{"id":1767,"date":"2018-12-06T15:24:09","date_gmt":"2018-12-06T15:24:09","guid":{"rendered":"http:\/\/www.kruptos2.co.uk\/blog\/?p=1767"},"modified":"2019-06-11T16:43:01","modified_gmt":"2019-06-11T16:43:01","slug":"how-to-protect-your-privacy-on-your-devices","status":"publish","type":"post","link":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/","title":{"rendered":"How to Protect Your Privacy on Your Devices"},"content":{"rendered":"<p><span style=\"font-family: miniorpro-subh;\"><\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">These days, computers, smartphones and internet-connected gadgets have made our lives easier to the point where we&#8217;d be stuck without them. This article request you to take few easy steps on how to protect your privacy on your devices.<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">\r\n\r\n<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">We use our device for one-stop payment, personal health, work, gaming, productivity, texting, tweeting, Facebook-checking machine and do just about everything, from mobile banking to paying our bills, sharing our location, to emailing out last minute notes on a project.<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">\r\n\r\n<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">The flip side is the more we rely on them, the more data passes through them and potentially out of our control. Sadly, these devices are often poorly privacy protected, for example a\u00a0<a href=\"https:\/\/duo.com\/blog\/duo-analytics-android-device-security-article\">2016 study of Android devices<\/a>\u00a0showed a shocking 34% of users don&#8217;t even have a passcode set!<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">\r\n\r\n<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">But whether it\u2019s hacked browsers, petty thieves at the coffee shop, or your own tendency to lose electronics in cabs (hey, it happens to the best of us), using your gadgets as a centralized source for all of your information comes with big risks, and the more you\u2019ve connected and stored, the more you stand to lose. In fact, in the last year alone, at least\u00a0<a href=\"http:\/\/consumerreports.org\/privacy0613\">7.1 million phones were lost or stolen<\/a><\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">\r\n\r\n<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">That\u2019s bad news, not only for individuals but for countless businesses as well, particularly if they have BYOD policies, because each individual device and carrier really varies in their level of security.<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">\r\n\r\n<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">Let\u2019s take a look at few steps on how to protect your privacy which you can take to keep your device\u2014and its wealth of personal data\u2014secure.<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">\r\n\r\n<\/span><\/p>\r\n<ol class=\"wp-block-list\">\r\n<li style=\"list-style-type: none;\">\r\n<ol>\r\n<li><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">Set a password or passcode.<\/span><\/li>\r\n<li><span style=\"font-family: miniorpro-subh; font-size: 18pt;\"><a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2.html\">Encrypt your computer<\/a> and <a href=\"http:\/\/www.kruptos2.co.uk\/android.html\">phone<\/a><\/span><\/li>\r\n<li><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">Use more secure internet browser<\/span><\/li>\r\n<li><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">Don\u2019t click on suspicious links and use redirect checkers<\/span><\/li>\r\n<li><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">Use Virtual Private Network (VPN)<\/span><\/li>\r\n<li><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">Stay away from open Wi-Fi Networks<\/span><\/li>\r\n<li><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">Use adblocker, block malicious attach and stop tracking<\/span><\/li>\r\n<li><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">Be selective with your apps<\/span><\/li>\r\n<li><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">Keep your software and apps up to date<\/span><\/li>\r\n<li><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">Remove unneeded apps and extensions.<\/span><\/li>\r\n<li><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">Keep your devices up to date<\/span><\/li>\r\n<li><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">Review which apps can access your personal data.<\/span><\/li>\r\n<li><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">Back up your device regularly<\/span><\/li>\r\n<\/ol>\r\n<\/li>\r\n<\/ol>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">\r\n\r\n<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">See also <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/9-use-cases-when-you-should-use-encryption\/\">9 use cases when you should use encryption?<\/a><\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">\r\n\r\n<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\"><strong>The above tips are suggested to help save and extend the life of any\u00a0<\/strong><strong>USB Flash Drive,<\/strong><strong> but what steps you take to protect your sensitive data from hackers, data theft and cyber-criminals?