{"id":281,"date":"2020-09-05T08:53:35","date_gmt":"2020-09-05T07:53:35","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=281"},"modified":"2020-09-05T08:53:35","modified_gmt":"2020-09-05T07:53:35","slug":"purchasing-a-new-tech-product-or-service-here-are-some-of-the-questions-you-need-to-ask-yourself","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/purchasing-a-new-tech-product-or-service-here-are-some-of-the-questions-you-need-to-ask-yourself\/","title":{"rendered":"Purchasing a new tech product or service? Here are some of the questions you need to ask yourself."},"content":{"rendered":"\n<p>1. Can I change the default password? <\/p>\n\n\n\n<p>A device\u2019s default password is incredibly easy to bypass. It\u2019s basically an open door to your deviceand all your activity and data. Creating your own personal password is easy and gives you control over what information comes in and goes out<\/p>\n\n\n\n<p>2. Is my personal data encrypted? <\/p>\n\n\n\n<p>Encryption turns your information or data into a code that only authorised parties can access.Using encryption protects your personal data when stored on the device or when sent over theinternet<\/p>\n\n\n\n<p>3. Does my device update security automatically?<\/p>\n\n\n\n<p>Technology moves quickly and with it, new security vulnerabilities appear. To keep pace, security updates are essential. Allowing automatic updates on your device contributes to maintaining a high level of security.<\/p>\n\n\n\n<p>4. Do I know where my data is stored&#8230; and who can access it?<\/p>\n\n\n\n<p>Under GDPR companies must inform you about: <\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<ul class=\"wp-block-list\"><li>the data that is collected about you<\/li><li>who has access to it<\/li><li>where it is stored<\/li><li>what it is used for so that you can give your consent<\/li><\/ul>\n<\/div><\/div>\n\n\n\n<p>This ensures GDPR compliance but most importantly guarantees your privacy rights.<\/p>\n\n\n\n<p>5. Do I know what my device is revealing about me?<\/p>\n\n\n\n<p>If your device has a camera or a microphone it could be revealing your surroundings or allowing others to listen in to your conversations. Your device is your responsibility \u2013 take action and choose what to switch off to protect your privacy. <a href=\"https:\/\/cybersecuritymonth.eu\/press-campaign-toolbox\/resources-2019\/enisa-infographic-en.pdf\">Source<\/a><\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a> for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Can I change the default password? A device\u2019s default password is incredibly easy to bypass. It\u2019s basically an open door to your deviceand all your activity and data. Creating your own personal password is easy and gives you control over what information comes in and goes out 2. Is my personal data encrypted? Encryption &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/purchasing-a-new-tech-product-or-service-here-are-some-of-the-questions-you-need-to-ask-yourself\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Purchasing a new tech product or service? Here are some of the questions you need to ask yourself.&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[18,8,19,2,24,22,7,10,9],"tags":[],"class_list":["post-281","post","type-post","status-publish","format-standard","hentry","category-cyber-security-best-practice","category-encryption","category-home-cyber-security","category-iot","category-mobile-device-security","category-multi-factor-authentication-mfa","category-privacy","category-ransomware","category-training"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=281"}],"version-history":[{"count":1,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/281\/revisions"}],"predecessor-version":[{"id":282,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/281\/revisions\/282"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}