{"id":20885,"date":"2024-01-22T17:23:09","date_gmt":"2024-01-22T22:23:09","guid":{"rendered":"https:\/\/knowledgeflow.org\/?p=20885"},"modified":"2024-05-29T14:11:45","modified_gmt":"2024-05-29T18:11:45","slug":"data-privacy-week-why-it-should-matter-to-you","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/uk\/data-privacy-week-why-it-should-matter-to-you\/","title":{"rendered":"\u0422\u0438\u0436\u0434\u0435\u043d\u044c \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0434\u0430\u043d\u0438\u0445: \u0427\u043e\u043c\u0443 \u0446\u0435 \u0432\u0430\u0436\u043b\u0438\u0432\u043e \u0434\u043b\u044f \u0432\u0430\u0441 \u043e\u0441\u043e\u0431\u0438\u0441\u0442\u043e"},"content":{"rendered":"<style>.kb-image20885_ac7a7c-14 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image20885_ac7a7c-14 size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/01\/data-privacy-week-image-3-1024x538.png\" alt=\"Safeguard your personal information. \" class=\"kb-img wp-image-20889\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/01\/data-privacy-week-image-3-1024x538.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/01\/data-privacy-week-image-3-600x315.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/01\/data-privacy-week-image-3-300x158.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/01\/data-privacy-week-image-3-768x403.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/01\/data-privacy-week-image-3-18x9.png 18w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/01\/data-privacy-week-image-3.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_178c42-31, .wp-block-kadence-advancedheading.kt-adv-heading20885_178c42-31[data-kb-block=\"kb-adv-heading20885_178c42-31\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_178c42-31 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_178c42-31[data-kb-block=\"kb-adv-heading20885_178c42-31\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_178c42-31 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_178c42-31[data-kb-block=\"kb-adv-heading20885_178c42-31\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20885_178c42-31 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_178c42-31\">Data Privacy Week spotlights the vital importance of privacy rights and safeguarding personal information. In an era marked by the rapid rise of artificial intelligence, the ways in which personal data is used and potentially exposed have multiplied. AI technologies, while innovative, bring new challenges in data privacy, making it increasingly crucial for users to be vigilant. With businesses increasingly reliant on user data, the absence of robust security measures can lead to data breaches, exposing your sensitive details. Moreover, cybercriminals exploit vulnerabilities, often through phishing attacks, posing risks of identity theft and other serious crimes. As cyber fraud escalates, it&#8217;s imperative to adopt stringent protective measures for your online safety. <\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_1ab66c-2b, .wp-block-kadence-advancedheading.kt-adv-heading20885_1ab66c-2b[data-kb-block=\"kb-adv-heading20885_1ab66c-2b\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_1ab66c-2b mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_1ab66c-2b[data-kb-block=\"kb-adv-heading20885_1ab66c-2b\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_1ab66c-2b img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_1ab66c-2b[data-kb-block=\"kb-adv-heading20885_1ab66c-2b\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading20885_1ab66c-2b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_1ab66c-2b\">Is AI Safe To Use?<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_79cd62-a4, .wp-block-kadence-advancedheading.kt-adv-heading20885_79cd62-a4[data-kb-block=\"kb-adv-heading20885_79cd62-a4\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_79cd62-a4 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_79cd62-a4[data-kb-block=\"kb-adv-heading20885_79cd62-a4\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_79cd62-a4 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_79cd62-a4[data-kb-block=\"kb-adv-heading20885_79cd62-a4\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20885_79cd62-a4 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_79cd62-a4\">In 2023, the landscape of Artificial Intelligence (AI) witnessed remarkable growth, transforming various aspects of daily life. AI tools have become increasingly popular for their ability to assist with educational queries, provide personal advice, and offer accessible resources. However, it&#8217;s important to understand the privacy implications associated with these technologies. For instance, while tools like ChatGPT are lauded for their functionality, they collect and store data such as email addresses, IP addresses, locations, and conversation histories. This highlights a broader privacy concern in the AI domain, where user data retention is a critical issue.