Reagan.com: Blog Blog https://www.reagan.com/ Tue, 19 Mar 2024 10:54:41 GMT urn:store:1:blog:post:215 http://www.reagan.com/how-to-protect-your-digital-privacy-at-work How to Protect Your Digital Privacy at Work <p><img src="https://images.clickfunnels.com/25/ea701e22b847f1af27cc2cd5b750ab/iStock-641382150_super.jpg" alt="" width="300" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p><span>One of the most frequently asked questions we receive at Reagan.com is: “Does a person have a right to privacy at work?” And the answer is yes and no. We’re not trying to be funny or vague with our answer to this question. But there is no black-and-white answer—it’s fairly gray. </span></p> <p><span>Presently, it is not uncommon for </span><a href="https://www.cnbc.com/2019/04/15/employee-privacy-is-at-stake-as-surveillance-tech-monitors-workers.html">employers to monitor, screen and track</a><span> employees' company-related email, phone conversations, movements and locations. While this may seem reasonable when it comes to company-owned equipment (phones, cell phones, vehicles) and business-related communications (emails, texts, faxes), many organizations are starting to encroach on their employees’ <strong>personal</strong> privacy. The monitoring has moved beyond business-related outlets and extended into employees’ own private communications.  </span></p> <p><span>Below, we’ll discuss some of the ways many businesses may be privy to personal information. </span></p> <p></p> <h2><strong><span>Three Common Types of Workplace Surveillance</span></strong></h2> <p> </p> <h3><strong><span>Social Media Monitoring</span></strong></h3> <p><span>Many employers are relying on third-party firms to perform background checks on prospective employees’ social media accounts. If the results indicate that a candidate posts content that the employer finds objectionable, they can prevent the person from moving forward in the hiring process. Companies can also dismiss existing employees if they discover content that they find objectionable on that employee’s personal (not business-related) social media page.</span></p> <p><span>  </span></p> <h3><span>Email Monitoring</span></h3> <p><span>While it's perfectly reasonable for companies to monitor their business-owned email accounts (it is their business after all), most employees would consider it an invasion of privacy for their employer to access their personal email accounts. However, a company can monitor most anything that is accessed through its computer system. That includes an employee’s personal email account. </span></p> <p><span>How is that possible? Many courts have ruled that, although the email account is the employee’s own personal account, they are accessing it using company-owned computers, servers, and equipment. So, if you’re sending an email to a spouse, friend or family member from your own personal email account, but you’re doing so on your work computer, your employer can read it - legally.</span></p> <h3><span><strong>Personal Phone</strong></span></h3> <p><span>Do you use your personal smartphone to access your company email account? If so, you probably signed away some of your personal rights. When employers ask their employees to use their personal phones for business purposes, most do not have any issues with that arrangement. Yet, most employees do not read the small print on the “use your own device” waivers that the employer asks them to sign. If they did, the employees would realize that, in order to guard their confidential business information, most employers ask their employees to waive their personal privacy. That means an employer can monitor and even erase information on an employee's personal phone if they feel that their confidential business information was compromised. </span></p> <h2><span> </span></h2> <h2><span><strong>How You Can Protect Your Privacy</strong></span></h2> <p></p> <p><span>It’s bad enough that you have to protect your personal email and information from cybercriminals and computer hackers. Now, you have to potentially protect the privacy of your personal information at work, too! </span></p> <p><span>While this news is frustrating, there is a way you can protect your privacy—relying on a </span><a href="https://www.reagan.com/"><span>private email service</span></a><span> like Reagan.com. Our service provides greater privacy and protection of your personal information by using SSL and TLS encryption standards. While some employers may think it’s okay to read private communications and restrict access to personal accounts, Reagan.com doesn’t agree. Our country was founded on the principles of protecting personal freedom and rejecting tyranny. President Ronald Reagan upheld those principles. And just like our namesake, Reagan.com vows to uphold those principles, too.   </span></p> <p><a href="https://www.reagan.com/"><span>Join today</span></a><span> to protect your privacy and enjoy greater peace of mind!