{"id":5935,"date":"2018-11-15T13:00:45","date_gmt":"2018-11-15T18:00:45","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/?p=5935"},"modified":"2018-11-15T13:00:45","modified_gmt":"2018-11-15T18:00:45","slug":"how-to-protect-your-online-privacy-a-practical-guide","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/2018\/11\/15\/how-to-protect-your-online-privacy-a-practical-guide\/","title":{"rendered":"How to Protect Your Online Privacy: A Practical Guide"},"content":{"rendered":"<p>https:\/\/www.technewsworld.com\/story\/85663.html<\/p>\n<p>This article lists few key things that we can do to protect our personal devices<\/p>\n<ol>\n<li>Beware of Internet Service Providers<\/li>\n<\/ol>\n<p>2. Strengthen and Protect Your Login Credentials<\/p>\n<p>3. Check the WiFi You&#8217;re Using<\/p>\n<p>4. Watch Your Browser<\/p>\n<p>5. Use a Private Search Engine<\/p>\n<p>6. Install a VPN<\/p>\n<p>7. Watch Out for Phishing<\/p>\n<p>8. Encrypt Your Communications<\/p>\n<p>9. Watch What You Share on Social Media<\/p>\n<p>10. Update Early and Often<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/www.technewsworld.com\/story\/85663.html This article lists few key things that we can do to protect our personal devices Beware of Internet Service Providers 2. Strengthen and Protect Your Login Credentials 3. Check the WiFi You&#8217;re Using 4. Watch Your Browser 5. Use a Private Search Engine 6. Install a VPN 7. Watch Out for Phishing 8. Encrypt [&hellip;]<\/p>\n","protected":false},"author":19018,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715709],"tags":[],"class_list":{"0":"post-5935","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-05it-strategy","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/users\/19018"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/comments?post=5935"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5935\/revisions"}],"predecessor-version":[{"id":5936,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5935\/revisions\/5936"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/media?parent=5935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/categories?post=5935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/tags?post=5935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}