<\/strong><\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">\r\n\r\n<\/span><\/p>\r\n<h2 class=\"wp-block-heading\"><span style=\"font-family: miniorpro-subh; font-size: 18pt; color: #3366ff;\"><strong>Password Protect Your Sensitive Files<\/strong><\/span><\/h2>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">\r\n\r\n<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">\r\n\r\n<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\"><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.kruptos2.co.uk\/kruptos2.html\"><strong>Kruptos<\/strong><strong> 2<\/strong> <strong>Pro<\/strong> <\/a><\/span>is a password protected security tool for your Windows PC which protects your privacy and important data from data theft, data loss or leaks.<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">\r\n\r\n<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">Just drag and drop your files and folders into Kruptos 2 encrypted \u2018Vault\u2019 with just two easy steps and they will immediately be password protected which prevents your important data from being modified, read or even accessed without the correct password.<\/span><\/p>\r\n<p class=\"p5\"><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">Kruptos 2 Pro supports inbuilt file shredder and share your encrypted files (cross-platform compatibility) between your\u00a0<b>Mac<\/b>,\u00a0<b>Windows PC<\/b>,\u00a0<b>Android device<\/b>\u00a0and the\u00a0<b>Cloud.<\/b><\/span><\/p>\r\n<p class=\"p5\"><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">The app even allows you to create in-app notes for securely writing down passwords, bank accounts, pin numbers, and any other sensitive information.<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">\r\n\r\n<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">Best of all, you can\u00a0<span style=\"color: #3366ff;\"><strong><a style=\"color: #3366ff;\" href=\"http:\/\/www.kruptos2.co.uk\/files\/Kruptos2Pro.exe\">download it free here<\/a> <\/strong><\/span>and give it a try. You\u2019ll be surprised about how easily you can protect your sensitive files.<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">\r\n\r\n<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt; color: #3366ff;\"><strong>Conclusion<\/strong><\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">\r\n\r\n<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">These steps are simple, quick, and yet go a long way to keeping your personal information safe. There are many security risks for our devices, and these risks will continue to grow along with the devices\u2019 popularity. <a href=\"http:\/\/www.kruptos2.co.uk\/index.html\">Protect your device, your data<\/a>, and yourself by implementing <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/top-5-cyber-security-tips-you-should-follow-in-2019\/\">just a few simple measures<\/a>. Good luck, and stay safe.<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\">\r\n\r\n<\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh; font-size: 18pt;\"><strong>What steps do you take to protect privacy?\u00a0 What other tips have you heard of? Share your thoughts below!<\/strong><\/span><\/p>\r\n<p><span style=\"font-family: miniorpro-subh;\"><\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>These days, computers, smartphones and internet-connected gadgets have made our lives easier to the point where we&#8217;d be stuck without them. This article request you to take few easy steps on how to protect your privacy on your devices. We use our device for one-stop payment, personal health, work, gaming, productivity, texting, tweeting, Facebook-checking machine &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"ast-button\" href=\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/\"> <span class=\"screen-reader-text\">How to Protect Your Privacy on Your Devices<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":2,"featured_media":1773,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8,7,37,26],"tags":[],"class_list":["post-1767","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-how-to","category-online-safety","category-security-alerts"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Protect Your Privacy on Your Devices - Kruptos Security Blog<\/title>\n<meta name=\"description\" content=\"Simple steps to protect your privacy on your devices. Use these steps to improve privacy and security on your PC, phone, tablet and other devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Your Privacy on Your Devices - Kruptos Security Blog\" \/>\n<meta property=\"og:description\" content=\"Simple steps to protect your privacy on your devices. Use these steps to improve privacy and security on your PC, phone, tablet and other devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Kruptos Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-06T15:24:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-06-11T16:43:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/device-privacy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"502\" \/>\n\t<meta property=\"og:image:height\" content=\"240\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Candy Ross\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Candy Ross\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/\"},\"author\":{\"name\":\"Candy Ross\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb\"},\"headline\":\"How to Protect Your Privacy on Your Devices\",\"datePublished\":\"2018-12-06T15:24:09+00:00\",\"dateModified\":\"2019-06-11T16:43:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/\"},\"wordCount\":614,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/device-privacy.jpg\",\"articleSection\":[\"Data Protection\",\"How To\",\"Online Safety\",\"Security Alerts\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/\",\"name\":\"How to Protect Your Privacy on Your Devices - Kruptos Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/device-privacy.jpg\",\"datePublished\":\"2018-12-06T15:24:09+00:00\",\"dateModified\":\"2019-06-11T16:43:01+00:00\",\"description\":\"Simple steps to protect your privacy on your devices. Use these steps to improve privacy and security on your PC, phone, tablet and other devices.