Latest

Cookies 101: Cookie Management

C

Many websites you visit tell you they use cookies and ask you to accept this before you’re allowed to browse the website. What exactly are they and what do they do? Are they a privacy risk? Let’s find out.

Internet of Things (IoT) 101

I

We continue our 101 series of simplified introductions to privacy related concepts or issues. Today we dive into the Internet of Things (IoT) and see how this is changing the way we interact and behave whilst considering the risks.

Standards for User Comments

S

Effective date: 12 August 2020

Unless defined differently, the terms and definitions of each party in this policy have the same meanings as defined in our Terms & Conditions.  This document applies to all comments posted to Privacy Rightfully content including website posts and social media posts. 

Users should also familirise themselves with the information found under the heading ‘User Content’ within our Terms & Conditions as part of these standards.

Crisis Surveillance

C

The fight to contain COVID-19 has introduced new powers of surveillance to governments around the world in a bid to contact trace. Whilst the public is mostly accepting this moral obligation, what are the lasting impacts for privacy after COVID-19 is behind us?

Virtual Private Network (VPN) 101

V

Our 101 series of introductions into key concepts relating to protecting privacy continues today. VPNs are considered the go-to for the privacy conscious with many advantages and few disadvantages. If you only do one thing to protect your privacy, using a quality VPN should be that one thing.

The less obvious ways bad actors can access your data

T

In some of recent articles we’ve mentioned that we don’t always know who has it in for us, an ex-partner, current or former colleague, someone we’ve wronged without knowing and so forth. Indeed, it doesn’t always have to be a stranger we’ve never met sitting at a computer on another continent doing us harm. Today we look at other sources of leaks that we rarely consider, and which can be closer to home than the obvious ones we traditionally suspect.

Challenging the way you imagine Data & Privacy

C

In this piece we consider the traditional way most people view data and privacy and hope to challenge it by aligning those concepts to simple items most people would have on their desk! It’s the first step in a journey to break down the technologically rooted definitions or dull images we form in our minds when our learning of such concepts comes from traditional research.

Phishing 101

P

Another instalment in our 101 series introducing key concepts in the online security and privacy protection space. Today we look at phishing – one of the biggest scams used today and one of the hardest to recognise.

Security Fatigue

S

There are two issues driving the existence of Privacy Rightfully, first we recognise people do want to take precautions to safeguard their privacy, security, and personal data. The problem is though they simply know how to do actually do that, so we want to provide the education to enable those skills. The second is what is known as ‘Security Fatigue’ which we’re diving into in this article.

Password Hygiene 101

P

Continuing with our 101 series of introductions to privacy related issues and responses we discuss password hygiene today.  As always with our 101 content, this is just the basics of the issue at hand.  We will certainly put together a passwords best practise article in the future including ideas to set strong passwords and strategies to remember them.

Recent Posts

Contact us

SUBSCRIBE TO OUR NEWSLETTER

* = required field
I am over 18 years of age