</span></p> urn:store:1:blog:post:214 http://www.reagan.com/how-ronald-reagan-championed-individual-achievements-and-not-technocracy How Ronald Reagan Championed Individual Achievements and Not Technocracy <p> </p> <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/49/d84530d9bf11e68d32f1b740e55ab4/Reagan-Presidential-Portrait.png" alt="" width="149" height="169" /></p> <p> </p> <p>“We've come through some tough times, but we've come through them together -- all of us, from every race, every religion, and ethnic background. And we're going forward with values that have never failed us when we lived up to them -- dignity of work, love for family and neighborhood, faith in God, belief in peace through strength, and a commitment to protect the freedom which is our legacy as Americans.”</p> <p>Those inspirational words, spoken by President Ronald Reagan to a large group of supporters in <a href="https://www.reaganlibrary.gov/archives/speech/remarks-reagan-bush-rally-hammonton-new-jersey">Hammonton, NJ on September 19, 1984</a>, gives us a spectacular look at his vision for America. In his vision, President Reagan saw a country that supported small government and championed individual personal success. </p> <p> </p> <p style="text-align: center;"><iframe width="560" height="315" title="YouTube video player" src="https://www.youtube.com/embed/juiFbHtlVO4" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p> <p> </p> <p>Yet, in that same address, President Reagan warned his supporters of those who sought to undermine the public’s yearning for less government interference and greater individual freedom: “They see America wringing her hands; we see America raising her hands. They see America divided by envy, each of us challenging our neighbor's success; we see America inspired by opportunity, all of us challenging the best in ourselves. We believe in knowing when opportunity knocks; they go out of their way to knock opportunity. They see an America where every day is April 15th, tax day; we see an America where every day is the Fourth of July.”</p> <p> </p> <h2><strong>Beneath the Inspirational Message… a Warning for the Future</strong></h2> <p> </p> <p>Who was President Reagan referring to? A particular and problematic type of politician: those who want to replace our beloved democracy with a technocracy. </p> <p>As we <a href="https://www.reagan.com/is-america-a-technocracy-or-a-democracy">explained in a previous post</a>, a technocracy is a system of government that, instead of relying on elected representatives to carry out the will of the people, hands all of the power to a group of elitists, academics, scientists and other self-described experts of industry and professions. In other words, these technocracy-supporting politicians and their technocratic ilk believe they know what's best for you. They’ll take care of everything. And all you have to do is sit there quietly and let them have their say in every part of your life. </p> <p>When President Reagan won reelection a few weeks after his Hammonton speech, he was able to prevent the technocrats from taking over the government. A few years later, when his Vice President George H.W. Bush was elected as his successor, President Reagan’s anti-technocracy mission continued with the new administration. </p> <p>However, things began to take a turn toward technocracy with the election of Bill Clinton in 1992. Throughout most of the 1990s and again in 2008, technocracy-supporting politicians began to dismantle many of the popular policies that President Reagan implemented to reduce government dependency and bolster individual success. </p> <p>Even though our country had a four-year reprieve from the harm caused by these technocracy-leaning administrations, our country is facing another crisis with the current administration. Presently, we are faced with an administration that wants to raise taxes to pay for outlandish policies that overstep the bounds of our traditional democracy and values. Even worse, the next wave of these politicians are even greater supporters of technocratic elites calling the shots. </p> <p>“Well, we won't let them put that ball and chain around America's neck. I don't think that you in South Jersey believe your families were put on this Earth just to help them make government bigger,” warned President Reagan almost 40 years ago. “They want to enact a massive tax increase to put in their new so-called trust fund. Well, we don't want their new government trust fund; we want a government that trusts you.”</p> <p> </p> <h2><strong>Say No to Technocracy</strong></h2> <p></p> <p>How can Americans take a stand against technocracy? First, we must vote against and vote out any politician who supports technocratic values. Second, we must vote with our dollars. Big tech is one of the biggest bankrollers of these technocracy-supporting politicians and their harmful agendas. Instead of paying your hard-earned dollars to internet providers who will use your money to support politicians who despise individual freedom, you can put your trust in company that shares your values and beliefs.</p> <p>By choosing a <a href="https://www.reagan.com/">private email service</a> like Reagan.com over the Big Tech supporters of technocracy, you’ll follow in President Reagan’s footsteps. At Reagan.com, we believe in President Reagan’s vision for a government that treats its citizens as equals - and not as children who should sit idle while technocracy controls all of the power. </p> <p>If you’re tired of Big Tech and technocrats gaining more control of our individual freedom, then it’s time to choose a different path. A better path. <a href="https://www.reagan.com/">Join Reagan.com today</a> and we’ll follow that path together.