\",\"breadcrumb\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/#primaryimage\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/device-privacy.jpg\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/device-privacy.jpg\",\"width\":502,\"height\":240,\"caption\":\"how to protect your privacy on your phone, PC and tablet.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kruptos2.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Protect Your Privacy on Your Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"name\":\"Kruptos Security Blog\",\"description\":\"The Kruptos Security Blog\",\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\",\"name\":\"Kruptos Security Blog\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"width\":200,\"height\":58,\"caption\":\"Kruptos Security Blog\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb\",\"name\":\"Candy Ross\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g\",\"caption\":\"Candy Ross\"},\"description\":\"As a Cyber Security Enthusiast at Kruptos 2 Software, Candy is passionate about data protection and online privacy. She help users to understand how cyber security works by providing useful guides and tips.\",\"sameAs\":[\"http:\/\/www.kruptos2.com\"],\"url\":\"https:\/\/kruptos2.co.uk\/blog\/author\/candy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Your Privacy on Your Devices - Kruptos Security Blog","description":"Simple steps to protect your privacy on your devices. Use these steps to improve privacy and security on your PC, phone, tablet and other devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/","og_locale":"en_US","og_type":"article","og_title":"How to Protect Your Privacy on Your Devices - Kruptos Security Blog","og_description":"Simple steps to protect your privacy on your devices. Use these steps to improve privacy and security on your PC, phone, tablet and other devices.","og_url":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/","og_site_name":"Kruptos Security Blog","article_published_time":"2018-12-06T15:24:09+00:00","article_modified_time":"2019-06-11T16:43:01+00:00","og_image":[{"width":502,"height":240,"url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/device-privacy.jpg","type":"image\/jpeg"}],"author":"Candy Ross","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Candy Ross","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/#article","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/"},"author":{"name":"Candy Ross","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb"},"headline":"How to Protect Your Privacy on Your Devices","datePublished":"2018-12-06T15:24:09+00:00","dateModified":"2019-06-11T16:43:01+00:00","mainEntityOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/"},"wordCount":614,"commentCount":1,"publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/device-privacy.jpg","articleSection":["Data Protection","How To","Online Safety","Security Alerts"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/","url":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/","name":"How to Protect Your Privacy on Your Devices - Kruptos Security Blog","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/#primaryimage"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/device-privacy.jpg","datePublished":"2018-12-06T15:24:09+00:00","dateModified":"2019-06-11T16:43:01+00:00","description":"Simple steps to protect your privacy on your devices. Use these steps to improve privacy and security on your PC, phone, tablet and other devices.","breadcrumb":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/#primaryimage","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/device-privacy.jpg","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/device-privacy.jpg","width":502,"height":240,"caption":"how to protect your privacy on your phone, PC and tablet."},{"@type":"BreadcrumbList","@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kruptos2.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Protect Your Privacy on Your Devices"}]},{"@type":"WebSite","@id":"https:\/\/kruptos2.co.uk\/blog\/#website","url":"https:\/\/kruptos2.co.uk\/blog\/","name":"Kruptos Security Blog","description":"The Kruptos Security Blog","publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/kruptos2.co.uk\/blog\/#organization","name":"Kruptos Security Blog","url":"https:\/\/kruptos2.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","width":200,"height":58,"caption":"Kruptos Security Blog"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb","name":"Candy Ross","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g","caption":"Candy Ross"},"description":"As a Cyber Security Enthusiast at Kruptos 2 Software, Candy is passionate about data protection and online privacy. She help users to understand how cyber security works by providing useful guides and tips.","sameAs":["http:\/\/www.kruptos2.com"],"url":"https:\/\/kruptos2.co.uk\/blog\/author\/candy\/"}]}},"_links":{"self":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1767"}],"version-history":[{"count":23,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1767\/revisions"}],"predecessor-version":[{"id":2068,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1767\/revisions\/2068"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media\/1773"}],"wp:attachment":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}