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_724fb6-a5, .wp-block-kadence-advancedheading.kt-adv-heading20885_724fb6-a5[data-kb-block=\"kb-adv-heading20885_724fb6-a5\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_724fb6-a5 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_724fb6-a5[data-kb-block=\"kb-adv-heading20885_724fb6-a5\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_724fb6-a5 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_724fb6-a5[data-kb-block=\"kb-adv-heading20885_724fb6-a5\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20885_724fb6-a5 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_724fb6-a5\">Similarly, AI applications like My AI in Snapchat, if permitted to access location data, retain this information. This data is stored unless manually deleted by the user, which can take up to 30 days for complete removal. Users should exercise caution and discretion when interacting with AI tools, as they can retain both public and private information shared during use. Additionally, organizations utilizing AI technologies must ensure robust cybersecurity measures are in place. The data collection nature of these AI systems increases the risk of both deliberate breaches and accidental data leaks, underscoring the need for heightened data protection strategies.<\/p>\n\n\n<style>.kb-image20885_b6c107-59 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image20885_b6c107-59 size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/01\/data-privacy-week-image-2-1024x538.png\" alt=\"Artificial Intelligence\" class=\"kb-img wp-image-20886\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/01\/data-privacy-week-image-2-1024x538.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/01\/data-privacy-week-image-2-600x315.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/01\/data-privacy-week-image-2-300x158.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/01\/data-privacy-week-image-2-768x403.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/01\/data-privacy-week-image-2-18x9.png 18w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/01\/data-privacy-week-image-2.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_cb1a58-2d, .wp-block-kadence-advancedheading.kt-adv-heading20885_cb1a58-2d[data-kb-block=\"kb-adv-heading20885_cb1a58-2d\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_cb1a58-2d mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_cb1a58-2d[data-kb-block=\"kb-adv-heading20885_cb1a58-2d\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_cb1a58-2d img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_cb1a58-2d[data-kb-block=\"kb-adv-heading20885_cb1a58-2d\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading20885_cb1a58-2d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_cb1a58-2d\">AI: A Scammer&#8217;s Sidekick?<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_9406f6-1c, .wp-block-kadence-advancedheading.kt-adv-heading20885_9406f6-1c[data-kb-block=\"kb-adv-heading20885_9406f6-1c\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_9406f6-1c mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_9406f6-1c[data-kb-block=\"kb-adv-heading20885_9406f6-1c\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_9406f6-1c img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_9406f6-1c[data-kb-block=\"kb-adv-heading20885_9406f6-1c\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20885_9406f6-1c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_9406f6-1c\">The advancement of technology has significantly enhanced the sophistication of scams, making them more challenging to identify. Scammers now adeptly create convincing emails and phone numbers using spoofing techniques, complicating scam detection. They are increasingly utilizing AI tools, to produce responses that are indistinguishably human, enabling them to execute convincing voice phishing scams and impersonate others more effectively. This evolution in scamming techniques means that many people are more susceptible to these deceptive tactics.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_0bd0c0-e3, .wp-block-kadence-advancedheading.kt-adv-heading20885_0bd0c0-e3[data-kb-block=\"kb-adv-heading20885_0bd0c0-e3\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_0bd0c0-e3 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_0bd0c0-e3[data-kb-block=\"kb-adv-heading20885_0bd0c0-e3\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_0bd0c0-e3 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_0bd0c0-e3[data-kb-block=\"kb-adv-heading20885_0bd0c0-e3\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20885_0bd0c0-e3 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_0bd0c0-e3\">It&#8217;s crucial to be vigilant about whom you communicate with over the phone or via text, as scammers are skilled at fabricating believable personas. Always protect your personal information; disclosing it can enable scammers to impersonate you more convincingly. Being informed about various scam types, including fear-based, transactional, romantic, and tech scams, is a vital defense strategy. Such knowledge can help you thwart scammers&#8217; aggressive attempts to obtain your data.<\/p>\n\n\n\n<p>Furthermore, AI&#8217;s role in data scraping amplifies concerns about data privacy and intellectual property. Data scraping involves the unauthorized collection of sensitive information from social media and workplace databases, posing significant risks. To safeguard against data scraping, it&#8217;s advisable to limit the personal information you share on social media platforms and other online accounts. This precaution can provide an additional layer of protection against these increasingly sophisticated and technology-driven scams.<\/p>\n\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-20885_02d08d-d6 .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-20885_02d08d-d6 .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-20885_02d08d-d6\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_132657-9a, .wp-block-kadence-advancedheading.kt-adv-heading20885_132657-9a[data-kb-block=\"kb-adv-heading20885_132657-9a\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_132657-9a mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_132657-9a[data-kb-block=\"kb-adv-heading20885_132657-9a\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_132657-9a img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_132657-9a[data-kb-block=\"kb-adv-heading20885_132657-9a\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading20885_132657-9a wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_132657-9a\">Enhance Your Data Privacy Skills with Our FREE Courses!<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_9b15cd-61, .wp-block-kadence-advancedheading.kt-adv-heading20885_9b15cd-61[data-kb-block=\"kb-adv-heading20885_9b15cd-61\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_9b15cd-61 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_9b15cd-61[data-kb-block=\"kb-adv-heading20885_9b15cd-61\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_9b15cd-61 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_9b15cd-61[data-kb-block=\"kb-adv-heading20885_9b15cd-61\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20885_9b15cd-61 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_9b15cd-61\">In recognition of Data Privacy Week, we invite you to join our &#8220;Protect Your Information&#8221; course at no cost. This course is designed to teach you effective strategies for securing your accounts and personal information. Additionally, we offer other free courses, including &#8220;Protect Your Device&#8221; and &#8220;Scams: How to Spot Them and Stop Them,&#8221; to bolster your understanding and defense against digital threats. Dive into the world of data privacy with us today!<\/p>\n\n\n<style>.kt-post-loop20885_3e8457-6a .kadence-post-image{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kt-post-loop20885_3e8457-6a .kt-post-grid-layout-masonry-wrap .kt-post-masonry-item{padding-left:15.5px;padding-right:15.5px;}.kt-post-loop20885_3e8457-6a .kt-post-grid-layout-masonry-wrap{margin-left:-15.5px;margin-right:-15.5px;}.kt-post-loop20885_3e8457-6a .kt-post-grid-layout-masonry-wrap .kt-post-masonry-item{padding-bottom:30px;}.kt-post-loop20885_3e8457-6a .kt-blocks-post-grid-item{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;overflow:hidden;}.kt-post-loop20885_3e8457-6a .kt-blocks-post-grid-item .kt-blocks-post-grid-item-inner{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kt-post-loop20885_3e8457-6a .kt-blocks-post-grid-item header{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop20885_3e8457-6a .kt-blocks-post-grid-item .entry-title{padding-top:5px;padding-right:0px;padding-bottom:10px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop20885_3e8457-6a .entry-content{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop20885_3e8457-6a .kt-blocks-post-footer{border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop20885_3e8457-6a .entry-content:after{height:0px;}.kt-post-loop20885_3e8457-6a .kb-filter-item{border-top-width:0px;border-right-width:0px;border-bottom-width:2px;border-left-width:0px;padding-top:5px;padding-right:8px;padding-bottom:5px;padding-left:8px;margin-top:0px;margin-right:10px;margin-bottom:0px;margin-left:0px;}<\/style><div class=\"wp-block-kadence-postgrid kt-blocks-post-loop-block alignnone kt-post-loop20885_3e8457-6a kt-post-grid-layout-masonry \"><div class=\"kt-post-grid-layout-masonry-wrap kt-post-grid-wrap kb-pro-masonry-init\" data-columns-xxl=\"1\" data-columns-xl=\"1\" data-columns-md=\"1\" data-columns-sm=\"1\" data-columns-xs=\"1\" data-columns-ss=\"1\"data-item-selector=\".kt-post-masonry-item\" aria-label=\"Post Carousel\"><div class=\"kt-post-masonry-item post-18234 initiative type-initiative status-publish format-standard has-post-thumbnail hentry\"><article class=\"kt-blocks-post-grid-item\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-Top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-25\" style=\"padding-bottom:25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" href=\"https:\/\/knowledgeflow.org\/uk\/initiative\/cybersafety-academy\/\" aria-label=\"Cybersafety Academy\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"118\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/cybersafety-academy-banner-300x118.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"KnowledgeFlow Cybersafety Academy, making you #UnHackable\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/cybersafety-academy-banner-300x118.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/cybersafety-academy-banner-600x236.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/cybersafety-academy-banner-1024x403.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/cybersafety-academy-banner-768x302.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/cybersafety-academy-banner-1536x605.png 1536w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/cybersafety-academy-banner-18x7.png 18w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/03\/cybersafety-academy-banner.png 1600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" title=\"\"><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/initiative\/cybersafety-academy\/\">Cybersafety Academy<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><\/div><\/header><div class=\"entry-content\">The KnowledgeFlow Cybersafety Academy is the online home of our training and awareness courses designed to make you #UnHackable.