Guidance on Controlling the Twitter Messages you see and the Notifications you Receive

Retrieved By Health eConsultation 0 11325 Article rating: No rating

Protect your mental health from the trolls of social media

You are impacted by the things you see and read whether you like it or not. It can be hard to erase from your mind undesirable images or messages you receive and they can cause much angst, anger, doubt and grief.

Twitter has recently posted a set of instructions on how you can control what you see on twitter, the conversations you are a part of and the types of notifications you receive.

Take action and mute bad messages so they don't impact you negatively. There is a wealth of good information out there that will engage your mind both positively and critically without exposing you to harm from trolls who are out to manipulate you.

How to Protect Your Privacy as More Apps Harvest Your Data

Retrieved By Health eConsultation 0 15648 Article rating: 5.0

A New York Times Personal Tech series article by Brian X. Chen

In this article written by Brian X. Chen from the New York Times he discusses some of the potential ways in which mobile apps that you download to your phone may be collecting and using your personal data in ways you did not know.

One of the key takeaways is that there are ways in which to protect yourself and tools that can help you figure out which apps are collecting your data and how to remove their ability to do so.

NYTimes Explains How to Protect Yourself from Ransomware Attacks

Nathan E Botts 0 11940 Article rating: No rating

Personal Health Data Security

In this article from the New York Times guidance is provided on how to protect people's own personal data from Ransomware attacks such as the Wannacry virus that has been circulating lately. Wikipedia describes ransomware as a type of malicious software that blocks access to data or threatens to publish it until a ransom is paid. Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse. More advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them.[

First1314151618202122Last