</p> urn:store:1:blog:post:213 http://www.reagan.com/3-steps-to-take-if-your-personal-information-has-been-caught-in-a-data-breach 3 Steps to Take if Your Personal Information Has Been Caught in a Data Breach <p><img src="https://images.clickfunnels.com/f5/f4cc112b304d1dac7bc9a6f51f9520/iStock-502192161_super.jpg" alt="" width="300" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">You hear it on the news. You read it in the paper. You see it on Facebook. The headline might read: “Major Data Breach - Millions Affected!” It’s happening more and more. </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><a href="https://www.securitymagazine.com/articles/95793-data-breaches-in-the-first-half-of-2021-exposed-188-billion-records">According to a recent report</a>, there have been 1,767 breaches reported in the first half of 2021. This rash of online scams and fraud due to data breaches has affected major companies such as Eye Care Network, Parler, CVS Health, Hobby Lobby, and the Cancer Treatment Centers of America, just to name a few. The <a href="https://www.wsj.com/articles/t-mobile-hacker-who-stole-data-on-50-million-customers-their-security-is-awful-11629985105">recent data breach of T-Mobile</a>, one of the biggest this year, impacted 50 million of the mobile phone service’s customers. </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">With data breaches and online scams becoming more common, it’s only a matter of time before it affects you or someone you know. We previously outlined the <a href="https://www.reagan.com/4-effective-tips-to-avoid-a-data-breach">steps you need to take to help avoid data breaches</a>, but there is still a chance you could be at risk. Don’t panic if you receive notification from a recently breached company which states that your personal information may have been exposed. Instead, take action. </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Below, we’ll show you how to protect yourself after a data breach by following three key steps. </span></p> <p></p> <h2><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>1. Change Your Passwords After a Data Breach </strong></span></h2> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Since your personal information may have been compromised, it’s possible that cybercriminals now have access to your various online accounts. But which ones? Instead of spending too much time trying to determine which accounts may be compromised, use that time to take appropriate action. This can be done by updating your passwords for each of your online accounts. From healthcare provider portals to online banking to major retailers, you’ll want to change your passwords so these criminals can’t access your accounts. </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">For extra security, we also recommend <a href="https://www.pcmag.com/how-to/two-factor-authentication-who-has-it-and-how-to-set-it-up">setting up two-factor authentication</a> for all of your online accounts. This extra security measure makes it harder for hackers to access your accounts and information. For example, the two-step authentication process may prompt questions that only you can answer. In other cases, it may send a special access code as a text message to your cell phone. These extra steps make it extremely difficult for criminals to retrieve your information. </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <h2><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>2. </strong><strong>Alert Your Bank About the Data Breach</strong></span></h2> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">After you reset your passwords and establish two-step authentication processes for your accounts, it’s time to safeguard your financial information. You should immediately notify your bank or credit union if a recent breach potentially exposed your banking, debit or credit card information. When speaking with a banking professional, explain that your information may be vulnerable due to a recent security breach. Then request that your financial institution monitor your accounts and bank statements for any suspicious activity. If the bank spots odd charges to your cards (especially if they are out of state or out of the country), they’ll be able to freeze and prevent the criminals’ access to your money. </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Your bank may even recommend destroying your current credit and debit cards and issuing new replacement cards as a safety measure. This is a great idea as you can then update your newly protected online accounts with this new card info.