<\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><\/div><\/div><\/div><!-- .wp-block-kadence-postgrid -->\n\n<style>.wp-block-kadence-advancedbtn.kb-btns20885_e9477a-aa{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:flex-start;align-items:center;}.kt-btns20885_e9477a-aa .kt-button{font-weight:normal;font-style:normal;}.kt-btns20885_e9477a-aa .kt-btn-wrap-0{margin-right:5px;}.wp-block-kadence-advancedbtn.kt-btns20885_e9477a-aa .kt-btn-wrap-0 .kt-button{color:#555555;border-color:#555555;}.wp-block-kadence-advancedbtn.kt-btns20885_e9477a-aa .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns20885_e9477a-aa .kt-btn-wrap-0 .kt-button:focus{color:#ffffff;border-color:#444444;}.wp-block-kadence-advancedbtn.kt-btns20885_e9477a-aa .kt-btn-wrap-0 .kt-button::before{display:none;}.wp-block-kadence-advancedbtn.kt-btns20885_e9477a-aa .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns20885_e9477a-aa .kt-btn-wrap-0 .kt-button:focus{background:#444444;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns20885_e9477a-aa\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn20885_92f422-62.kb-button{width:initial;}<\/style><a class=\"kb-button kt-button button kb-btn20885_92f422-62 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-false  wp-block-kadence-singlebtn\" href=\"https:\/\/knowledgeflow.org\/initiative\/cybersafety-academy\/\"><span class=\"kt-btn-inner-text\">Learn More<\/span><\/a><\/div>\n\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-20885_d44cdd-43 .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-20885_d44cdd-43 .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-20885_d44cdd-43\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_21fafc-c7, .wp-block-kadence-advancedheading.kt-adv-heading20885_21fafc-c7[data-kb-block=\"kb-adv-heading20885_21fafc-c7\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_21fafc-c7 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_21fafc-c7[data-kb-block=\"kb-adv-heading20885_21fafc-c7\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_21fafc-c7 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_21fafc-c7[data-kb-block=\"kb-adv-heading20885_21fafc-c7\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading20885_21fafc-c7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_21fafc-c7\">Protect your data with these 3 Simple Cybersecurity tips:<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_0511c7-82, .wp-block-kadence-advancedheading.kt-adv-heading20885_0511c7-82[data-kb-block=\"kb-adv-heading20885_0511c7-82\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_0511c7-82 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_0511c7-82[data-kb-block=\"kb-adv-heading20885_0511c7-82\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_0511c7-82 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_0511c7-82[data-kb-block=\"kb-adv-heading20885_0511c7-82\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h3 class=\"kt-adv-heading20885_0511c7-82 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_0511c7-82\">1. Use different passwords for every account<\/h3>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_8034ef-b9, .wp-block-kadence-advancedheading.kt-adv-heading20885_8034ef-b9[data-kb-block=\"kb-adv-heading20885_8034ef-b9\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_8034ef-b9 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_8034ef-b9[data-kb-block=\"kb-adv-heading20885_8034ef-b9\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_8034ef-b9 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_8034ef-b9[data-kb-block=\"kb-adv-heading20885_8034ef-b9\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20885_8034ef-b9 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_8034ef-b9\">Using the same password on multiple accounts makes you more susceptible to cyber-attacks as criminals will be able to access multiple accounts through one password. If you haven&#8217;t done so yet, make sure you change your passwords!<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_b9e9eb-89, .wp-block-kadence-advancedheading.kt-adv-heading20885_b9e9eb-89[data-kb-block=\"kb-adv-heading20885_b9e9eb-89\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_b9e9eb-89 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_b9e9eb-89[data-kb-block=\"kb-adv-heading20885_b9e9eb-89\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_b9e9eb-89 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_b9e9eb-89[data-kb-block=\"kb-adv-heading20885_b9e9eb-89\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h3 class=\"kt-adv-heading20885_b9e9eb-89 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_b9e9eb-89\">2. Update your software<\/h3>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_573e7c-a1, .wp-block-kadence-advancedheading.kt-adv-heading20885_573e7c-a1[data-kb-block=\"kb-adv-heading20885_573e7c-a1\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_573e7c-a1 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_573e7c-a1[data-kb-block=\"kb-adv-heading20885_573e7c-a1\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_573e7c-a1 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_573e7c-a1[data-kb-block=\"kb-adv-heading20885_573e7c-a1\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20885_573e7c-a1 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_573e7c-a1\">When is the last time you updated your laptop, phone or tablet? Do you click &#8220;remind me tomorrow&#8221; or &#8220;snooze&#8221; often? Your device can become vulnerable if you choose to delay important updates that address security vulnerabilities.