• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  News  /  How to be a smart voter and not become a target of political campaigns on digital platforms
11 February 2019

How to be a smart voter and not become a target of political campaigns on digital platforms

Written by Sanjay Katkar
Sanjay Katkar
News
  • 29
    Shares
Estimated reading time: 3 minutes

The cornerstone of a democracy is voting. For any successful democracy to function properly, it is important to ensure that its people’s representatives are chosen fairly and justly. The obvious take-away then is that if voting as an exercise is so important for any democracy, the ones who actually cast their vote, the voters, are doubly so.

In theory, voting is a simple business. You go to a voting booth where you are presented with a choice of options in candidates, pick the one which appeals to you the most and vote for them. The most popular candidate wins the election. Sounds all good and proper, right? If only.

The age of the smart voter

This is the age of smart-everything. From phones to cities to railways to cars, there’s hardly anything which is not prefixed with the “smart” tag. And voting is no different. With millions and billions of people logging on to the Internet every day, politicians have realized that the bulk of their voting populace is on the Internet. And obviously, there is no better way to capture them than go online.

Unfortunately, that is where things have become murky. Political campaigns have often relied on misinformation and at times, blatant fake news to attract voters. The Cambridge Analytica scandal was an important example. Using data collected of thousands of Facebook users, specific ads were showcased to targeted users before the 2016 US Presidential Election. There were thousands of Russian-linked advertisements on Facebook often spreading divisive agenda.

Murky political campaigning

There was also the hacking of emails from the Democratic National Convention which is also a part of the tactic of manipulating voters. Another common tactic which is a part of this strategy is spreading fake news, whether in the form of tweaking a new report or deliberately spreading lies.

It’s obvious then that any average user on the Internet and especially on social media has to be extremely vigilant. Some political parties pump in huge sums of money on digital campaigns to sway voters on their sides. Sometimes, the campaigns may not always rely on facts – they can spread hatred, fake news, peddle conspiracy, all to win a vote. The rhetoric can get angry and heated, even leading to real-life violence.

Stay smart

How do you remain a smart voter and not become a target of these campaigns? Well, the very first step is awareness of what is happening. Once you are aware of exactly the tactics of manipulation, then you can stay one step ahead. In particular:

  • Do not believe anything you receive or see on social media. Check it from different sources, especially good ones, and only then make up your mind on it.
  • On no account, should you forward a message you receive which talks about information you are not sure of.
  • If you find accounts propagating fake news, report them immediately using the options provided on social media.
  • Do not trust information because it ties in with your own views and opinions. Keep your logic in place and ensure that you don’t get trapped into the fake news ecosystem.
  • Do your proper, informed research before deciding to vote. Don’t get swayed by what the candidates are telling you, which often gets amplified by their supporters on social media.
  • Be very careful of how you participate on politics related issues on social media. There are often innocuous pages which subtly propagate political information which can immediately not be recognized. Be aware and try to spot any kind of political inclination.
  • Ultimately, you are a number, part of a large lot, which is being tracked and analyzed through data. So keep your digital footprint as less as possible.

With elections coming up in major democracies around the world in 2019, it is even more important that voters remain smart and make informed decisions about their voting choices.

Seqrite is the enterprise security brand of Quick Heal Technologies Ltd., which offers
world-class enterprise cybersecurity solutions.

This is the last article in the #SeqriteonElectionSecurity series. We hope you enjoyed reading these articles. Subscribe to our bloghttp://bit.ly/2UBbb2T for latest trends and updates from the world of cybersecurity.

 Previous PostBrute-force attacks – Traditional but still Effective
Next Post  Biometric authentication data at risk
Sanjay Katkar
About Sanjay Katkar

Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of Quick Heal Technologies Limited. He holds a Masters in Computer Science from University...

Articles by Sanjay Katkar »

Related Posts

  • Cybersecurity roundup – Jan to April ‘19

    May 22, 2019
  • Cybersecurity Predictions for 2019

    February 22, 2019
  • social media

    How are social networking accounts used for malicious purposes?

    February 18, 2019

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form March 22, 2021
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • How to avoid dual attack and vulnerable files with double extension?

    How to avoid dual attack and vulnerable files with double extension?

    April 9, 2021
  • Cryptocurrency Malware: Bitcoin Mining threats you need to know about

    Cryptocurrency Malware: Bitcoin Mining threats you need to know about

    April 4, 2021
  • Zloader: Entailing Different Office Files

    Zloader: Entailing Different Office Files

    March 23, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (10) Bitcoin (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (284) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (14) EPS (9) Exploit (12) firewall (11) GDPR (10) IoT (10) malware (59) malware attack (23) malware attacks (12) MDM (25) Network security (18) Patch Management (12) phishing (17) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite Workspace
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.