{"id":2245,"date":"2020-11-03T08:42:21","date_gmt":"2020-11-03T16:42:21","guid":{"rendered":"https:\/\/ascentblog.org\/?p=2245"},"modified":"2020-11-06T09:02:52","modified_gmt":"2020-11-06T17:02:52","slug":"myob-big-brother-5-ways-to-protect-your-online-privacy","status":"publish","type":"post","link":"https:\/\/ascentblog.org\/myob-big-brother-5-ways-to-protect-your-online-privacy\/","title":{"rendered":"MYOB, Big Brother: 5 Ways to Protect Your Online Privacy"},"content":{"rendered":"

Many of us have a love\/hate relationship with technology. For all the good it provides \u2014 convenience, efficiency, entertainment, productivity \u2014 it does have its downsides, particularly when it comes to privacy.<\/p>\n

Tracking is Everywhere\u00a0\"\"<\/a><\/h2>\n

If you\u2019ve ever done a Google search for a product and suddenly been bombarded with ads for it afterward, you are well aware of one of the pitfalls of technology: the ability to track and merge your information. There\u2019s no escaping it: if you\u2019re like most people, you carry your phone with you everywhere you go. But physical tracking is only one invasion of privacy; virtual tracking takes place online, keeping tabs on your search history. The information collected on your browsing habits is shared and sold with other companies…the whole reason you\u2019re seeing those very targeted ads for products you might or might not want.<\/p>\n

If you\u2019re concerned about digital security\u2014and you have every right to be\u2014 don\u2019t despair; you aren\u2019t exactly powerless to defend yourself. The following steps will help ensure your information is kept private.<\/p>\n

    \n
  1. Adopt good security habits. Use strong passwords and update them every few months. Hint: \u201cpassword\u201d is not a strong password. If you\u2019re worried about remembering them, use a password manager. When possible, opt for two-factor authentication. Don\u2019t ignore security updates; download and install them as soon as you learn about them.<\/li>\n
  2. Beware of phishing schemes. A day at the lake with a rod and reel is a relaxing way to pass time. Trying to recover stolen funds, not so much. Not all security threats involve software and hardware: sometimes, a voice on the other end of the phone can persuade us to share passwords or other sensitive information. This is known as phishing, and can occur over the telephone, email or text. If something sounds \u201cfishy\u201d or too good to be true, it probably is.<\/li>\n
  3. Don\u2019t go app-happy. Mobile apps are convenient, but many are gateways to surveillance. Apps\u2014even seemingly harmless ones\u2014have the ability to gather data about your phone use. Experts recommend taking a good, hard look at the apps on your phone, and deleting any that you don\u2019t use regularly. If possible, stick to a browser, which tends to be a lot safer than an app.<\/li>\n
  4. Use an encrypted chat app. Services like WhatsApp and Telegram ensure chat privacy by offering end-to-end encryption, meaning the only recipients who can read your messages are the sender and receiver. Even though the contents of your message may be harmless, why take any chances?<\/li>\n
  5. Turn off ad personalization. Some platforms give you an option to receive personalized ads. While this may sound like a good thing, it isn\u2019t. You\u2019re essentially giving companies permission to track you.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"

