $6 trillion<\/span><\/a> by 2021, doubling from $3 trillion in 2015. Cybersecurity and privacy breaches have now come to the forefront of conversations regarding the safety of the individual, especially in light of the <\/span>Cambridge Analytica controversy<\/span><\/a> during the previous United States elections. The ways in which technology has permeated through our streams of consciousness and the power of online information on our actions means that we should celebrate and be wary of the internet. Being wary means investing in secure coding training<\/a>, so that an in-house IT team can prevent cybersecurity attacks.\u00a0<\/span><\/p>\n

There are two lessons to be learned from these data breaches, particularly in the context of the US elections. For one thing, we should understand that there are greater forces at play that are manipulating consensus to achieve certain political goals\u2014a violation of our political agency. Secondly, there\u2019s the obvious inability of the state to make sure that the individual\u2019s agency is preserved\u2014but how will it do that when the sources of power are being manipulated.\u00a0<\/span><\/p>\n

In light of these considerations, it comes down to the individual to make sure that they protect themselves from any cybercrime and potential exploitation\u2014financial or otherwise. Now, more than ever, individuals and organizations alike need to invest in cybersecurity services<\/a> in order to protect themselves against cyber attacks. <\/span><\/p>\n

 <\/p>\n

The Links Between Your Agency And The Internet<\/b><\/h2>\n

Ultimately, all human actions are dictated by the information they receive. We form certain beliefs about the world and we ascertain where we stand in relation to other people, concepts that form the crux of our belief systems and patterns of thought\/actions. The internet, above all else, is one of the biggest information exchange platforms created in the history of human civilization\u2014every day billions of people (<\/span>3.9 billion to be exact<\/span>) use the internet to find answers to numerous questions.\u00a0<\/span><\/p>\n

The need for information is such that without realizing it, we formed these communities that no longer required physical proximity for interactions to take place within. Although these communities were accessible from anywhere in the world\u2014through the elimination of physical barriers, we never realized these are easier to spy on as well.\u00a0 We carried our beliefs about how interactions take place in the physical world to our interactions in a virtual world that was accessible to virtually anyone. It\u2019s how the Cambridge Analytica debacle took place, we just weren\u2019t careful enough about what we were saying and didn\u2019t ever verify what information we were receiving.\u00a0\u00a0<\/span><\/p>\n

In that process, we were fed information and certain stimuli which led to one of the biggest political crises in American history. As President <\/span>Trump faces impeachment charges<\/span><\/a> and new people come out with testimonies against foreign interference in the elections, we should realize how important it is to maintain our individual privacy. In many ways, our privacy is now one of the sources of our agency. Through manipulations of the information we\u2019re fed, coercive power systems will direct our actions according to their whims without us even realizing it.\u00a0<\/span><\/p>\n

 <\/p>\n

The Financial Risks Of Privacy Violations<\/b><\/h2>\n

Beyond the risk to our individual agency, there are immense financial risks if we don\u2019t ensure our privacy on digital platforms like our phones and computers. Research reports by IBM point out that the average cost of data breaches to organizations is nearly <\/span>$3.92 million a year<\/span><\/a>, representing an increase of 12% from previous years.<\/span><\/p>\n

Considering the increasing use of digital platforms across multiple facets of our activities\u2014 including healthcare, the greater role of Fintech<\/a>, and much else, the risk of succumbing to these attacks gets higher every day. Yahoo!, for example, went from being <\/span>valued at $125 billion<\/span><\/a> to selling its internet assets to Verizon for a mere $4.8 billion. These security breaches affected millions of email accounts on Yahoo\u2019s databases, and who knows what the nature of the information leaked was.\u00a0<\/span><\/p>\n

Whether you\u2019re running a business or just someone trying to preserve your financial agency, there\u2019s a lot to lose if you don\u2019t take the appropriate security measures.<\/span><\/p>\n

 <\/p>\n

What Can You Do To Protect Yourself?<\/b><\/h2>\n

Ensuring your privacy isn\u2019t very difficult really. You need to inculcate certain habits, which are a little inconvenient but will keep you safe in the long run. I have written a separate piece about how you can secure your online connectivity on computers<\/a>\u2014 but here, I will discuss digital security on your phones.\u00a0<\/span><\/p>\n

 <\/p>\n

1. Always Use Secure Wi-Fi Routers<\/b><\/h3>\n

It\u2019s pretty costly to continue using your data packages and Wi-Fi is really convenient to use. However, Wi-Fi is one of the most frequently targeted pathways for any hacker. Unprotected Wi-Fi connections with plenty of connections are the easiest ways for any hacker to tap into your phones because there isn\u2019t anything keeping them out. Just as your phone uses the router to access the internet, the hacker can use the same path to access your phone. For this reason, you should always use a secure, password-protected Wi-Fi router.\u00a0<\/span><\/p>\n

