Are You Protected?
Summary: This essay was motivated by two completely separate interests that shouldn’t be mixed up. Don’t be alarmed by one of the videos found for research, but it can happen.
Creating a character, doing the research, finding references, what they are into, how they approach their objectives in the story world, what they are good at, and how they do it. All mentioned are exterior actions, the core of the character will be the choices they make in the story timeline. I found my research, and then some, it was a rabbit hole that could go much deeper.
The second interest is linked to helping people connected in some way to those who gaslight, lie, have issues they want to mask and blame shift to avoid accountability at any expense (the usual list of patterned behavior) educate to pick up on deception, various forms of emotional abuse, someone stalking directly or indirectly through others (major red flag), trying to control other peoples perception in various forms so someone can hide in a public presentation, camouflaged issues dressed up as something else, even the now very obvious professional victim card that exposes a person lacking in empathy and needs to go very low to deflect a history of behaviour, relating what they only know through bad role modelling and control issues. The psychology counselling side of matters.
With those two interests in mind, how do good businesses protect their staff, clients, and data and maintain a balanced workflow? The word is protection, and there is a similar link to protecting a good-natured person from, for example, A toxic element and a damaged feedback loop present in another who only thinks with a questionable bias not always seen underneath the charm or distraction. Yes, that old chestnut, the undeveloped entity always assuming it is never them with shortcuts in the thinking patterns, stimulated by using others, deception, and a hidden agenda. Some forms of stalking are seen in and with technology. An approach that does not consider the harm and is only driven by the stimulation of the actions.
What if it is a computer doing certain actions on behalf of someone? Use the computer in return? That is the traditional way. Choices are usually the first to fix where there is ability, but can be harder with some. So ‘boundaries’ or ‘firewalls’ are under attack until protection is in place. The worry can be technology is the action to watch out for, but I don’t see birds or plants trying to break someone’s wifi or perception for personal gain at any expense. A cat trying to break networks to cover up a toxic virus. Maybe a cat burglar caught in the act. The link is made at the core or lack of.
Some companies are draining data from the population; others are trying to keep it safe. It's a bit like a narcissistic feed for supply and validation in a way, a different kind of hidden (not so hidden) mind software operating with a different survival toolbox, the parasite. The questions asked by many: Don’t they get it? Why do they keep doing it? How can they not see the long-term problem with the biased short-term choices? And the answer is, get educated fast, learn and act faster. Contain in the secondary chapter, quartine the toxic and remove.
The first interest was the character creation, the life of a person in a story and their abilities are needed. A chef makes great food, who can help a hero or heroes overcome a bigger problem hidden that the new character can't do on their own, and the heroes can’t defeat without a skill that could have two purposes… depending on their nature.
Sharing the insight would be helpful; the rabbit hole… the essay, links and videos researched will follow shortly. The exercise is to find out what is not protected and then look for software and equipment that could try and protect. Hero’s get to the end of the story timeline by the skin of their teeth, so I say ‘could try and protect’ when many brands/software/companies offer solid solutions…. what matters is how it is used to be effective.
Curious? Watch this space; first, what happens when you switch your computer on? Why does that happen, and why is social media full of direct and indirect stalkers abusing privacy or using further abuse to cover up abuse, and how is it stopped? Prevention, and then something else. Just as software can be used to expose the backend or layered indirect actions, firewalls are linked to boundaries. Some didn’t realise they needed a boundary from a toxic person who doesn’t want a boundary. Are some companies highly narcissistic? Only if there is one at the core of all actions creating a culture to serve a questionable agenda. I’m glad I found so much information on the right character to make for a story chapter or two.
Plus, it is good to know there are options with technology. Personally, I’ve mostly used technology for creative purposes and research; then, you dive into the rabbit hole. Some brands are going for it… I can't list them all; they should appear once the education is in place. How many know the purpose of a hardware firewall or a password security key or why most stalkers know you? Yes, they will appear without warning in places they are not allowed or have permission trying to appear as something else. Malware is a stalker no doubt, a third-party operative.
It goes without saying these days to have a password app and 2FA app just to keep personal data private more than say other options, just as it is wise to keep good company as some operate under the radar with strange assumption that those outside a vortex or virus can see it. The give away is in the actions, so take action, add protection. In my story… its nearly done.