• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  News  /  How to be a smart voter and not become a target of political campaigns on digital platforms
How to be a smart voter and not become a target of political campaigns on digital platforms
11 February 2019

How to be a smart voter and not become a target of political campaigns on digital platforms

Written by Sanjay Katkar
Sanjay Katkar
News
29
Shares

The cornerstone of a democracy is voting. For any successful democracy to function properly, it is important to ensure that its people’s representatives are chosen fairly and justly. The obvious take-away then is that if voting as an exercise is so important for any democracy, the ones who actually cast their vote, the voters, are doubly so.

In theory, voting is a simple business. You go to a voting booth where you are presented with a choice of options in candidates, pick the one which appeals to you the most and vote for them. The most popular candidate wins the election. Sounds all good and proper, right? If only.

The age of the smart voter

This is the age of smart-everything. From phones to cities to railways to cars, there’s hardly anything which is not prefixed with the “smart” tag. And voting is no different. With millions and billions of people logging on to the Internet every day, politicians have realized that the bulk of their voting populace is on the Internet. And obviously, there is no better way to capture them than go online.

Unfortunately, that is where things have become murky. Political campaigns have often relied on misinformation and at times, blatant fake news to attract voters. The Cambridge Analytica scandal was an important example. Using data collected of thousands of Facebook users, specific ads were showcased to targeted users before the 2016 US Presidential Election. There were thousands of Russian-linked advertisements on Facebook often spreading divisive agenda.

Murky political campaigning

There was also the hacking of emails from the Democratic National Convention which is also a part of the tactic of manipulating voters. Another common tactic which is a part of this strategy is spreading fake news, whether in the form of tweaking a new report or deliberately spreading lies.

It’s obvious then that any average user on the Internet and especially on social media has to be extremely vigilant. Some political parties pump in huge sums of money on digital campaigns to sway voters on their sides. Sometimes, the campaigns may not always rely on facts – they can spread hatred, fake news, peddle conspiracy, all to win a vote. The rhetoric can get angry and heated, even leading to real-life violence.

Stay smart

How do you remain a smart voter and not become a target of these campaigns? Well, the very first step is awareness of what is happening. Once you are aware of exactly the tactics of manipulation, then you can stay one step ahead. In particular:

  • Do not believe anything you receive or see on social media. Check it from different sources, especially good ones, and only then make up your mind on it.
  • On no account, should you forward a message you receive which talks about information you are not sure of.
  • If you find accounts propagating fake news, report them immediately using the options provided on social media.
  • Do not trust information because it ties in with your own views and opinions. Keep your logic in place and ensure that you don’t get trapped into the fake news ecosystem.
  • Do your proper, informed research before deciding to vote. Don’t get swayed by what the candidates are telling you, which often gets amplified by their supporters on social media.
  • Be very careful of how you participate on politics related issues on social media. There are often innocuous pages which subtly propagate political information which can immediately not be recognized. Be aware and try to spot any kind of political inclination.
  • Ultimately, you are a number, part of a large lot, which is being tracked and analyzed through data. So keep your digital footprint as less as possible.

With elections coming up in major democracies around the world in 2019, it is even more important that voters remain smart and make informed decisions about their voting choices.

Seqrite is the enterprise security brand of Quick Heal Technologies Ltd., which offers
world-class enterprise cybersecurity solutions.

This is the last article in the #SeqriteonElectionSecurity series. We hope you enjoyed reading these articles. Subscribe to our bloghttps://bit.ly/2UBbb2T for latest trends and updates from the world of cybersecurity.

 Previous PostBrute-force attacks – Traditional but still Effective
Next Post  Biometric authentication data at risk
Sanjay Katkar

About Sanjay Katkar

Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies Limited. He holds a Masters in Computer Science from University of Pune, India. Sanjay has...

Articles by Sanjay Katkar »

Related Posts

  • CVE-2022-30190: Zero-day vulnerability “Follina” in MSDT exploited in the wild

    June 10, 2022
  • Zero-day Vulnerability

    Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT

    June 3, 2022
  • Advisory on Russia-Ukraine Conflict-Related Cyberattacks

    March 15, 2022
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies