{"id":2719,"date":"2021-01-28T11:15:53","date_gmt":"2021-01-28T05:45:53","guid":{"rendered":"https:\/\/www.stellarinfo.co.in\/blog\/?p=2719"},"modified":"2025-04-03T13:01:59","modified_gmt":"2025-04-03T07:31:59","slug":"protect-personal-data","status":"publish","type":"post","link":"https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/","title":{"rendered":"Data Privacy Day: A Reminder to Protect Your Personal Data"},"content":{"rendered":"<table style=\"border: 2px dashed #95baee; height: 59px;\">\n<tbody>\n<tr>\n<th style=\"background-color: #d1e4ff; text-align: justify;\"><strong>Summary:<\/strong> This blog shares tips to protect data and discusses how data breach is more critical than it is perceived to be.<\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">An individual&#8217;s personal data is being processed and accessed every second <\/span><span style=\"font-weight: 400;\">\u2013 in the form of card and digital payments, at work, in dealing with public authorities and offices, for medical procedures, for travel bookings, or during something as regular as surfing the internet. Most individuals, however, are usually unfamiliar with the risks of the data breach. <strong>Data Privacy Day <\/strong><\/span><span style=\"font-weight: 400;\">is observed in order to sensitize individuals and disseminate privacy practices and principles. Whether it\u2019s an internet user, a consumer, or privacy personnel, the onus of safeguarding privacy lies with every individual.<\/span><\/p>\n<h2 style=\"text-align: justify;\"><b>What is a Data Breach?\u00a0<\/b><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">With the advancement of technology, much of our personal information has been moving to digital. A <\/span><b>data breach<\/b><span style=\"font-weight: 400;\"> is a security incident where information is accessed without authorization, affecting individuals and businesses in many ways. Online crime, a result of a data breach, is a threat to anyone on the Internet. It can often damage lives and reputations. The data breach is a growing concern for both individuals and business organizations.<\/span><br \/>\n<span style=\"font-weight: 400;\">Breach, defined as \u2018<\/span><b>an act of breaking<\/b><span style=\"font-weight: 400;\">\u2019, is an attack on one\u2019s cyber data. By breaking into your personal and valuable information to access your confidential and personal identification details like personal health information, PINs, social security numbers, bank details, credit card details, intellectual property, trade secrets, etc, cyberattacks are becoming increasingly common.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\"><strong>Cyber attacks<\/strong> lead to compromised personal data that can easily be viewed, transmitted, or copied for nefarious activities by fraudsters, hackers, and spies. <strong>Cybercrimes<\/strong> often occur due to spear-phishing, accessing not-so-secure website\/payment gateways, accessing your private chats and profiles on social media apps like <strong>WhatsApp, Facebook, Instagram,<\/strong> etc, opening <strong>suspicious emails<\/strong> that lure you with monetary rewards. In 2016, <\/span><a href=\"https:\/\/www.tripwire.com\/state-of-security\/security-data-protection\/44-million-email-scam\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Leoni AG lost $44 million in an email scam<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span style=\"font-weight: 400;\">\u2018<\/span><b>Data leak\u2019, \u2018Data spill\u2019 are some other terms of data breach<\/b><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Stories of massive data breach pops up in the news frequently these days. 2020 witnessed some alarming data breach and cyber-attacks. On <strong>January 22, Microsoft disclosed a data breach from December 2019<\/strong>. In a blog post, <em>Microsoft said a change made to the database\u2019s network security group on December 5, 2019, contained misconfigured security rules that enabled exposure of the data.<\/em> According to ZDNet, the servers contained 250 million entries, with information such as email addresses, IP addresses, and support case details.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">In 2020, the Covid-19 induced pandemic pushed organizations and businesses to transition most of their work to remote working, making the use of digital and technological tools even more prominent than earlier. It meant more digital exposure and adoption of technology.<\/span><\/p>\n<h2 style=\"text-align: justify;\"><b>The data breach that affected India in 2020<\/b><\/h2>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Twitter Data Breach<\/b><span style=\"font-weight: 400;\">: On July 15, 2020, a small number of employees were targeted through a <strong>phone spear-phishing attack<\/strong>. This attack relied on a significant and concerted attempt to mislead certain employees and exploit human vulnerabilities to gain access to our Twitter\u2019s systems. The knowledge gained through the attack enabled the frauds to target additional employees who had access to the Twitter account support tools.<br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Unacademy Data Breach<\/b><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">: In January 2020, Bengaluru-based online education platform, Unacademy\u2019s over 20 million user accounts were exposed. The cyberattack bared usernames, SHA-256 hashed passwords, date joined, last login date, email addresses, first and last names, and whether this account is active, a staff member, or a super-user and was sold on Dark Web. The data breach was exposed by US-based cybersecurity firm Cybele.<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>BigBasket User Data Breach<\/b><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">: Cybercriminals attacked the online grocery store, BigBasket, in October 2020. Data of 20 million subscribers was exposed as a result. The personal information of users such as full names, email addresses, date of birth, IP addresses of user devices got compromised and was put up on sale on the dark web for $40,000.<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Juspay Data Breach<\/b><span style=\"font-weight: 400;\">: The Bengaluru-based payment entity was attacked in August 2020. As per the details shared by the company, a system where the data was stored by the company was exposed in a cyberattack and over 3.5 crore records with masked card data and card fingerprint (which is non-sensitive information) were breached.<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><b>Reasons for Data Breach<br \/>\n<\/b><span style=\"font-weight: 400;\">Online usage soared in the year 2020 with the on-going coronavirus pandemic. As the pandemic forced people to confine themselves to their houses, digital proceedings grew. It gave scammers an opportunity to launch phishing attacks. Cybercrime is a profitable industry that continues to grow and in the recent situation, it has become easier. A data breach occurs when a cybercriminal successfully infiltrates a data source and extracts sensitive information. It can be done physically by accessing a computer or network to steal local files or by bypassing network security remotely. Hackers seek personal information to steal money, compromise identities, or sell details over the dark web. The reasons for data breach could be many, including accidental sharing of data. But attackers usually work in these four ways:<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Exploiting system vulnerabilities<\/b><span style=\"font-weight: 400;\">: Finding loopholes in out-of-date software, company\u2019s security systems including computer networks and people. It allows a cybercriminal to slip malware onto a computer and steal data.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Network or Social Attacks because of weak passwords<\/b><span style=\"font-weight: 400;\">: Weak and insecure user passwords are easy to guess and get access into personal systems. Experts advise against simple passwords.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Drive-by downloads<\/b><span style=\"font-weight: 400;\">: It refers to the unintentional download of a virus or malicious software (malware) onto your computer or mobile device. An unintended download can take advantage of a browser, app, or operating system that is out of date and has a security flaw.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Targeted malware attacks<\/b><span style=\"font-weight: 400;\">: A malware attack is a common cyberattack where malware (malicious software\/virus) executes unauthorized actions on the victim&#8217;s system. It encompasses many specific types of attacks such as ransomware, spyware, command and control, and more. Attackers use spam and phishing email tactics to trick users into revealing personal credentials, downloading malware attachments, or directing users to vulnerable websites. Malware attack is most common in the form of suspicious emails.<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><strong><a href=\"https:\/\/www.stellarinfo.co.in\/company\/stellar-news-details.php?pressid=125\">A study by Stellar Data Recovery reveals that used Hard Disk Drives available on classifieds websites contain high-risk data<\/a>.<\/strong><\/p>\n<p style=\"text-align: justify;\"><b>How to protect personal information in cases of a data breach?<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">India ranks third in terms of the highest number of internet users in the world after the USA and China, according to the government of India\u2019s Niti Aayog. The number has grown six-fold between 2012-2017 with a compound annual growth rate of 44%. The country also secures a spot amongst the top 10 spam-sending countries in the world alongside the USA. Ranked among the top five countries to be affected by cybercrime by online security firm \u201dSymantec Corp\u201d, it becomes imperative to understand the ways to protect personal data.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">To begin with, everyone should be aware of the methods used to breach data and keep oneself abreast of data privacy tips to make sure any information is not compromised. Some of the <strong>ways to protect data<\/strong> include:<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Secure Home Routers<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">The Internet router is one of the most important devices in our home, the gateway to Internet access. But it is also prone to exploits by cybercriminals who can sneak into our devices and get access to our system. A strong password may avoid unnecessary use of your Wi-Fi by neighbours, but isn\u2019t enough to protect you from cyber attackers. To secure your home network, change the name of your Wi-Fi network, also known as the SSID (Service Set Identifier), activate network encryption, and change your default IP address. Additionally, use a virtual private network. A VPN will encrypt all traffic leaving your devices until it arrives at its destination. If cybercriminals do manage to hack your communication line, they won\u2019t intercept anything but encrypted data.<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Strong Passwords<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">It all begins with weak passwords. Usually, a strong password consists of alphabets, numerical and special characters with the combination of both uppercase and lowercase. Your password should be 10-15 characters. Also, changing your password frequently and never using the same password for multiple platforms helps in a big way.<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Never Open Suspicious e-Mails<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Even if there is a little doubt about the authenticity of emails, avoid opening it. Cross check the sender\u2019s email ID and open the email only after verifying its authenticity. Always remember to not click on links and advertisements from unknown senders. Emails from retail corporations or banks asking for your details are one of the common ways of data theft. Delete them immediately.<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Browse Secure Websites<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Always browse websites with <\/span><b><i>HyperText Transfer Protocol Secure <\/i><\/b><span style=\"font-weight: 400;\">(<\/span><b><i>HTTPS)<\/i><\/b><span style=\"font-weight: 400;\"> instead of <\/span><b><i>HyperText Transfer Protocol <\/i><\/b><span style=\"font-weight: 400;\">(<\/span><b><i>HTTP).<\/i><\/b><span style=\"font-weight: 400;\"> HTTPS ensures that the website is secure enough for browsing and your information is safe. It protects data integrity and provides confidentiality. HTTPS encryption relies on Secure Sockets Layers (SSL), which ensures that anyone in between the sender and the recipient cannot decode the information exchanged.<\/span><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2724\" src=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2018\/01\/untrusted-websites.png\" alt=\"Protect-your-data\" width=\"1070\" height=\"480\" srcset=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2018\/01\/untrusted-websites.png 1070w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2018\/01\/untrusted-websites-300x135.png 300w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2018\/01\/untrusted-websites-768x345.png 768w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2018\/01\/untrusted-websites-1024x459.png 1024w\" sizes=\"auto, (max-width: 1070px) 100vw, 1070px\" \/><\/p>\n<p style=\"text-align: justify;\"><b>Avoid Public Wi-Fi<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Public Wi-Fi networks are of huge convenience. But it also brings security concerns. Most public Wi-Fis do not have a secure wireless encryption protocol. WPA2 wireless encryption protocol is secure than WEP and WPA, if you have to connect to a public Wi-Fi, always connect to WPA2. Ensure not to sign into your accounts for long.<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Secure Your Payments<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">When you purchase things online or dine out at your favorite restaurant, you opt for point-of-sale (POS) transactions. Point-of-sale completes a transaction and includes receipt printing, credit card processing, etc., and store customer data. This eases the online payment ecosystem. But it also contains weak links that can be exploited. You must validate to ensure that you are swiping your credit card through a safe and secure point-of-sale.<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Tip: <\/b><i><span style=\"font-weight: 400;\">Make sure that payment provider is Payment Card Industry Security Standards Council (PCI SSC) complaint<\/span><\/i><\/p>\n<p style=\"text-align: justify;\"><b>Install Anti-virus and Use Updated Software<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Update your antivirus and anti-spyware software regularly to prevent virus intrusion or malware attack. It protects you against spyware, keyloggers, Trojans, adware, worms, rootkits etc. To eliminate security vulnerabilities, always install the latest software updates.<\/span><\/p>\n<h3 style=\"text-align: justify;\"><b>Challenges Are Increasing in the Cyber-Space Domain, Protect Your Data<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">In light of increasing cyber threats, the government has set up initiatives to protect data and is taking stringent actions with cybercriminals. The government has been promising a robust cybersecurity policy. But current laws do not mandate notification of data breach to customers and companies largely tend to report cybersecurity incidents to regulators only where it is mandatory under applicable laws.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">There is still a wide gap in data protection regulations that need to be bridged. Threats are increasing with each technological advancement. While we will have to wait for proper data protection regulations to come into effect. At the time, to protect data, it is important to practice data protection tips to avoid a data breaches.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: This blog shares tips to protect data and discusses how data breach is more critical than it is perceived to be. An individual&#8217;s personal data is being processed and accessed every second \u2013 in the form of card and digital payments, at work, in dealing with public authorities and offices, for medical procedures, for [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":6131,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[25],"tags":[],"class_list":["post-2719","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-awareness","has_thumb"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Privacy Day resolve to protect your personal data - Stellar<\/title>\n<meta name=\"description\" content=\"Data Privacy - Protecting personal data has always been a serious compliance for both, individuals and business organisations. Sharing your personal information to untrusted platforms can be the cause of Data Breach. Here are the few data privacy tips for protecting your confidential information in a much better way.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Privacy Day resolve to protect your personal data - Stellar\" \/>\n<meta property=\"og:description\" content=\"Data Privacy - Protecting personal data has always been a serious compliance for both, individuals and business organisations. Sharing your personal information to untrusted platforms can be the cause of Data Breach. Here are the few data privacy tips for protecting your confidential information in a much better way.