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_38386b-a6, .wp-block-kadence-advancedheading.kt-adv-heading20885_38386b-a6[data-kb-block=\"kb-adv-heading20885_38386b-a6\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_38386b-a6 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_38386b-a6[data-kb-block=\"kb-adv-heading20885_38386b-a6\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_38386b-a6 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_38386b-a6[data-kb-block=\"kb-adv-heading20885_38386b-a6\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h3 class=\"kt-adv-heading20885_38386b-a6 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_38386b-a6\">3. Implement 2-Factor Authentication on your devices or accounts<\/h3>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_c0e19c-0a, .wp-block-kadence-advancedheading.kt-adv-heading20885_c0e19c-0a[data-kb-block=\"kb-adv-heading20885_c0e19c-0a\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_c0e19c-0a mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_c0e19c-0a[data-kb-block=\"kb-adv-heading20885_c0e19c-0a\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_c0e19c-0a img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_c0e19c-0a[data-kb-block=\"kb-adv-heading20885_c0e19c-0a\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20885_c0e19c-0a wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_c0e19c-0a\">As 2FA requires you to submit two different types of information to verify your identity, it can reduce the likelihood of fraud and data loss even if your password becomes known by someone else as they will not be able to access your device or account without that additional factor.<\/p>\n\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-20885_a65bd8-db .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-20885_a65bd8-db .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-20885_a65bd8-db\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_45c65c-a7, .wp-block-kadence-advancedheading.kt-adv-heading20885_45c65c-a7[data-kb-block=\"kb-adv-heading20885_45c65c-a7\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_45c65c-a7 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_45c65c-a7[data-kb-block=\"kb-adv-heading20885_45c65c-a7\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_45c65c-a7 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_45c65c-a7[data-kb-block=\"kb-adv-heading20885_45c65c-a7\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading20885_45c65c-a7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_45c65c-a7\">Data Privacy Week Resources<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_610178-82, .wp-block-kadence-advancedheading.kt-adv-heading20885_610178-82[data-kb-block=\"kb-adv-heading20885_610178-82\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_610178-82 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_610178-82[data-kb-block=\"kb-adv-heading20885_610178-82\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_610178-82 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_610178-82[data-kb-block=\"kb-adv-heading20885_610178-82\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20885_610178-82 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_610178-82\">Although having a simple password is convenient, your personal information is much more susceptible to fraud. Follow this tip-sheet explaining how to keep your devices and accounts protected through building complex passwords.<\/p>\n\n\n<style>.kt-post-loop20885_3585c5-26 .kadence-post-image{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kt-post-loop20885_3585c5-26 .kt-post-grid-layout-masonry-wrap .kt-post-masonry-item{padding-left:15.5px;padding-right:15.5px;}.kt-post-loop20885_3585c5-26 .kt-post-grid-layout-masonry-wrap{margin-left:-15.5px;margin-right:-15.5px;}.kt-post-loop20885_3585c5-26 .kt-post-grid-layout-masonry-wrap .kt-post-masonry-item{padding-bottom:30px;}.kt-post-loop20885_3585c5-26 .kt-blocks-post-grid-item{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;overflow:hidden;}.kt-post-loop20885_3585c5-26 .kt-blocks-post-grid-item .kt-blocks-post-grid-item-inner{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kt-post-loop20885_3585c5-26 .kt-blocks-post-grid-item header{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop20885_3585c5-26 .kt-blocks-post-grid-item .entry-title{padding-top:5px;padding-right:0px;padding-bottom:10px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop20885_3585c5-26 .entry-content{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop20885_3585c5-26 .kt-blocks-post-footer{border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop20885_3585c5-26 .entry-content:after{height:0px;}.kt-post-loop20885_3585c5-26 .kb-filter-item{border-top-width:0px;border-right-width:0px;border-bottom-width:2px;border-left-width:0px;padding-top:5px;padding-right:8px;padding-bottom:5px;padding-left:8px;margin-top:0px;margin-right:10px;margin-bottom:0px;margin-left:0px;}<\/style><div