 <\/p>\n

2. Always Read The Terms and Conditions<\/b><\/h3>\n

There are plenty of apps that ask you to get access to your personal information, and we let them without really looking at what the creators of the app intend with the data. As a general rule of thumb, you shouldn\u2019t use apps that ask you to provide access to your phones\u2014if you want to allow access, you should go through the terms and conditions as well. Many times, these apps collect bundles of data that are sold off to third-parties and you can\u2019t do anything about it because the use of the app implies that you don\u2019t mind your data being sold.<\/span><\/p>\n

 <\/p>\n

3. Be Wary of Airdrop and NFC<\/b><\/h3>\n

Whether you\u2019re using an iPhone or Android phone, you should always restrict who has access to your phones through Airdrop or your NFC. Keep your NFC turned off to prevent any random person from accessing your phone and potentially transferring malware into it. Similarly, you should keep your Airdrop settings fixed to \u201ccontacts only\u201d so you receive data from trustworthy sources only.\u00a0<\/span><\/p>\n

<\/h3>\n

4. Always Use A VPN<\/b><\/h3>\n

Using a VPN (Virtual Private Network) is one of the easiest and cheapest ways to protect yourself online. It will help shield your internet searches from prying eyes, will allow you to get around government-enforced firewalls and add a solid level of privacy over everything you do. I have used Express VPN<\/a> for several years now and swear by their service – click here<\/a> to learn more about their services.<\/p>\n

For further information, check out this podcast from The Expat Money Show with Mikkel Thorup<\/a> – 087: The Man Who May Have Inspired The Creation Of Bitcoin – Paul Rosenberg<\/a><\/strong><\/p>\n

<\/h2>\n

Conclusion<\/b><\/h2>\n

These are some very simple steps that I\u2019ve discussed in this article which can help you remain safe in a digital era with its novel threat to your safety and security. As we dig deeper into a technologically driven society, there will be an ever-increasing number of threats to our safety and security which will have to be managed. It comes down to how far you\u2019re willing to go to protect yourself because political agents really won\u2019t do much, that will determine how freely you can live\u2014devoid of any coercive information stimulus.<\/span><\/p>\n

I hope you enjoyed reading: Digital Privacy Guidelines For Everyone.<\/strong><\/p>\n

Here is<\/b> probably the most extensive ebook on <\/b>Everything You Ever Wanted To Know About Eliminating Your Taxes, Protecting Your Assets And Regaining Privacy Over Your Life And Investments<\/i><\/b>. It is called<\/b> The<\/b> Ultimate Guide To Going Offshore<\/b><\/a>.\u00a0 <\/b><\/p>\n

I’ve included some great articles for you to read, enjoy!<\/b><\/p>\n

8 Offshore Banking Trends\u00a0 <\/a><\/strong><\/p>\n

The Freedom You Didn\u2019t Expect <\/a><\/strong><\/p>\n

No One Is Safe From the Data Breach Epidemic <\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"

Digital Privacy Guidelines For Everyone The recent rise in cyber attacks against organizations and individuals alike requires us to focus on a whole new form of financial exploitation\u2014exploitation through the internet. Research indicates that the financial cost of cybercrime will exceed $6 trillion by 2021, doubling from $3 trillion in 2015. Cybersecurity and privacy breaches […]<\/p>\n","protected":false},"author":678,"featured_media":29280,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","om_disable_all_campaigns":false,"footnotes":"","_jetpack_memberships_contains_paid_content":false},"categories":[3,29951],"tags":[10830,203,366,9952],"yst_prominent_words":[2507,4877,9338,9346,3380,9339,5200,9341,26375,26374,1922,9340,2749,7866,3163,26376,6579,9337,5835,9336],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/www.escapeartist.com\/wp-content\/uploads\/2019\/11\/eye-3374462_1280.jpg","_links":{"self":[{"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/posts\/28302"}],"collection":[{"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/users\/678"}],"replies":[{"embeddable":true,"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/comments?post=28302"}],"version-history":[{"count":26,"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/posts\/28302\/revisions"}],"predecessor-version":[{"id":43844,"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/posts\/28302\/revisions\/43844"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/media\/29280"}],"wp:attachment":[{"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/media?parent=28302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/categories?post=28302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/tags?post=28302"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/yst_prominent_words?post=28302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}