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Stellar Data Recovery Blog - Tips and Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-28T05:45:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T07:31:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2018\/01\/This-Data-Privacy-Day-resolve-to-protect-your-personal-data-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sapna Trivedi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sapna Trivedi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Privacy Day resolve to protect your personal data - Stellar","description":"Data Privacy - Protecting personal data has always been a serious compliance for both, individuals and business organisations. Sharing your personal information to untrusted platforms can be the cause of Data Breach. Here are the few data privacy tips for protecting your confidential information in a much better way.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/","og_locale":"en_GB","og_type":"article","og_title":"Data Privacy Day resolve to protect your personal data - Stellar","og_description":"Data Privacy - Protecting personal data has always been a serious compliance for both, individuals and business organisations. Sharing your personal information to untrusted platforms can be the cause of Data Breach. Here are the few data privacy tips for protecting your confidential information in a much better way.","og_url":"https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/","og_site_name":"Stellar Data Recovery Blog - Tips and Solutions","article_published_time":"2021-01-28T05:45:53+00:00","article_modified_time":"2025-04-03T07:31:59+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2018\/01\/This-Data-Privacy-Day-resolve-to-protect-your-personal-data-1.jpg","type":"image\/jpeg"}],"author":"Sapna Trivedi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sapna Trivedi","Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/#article","isPartOf":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/"},"author":{"name":"Sapna Trivedi","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/person\/72d2ed8146040d36ed53c28686115cab"},"headline":"Data Privacy Day: A Reminder to Protect Your Personal Data","datePublished":"2021-01-28T05:45:53+00:00","dateModified":"2025-04-03T07:31:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/"},"wordCount":1778,"commentCount":0,"publisher":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#organization"},"image":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2018\/01\/This-Data-Privacy-Day-resolve-to-protect-your-personal-data-1.jpg","articleSection":["Data Awareness"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/","url":"https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/","name":"Data Privacy Day resolve to protect your personal data - Stellar","isPartOf":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/#primaryimage"},"image":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2018\/01\/This-Data-Privacy-Day-resolve-to-protect-your-personal-data-1.jpg","datePublished":"2021-01-28T05:45:53+00:00","dateModified":"2025-04-03T07:31:59+00:00","description":"Data Privacy - Protecting personal data has always been a serious compliance for both, individuals and business organisations. Sharing your personal information to untrusted platforms can be the cause of Data Breach. Here are the few data privacy tips for protecting your confidential information in a much better way.","breadcrumb":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/#primaryimage","url":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2018\/01\/This-Data-Privacy-Day-resolve-to-protect-your-personal-data-1.jpg","contentUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2018\/01\/This-Data-Privacy-Day-resolve-to-protect-your-personal-data-1.jpg","width":1000,"height":600,"caption":"This Data Privacy Day resolve to protect your personal data"},{"@type":"BreadcrumbList","@id":"https:\/\/www.stellarinfo.co.in\/blog\/protect-personal-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stellarinfo.co.in\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Privacy Day: A Reminder to Protect Your Personal Data"}]},{"@type":"WebSite","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#website","url":"https:\/\/www.stellarinfo.co.in\/blog\/","name":"Stellar Data Recovery Blog - Tips and Solutions","description":"","publisher":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stellarinfo.co.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#organization","name":"Stellar Data Recovery","url":"https:\/\/www.stellarinfo.co.in\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2020\/07\/stellar-data-recovery-logo.png","contentUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2020\/07\/stellar-data-recovery-logo.png","width":181,"height":52,"caption":"Stellar Data Recovery"},"image":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/person\/72d2ed8146040d36ed53c28686115cab","name":"Sapna Trivedi","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0db6ffaa3f10a093ff255fb7ed228481?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0db6ffaa3f10a093ff255fb7ed228481?s=96&d=mm&r=g","caption":"Sapna Trivedi"},"description":"Sapna Trivedi is a Sr. Online Marketing Executive at Stellar. She has more than 5 years' of experience in the data recovery industry. Specifically, she has knowledge of data recovery services, photo recovery software, and SQL Repair software. She has always been a learner and she loves to implement her technical &amp; marketing skills in her professional career. She has been successful in creating a blend of her hard skills and soft skills and utilize it effectively in her domain area of expertise.","url":"https:\/\/www.stellarinfo.co.in\/blog\/author\/user3stellar\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts\/2719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/comments?post=2719"}],"version-history":[{"count":1,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts\/2719\/revisions"}],"predecessor-version":[{"id":10856,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts\/2719\/revisions\/10856"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/media\/6131"}],"wp:attachment":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/media?parent=2719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/categories?post=2719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/tags?post=2719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}