    Many of us have a love\/hate relationship with technology. For all the good it provides …<\/p>\n","protected":false},"author":1,"featured_media":2246,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"schema":"","placeID":"","no_match":false,"name":"","company":"","review":"","address":"","city":"","state":"","zip":"","lat":"","lng":"","phone1":"","phone2":"","fax":"","mon1":"","mon2":"","tue1":"","tue2":"","wed1":"","wed2":"","thu1":"","thu2":"","fri1":"","fri2":"","sat1":"","sat2":"","sun1":"","sun2":"","hours-note":"","footnotes":""},"categories":[7],"tags":[],"class_list":["post-2245","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitaltechnology"],"yoast_head":"\nMYOB, Big Brother: 5 Ways to Protect Your Online Privacy | ASCENT: Administrator Support Community for ENT<\/title>\n<meta name=\"description\" content=\"ASCENT: Administrator Support Community for ENT | Many of us have a love\/hate relationship with technology. For all the good it provides ...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ascentblog.org\/myob-big-brother-5-ways-to-protect-your-online-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MYOB, Big Brother: 5 Ways to Protect Your Online Privacy | ASCENT: Administrator Support Community for ENT\" \/>\n<meta property=\"og:description\" content=\"ASCENT: Administrator Support Community for ENT | Many of us have a love\/hate relationship with technology. For all the good it provides ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ascentblog.org\/myob-big-brother-5-ways-to-protect-your-online-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"ASCENT: Administrator Support Community for ENT\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-03T16:42:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-06T17:02:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ascentblog.org\/wp-content\/uploads\/2020\/11\/photo-1530893609608-32a9af3aa95c.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"2000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fuel Medical\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fuel Medical\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MYOB, Big Brother: 5 Ways to Protect Your Online Privacy | ASCENT: Administrator Support Community for ENT","description":"ASCENT: Administrator Support Community for ENT | Many of us have a love\/hate relationship with technology. For all the good it provides ...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ascentblog.org\/myob-big-brother-5-ways-to-protect-your-online-privacy\/","og_locale":"en_US","og_type":"article","og_title":"MYOB, Big Brother: 5 Ways to Protect Your Online Privacy | ASCENT: Administrator Support Community for ENT","og_description":"ASCENT: Administrator Support Community for ENT | Many of us have a love\/hate relationship with technology. For all the good it provides ...","og_url":"https:\/\/ascentblog.org\/myob-big-brother-5-ways-to-protect-your-online-privacy\/","og_site_name":"ASCENT: Administrator Support Community for ENT","article_published_time":"2020-11-03T16:42:21+00:00","article_modified_time":"2020-11-06T17:02:52+00:00","og_image":[{"width":1600,"height":2000,"url":"https:\/\/ascentblog.org\/wp-content\/uploads\/2020\/11\/photo-1530893609608-32a9af3aa95c.jpg","type":"image\/jpeg"}],"author":"Fuel Medical","twitter_misc":{"Written by":"Fuel Medical","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ascentblog.org\/myob-big-brother-5-ways-to-protect-your-online-privacy\/","url":"https:\/\/ascentblog.org\/myob-big-brother-5-ways-to-protect-your-online-privacy\/","name":"MYOB, Big Brother: 5 Ways to Protect Your Online Privacy | ASCENT: Administrator Support Community for ENT","isPartOf":{"@id":"https:\/\/ascentblog.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ascentblog.org\/myob-big-brother-5-ways-to-protect-your-online-privacy\/#primaryimage"},"image":{"@id":"https:\/\/ascentblog.org\/myob-big-brother-5-ways-to-protect-your-online-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/ascentblog.org\/wp-content\/uploads\/2020\/11\/photo-1530893609608-32a9af3aa95c.jpg","datePublished":"2020-11-03T16:42:21+00:00","dateModified":"2020-11-06T17:02:52+00:00","author":{"@id":"https:\/\/ascentblog.org\/#\/schema\/person\/058d6daba2ec4ebe23780cae2aad3977"},"description":"ASCENT: Administrator Support Community for ENT | Many of us have a love\/hate relationship with technology. For all the good it provides ...","breadcrumb":{"@id":"https:\/\/ascentblog.org\/myob-big-brother-5-ways-to-protect-your-online-privacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ascentblog.org\/myob-big-brother-5-ways-to-protect-your-online-privacy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ascentblog.org\/myob-big-brother-5-ways-to-protect-your-online-privacy\/#primaryimage","url":"https:\/\/ascentblog.org\/wp-content\/uploads\/2020\/11\/photo-1530893609608-32a9af3aa95c.jpg","contentUrl":"https:\/\/ascentblog.org\/wp-content\/uploads\/2020\/11\/photo-1530893609608-32a9af3aa95c.jpg","width":1600,"height":2000},{"@type":"BreadcrumbList","@id":"https:\/\/ascentblog.org\/myob-big-brother-5-ways-to-protect-your-online-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ascentblog.org\/"},{"@type":"ListItem","position":2,"name":"MYOB, Big Brother: 5 Ways to Protect Your Online Privacy"}]},{"@type":"WebSite","@id":"https:\/\/ascentblog.org\/#website","url":"https:\/\/ascentblog.org\/","name":"ASCENT: Administrator Support Community for ENT","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ascentblog.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ascentblog.org\/#\/schema\/person\/058d6daba2ec4ebe23780cae2aad3977","name":"Fuel Medical","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ascentblog.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/81ec3720ac631f57767b69ff069dee63?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/81ec3720ac631f57767b69ff069dee63?s=96&d=mm&r=g","caption":"Fuel Medical"},"url":"https:\/\/ascentblog.org\/author\/fuel-admin\/"}]}},"_links":{"self":[{"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/posts\/2245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/comments?post=2245"}],"version-history":[{"count":1,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/posts\/2245\/revisions"}],"predecessor-version":[{"id":2247,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/posts\/2245\/revisions\/2247"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/media\/2246"}],"wp:attachment":[{"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/media?parent=2245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/categories?post=2245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ascentblog.org\/wp-json\/wp\/v2\/tags?post=2245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}