class=\"wp-block-kadence-postgrid kt-blocks-post-loop-block alignnone kt-post-loop20885_3585c5-26 kt-post-grid-layout-masonry \"><div class=\"kt-post-grid-layout-masonry-wrap kt-post-grid-wrap kb-pro-masonry-init\" data-columns-xxl=\"1\" data-columns-xl=\"1\" data-columns-md=\"1\" data-columns-sm=\"1\" data-columns-xs=\"1\" data-columns-ss=\"1\"data-item-selector=\".kt-post-masonry-item\" aria-label=\"Post Carousel\"><div class=\"kt-post-masonry-item post-4208 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-tip-sheets topic-online-privacy-and-security topic-scams-and-fraud-awareness resource-initiative-knowledgeweb resource-initiative-knowledgewise resource-initiative-national-cyberday-2023\"><article class=\"kt-blocks-post-grid-item\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-Top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-25\" style=\"padding-bottom:25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/password-management\/\" aria-label=\"Password Management: Secure Your Devices and Accounts\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"75\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-300x75.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"hands typing on a keyboard and a clipboard icon\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-300x75.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-600x150.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-1024x256.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-150x38.png 150w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-768x192.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" title=\"\"><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/password-management\/\">Password Management: Secure Your Devices and Accounts<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><\/div><\/header><div class=\"entry-content\">Password Management: Cybersafety Tipsheet Keeping your devices and accounts secure starts with effective password management. Our tipsheet highlights the importance&#8230;<\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><\/div><\/div><\/div><!-- .wp-block-kadence-postgrid -->\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-20885_52fc26-ee .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-20885_52fc26-ee .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-20885_52fc26-ee\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n\n<p>If you&#8217;ve experienced identity theft and discovered that your information has been compromised, follow the tip sheet below for guidance on who you should contact and the steps you should take to secure your information and accounts immediately.<\/p>\n\n\n<style>.kt-post-loop20885_ac81fe-74 .kadence-post-image{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kt-post-loop20885_ac81fe-74 .kt-post-grid-layout-masonry-wrap .kt-post-masonry-item{padding-left:15.5px;padding-right:15.5px;}.kt-post-loop20885_ac81fe-74 .kt-post-grid-layout-masonry-wrap{margin-left:-15.5px;margin-right:-15.5px;}.kt-post-loop20885_ac81fe-74 .kt-post-grid-layout-masonry-wrap .kt-post-masonry-item{padding-bottom:30px;}.kt-post-loop20885_ac81fe-74 .kt-blocks-post-grid-item{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;overflow:hidden;}.kt-post-loop20885_ac81fe-74 .kt-blocks-post-grid-item .kt-blocks-post-grid-item-inner{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kt-post-loop20885_ac81fe-74 .kt-blocks-post-grid-item header{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop20885_ac81fe-74 .kt-blocks-post-grid-item .entry-title{padding-top:5px;padding-right:0px;padding-bottom:10px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop20885_ac81fe-74 .entry-content{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop20885_ac81fe-74 .kt-blocks-post-footer{border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop20885_ac81fe-74 .entry-content:after{height:0px;}.kt-post-loop20885_ac81fe-74 .kb-filter-item{border-top-width:0px;border-right-width:0px;border-bottom-width:2px;border-left-width:0px;padding-top:5px;padding-right:8px;padding-bottom:5px;padding-left:8px;margin-top:0px;margin-right:10px;margin-bottom:0px;margin-left:0px;}<\/style><div class=\"wp-block-kadence-postgrid kt-blocks-post-loop-block alignnone kt-post-loop20885_ac81fe-74 kt-post-grid-layout-masonry \"><div class=\"kt-post-grid-layout-masonry-wrap kt-post-grid-wrap kb-pro-masonry-init\" data-columns-xxl=\"1\" data-columns-xl=\"1\" data-columns-md=\"1\" data-columns-sm=\"1\" data-columns-xs=\"1\" data-columns-ss=\"1\"data-item-selector=\".kt-post-masonry-item\" aria-label=\"Post Carousel\"><div class=\"kt-post-masonry-item post-12726 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-tip-sheets topic-online-privacy-and-security topic-scams-and-fraud-awareness resource-initiative-knowledgewise\"><article class=\"kt-blocks-post-grid-item\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-Top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-25\" style=\"padding-bottom:25%;\"><div class=\"kadence-post-image-inner-intrisic\"><a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/what-to-do-after-identity-theft\/\" aria-label=\"Essential Steps After Identity Theft: What to Do Next\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"75\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-300x75.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"hands typing on a keyboard and a clipboard icon\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-300x75.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-600x150.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-1024x256.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-150x38.png 150w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-768x192.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" title=\"\"><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/what-to-do-after-identity-theft\/\">Essential Steps After Identity Theft: What to Do Next<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><\/div><\/header><div class=\"entry-content\">Essential Steps After Identity Theft: What to Do Next Discover essential steps to take immediately after identity theft with this&#8230;<\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><\/div><\/div><\/div><!-- .wp-block-kadence-postgrid -->\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-20885_61f350-8d .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-20885_61f350-8d .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-20885_61f350-8d\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n\n<p>Learn about the history and details about Data Privacy week from the Privacy Commissioner of Canada website below and find resources on how to keep your information safe.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20885_40437b-82, .wp-block-kadence-advancedheading.kt-adv-heading20885_40437b-82[data-kb-block=\"kb-adv-heading20885_40437b-82\"]{text-align:center;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20885_40437b-82 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20885_40437b-82[data-kb-block=\"kb-adv-heading20885_40437b-82\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20885_40437b-82 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20885_40437b-82[data-kb-block=\"kb-adv-heading20885_40437b-82\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20885_40437b-82 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20885_40437b-82\"><a href=\"https:\/\/www.priv.gc.ca\/en\/about-the-opc\/what-we-do\/awareness-campaigns-and-events\/data-privacy-week\/\" target=\"_blank\" rel=\"noreferrer noopener\">Data Privacy Week &#8211; Office of the Privacy Commissioner of Canada<\/a><\/p>\n\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-20885_9fab0a-78 .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-20885_9fab0a-78 .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-20885_9fab0a-78\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u0422\u0438\u0436\u0434\u0435\u043d\u044c \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0434\u0430\u043d\u0438\u0445 \u043f\u0456\u0434\u043a\u0440\u0435\u0441\u043b\u044e\u0454 \u0432\u0430\u0436\u043b\u0438\u0432\u0456\u0441\u0442\u044c \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0432\u0430\u0448\u043e\u0457 \u043e\u0441\u043e\u0431\u0438\u0441\u0442\u043e\u0457 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457.<\/p>","protected":false},"author":8,"featured_media":20888,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[516],"tags":[537,531,388,534,535],"class_list":["post-20885","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebytes","tag-awareness","tag-education","tag-online-safety","tag-privacy","tag-safety"],"acf":[],"taxonomy_info":{"category":[{"value":516,"label":"KnowledgeBytes"}],"post_tag":[{"value":537,"label":"Awareness"},{"value":531,"label":"Education"},{"value":388,"label":"online safety"},{"value":534,"label":"Privacy"},{"value":535,"label":"Safety"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/01\/data-privacy-week-featured-blog-image-1024x538.png",1024,538,true],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/uk\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":77,"filter":"raw","cat_ID":516,"category_count":77,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":[{"term_id":537,"name":"Awareness","slug":"awareness","term_group":0,"term_taxonomy_id":537,"taxonomy":"post_tag","description":"","parent":0,"count":68,"filter":"raw"},{"term_id":531,"name":"Education","slug":"education","term_group":0,"term_taxonomy_id":531,"taxonomy":"post_tag","description":"","parent":0,"count":48,"filter":"raw"},{"term_id":388,"name":"online safety","slug":"online-safety","term_group":0,"term_taxonomy_id":388,"taxonomy":"post_tag","description":"","parent":0,"count":63,"filter":"raw"},{"term_id":534,"name":"Privacy","slug":"privacy","term_group":0,"term_taxonomy_id":534,"taxonomy":"post_tag","description":"","parent":0,"count":32,"filter":"raw"},{"term_id":535,"name":"Safety","slug":"safety","term_group":0,"term_taxonomy_id":535,"taxonomy":"post_tag","description":"","parent":0,"count":30,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/posts\/20885","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/comments?post=20885"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/posts\/20885\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/media\/20888"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/media?parent=20885"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/categories?post=20885"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/tags?post=20885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}