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <h2><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>3. Request a Free Credit Report After a Data Breach </strong></span></h2> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Once your banking information and credit card/debit cards are secured, it’s time to implement the final step to protect your information. If cybercriminals did access your personal information, they may be trying to open up new accounts in your name. To prevent them from doing so, you’ll want to <a href="https://www.annualcreditreport.com/index.action">request a free credit report</a>. This will allow you to monitor your credit to ensure that criminals are not using your information to set up fraudulent accounts. You can also go the extra mile and <a href="https://www.consumer.ftc.gov/articles/what-know-about-credit-freezes-and-fraud-alerts">place a Fraud Alert on your credit report</a>, or even freeze your credit so that no one—not even you—can open a new credit account in your name.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">There is one more way you can defend your personal information from cybercriminals: working with trusted companies who go the extra mile to ensure your safety online. By putting your trust in a <a href="https://www.reagan.com/">private email service like Reagan.com</a> you’ll take significant action toward protecting the privacy of your personal information. While Big Tech email service providers are more vulnerable to online criminal activity, Reagan.com takes extra measures to ensure your privacy. We guarantee that our customers’ personal data is never copied, scanned or sold to third-parties. <a href="https://www.reagan.com/">Join today</a> and take a stand against security breaches. </span></p> urn:store:1:blog:post:212 http://www.reagan.com/when-activism-can-be-bad-for-business When Activism Can Be Bad for Business <p><img src="https://images.clickfunnels.com/22/91ae67e6d54d198b9c8aca6121d0e3/heather-mount-kvHk3mccNj0-unsplash.jpg" alt="" width="300" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p></p> <h2 style="text-align: center;"><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></h2> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Remember when corporations, businesses and brands didn’t have a political agenda? For people of a certain age that sounds unbelievable, but many of us can recall the days when companies were only interested in promoting their products and services. Now in the age of “woke” culture, many companies, from giant corporations to local shops, are <a href="https://www.heritage.org/progressivism/heritage-explains/woke-corporate-capitalism">actively participating in brand activism</a> to promote their (mostly leftist) politics instead of their business. </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <p><span style="font-family: 'times new roman', times; font-size: 26pt;"><strong>A Growing Trend</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Using brand activism to kowtow to “woke” culture gives these businesses the <em>appearance</em> of being noble, but it’s strictly surface-level lip service. In reality, they’re desperately trying to profit off of a trend that’s being endorsed by the media and many politicians. As their messaging grows increasingly antagonistic toward long-established American values, these brand activists are missing the bigger picture: The <a href="https://hbr.org/2020/02/how-do-consumers-feel-when-companies-get-political">average American does not agree</a> with their agenda. </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Instead of being “progressive”, these companies are continuing to devalue long-standing American principles in the name of brand activism (and, primarily, the pursuit of profit). They’re actually being aggressive to the loyal customers who helped make them successful. Activist brands not only burn bridges, they add more fuel to the fire with every politically-tinged commercial, ad or spokesperson. This is both bad for business and bad for America, too. The best way to put an end to brand activism and send a strong message to these companies is to show your support for businesses that truly share your conservative values.</span></p> <p></p> <h2><span style="font-family: 'times new roman', times; font-size: 26pt;"><strong>Promote Strong Values</strong></span> </h2> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">There’s a lot of truth in the phrase “vote with your dollars.” Sending letters and emails to corporate leaders or writing messages on their social media pages may be cathartic, but they’re mostly futile efforts. Instead, stop spending your hard-earned dollars with activist brands and choose products and services from companies like Reagan.com that share your conservative values and beliefs. By making this change, you not only deprive these phony brand activists of their much-needed funds, but you also ensure that conservative-friendly businesses will continue to grow and thrive. </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Many big tech email services and providers continue to support the “noble” cause of brand activism while they simultaneously ignore consumer activism by <a href="https://www.reagan.com/email_privacy_risks">selling your personal information</a> to the highest bidder. Reagan.com upholds the core conservative values of personal freedom by <a href="https://www.reagan.com/bestprivateemailservice">protecting your personal information with a first-rate email service</a> that is truly private. It’s time to send a message to “woke'' companies by supporting companies who support you! <a href="https://www.reagan.com/reagancom-personal-email">Join Reagan.com today</a>.</span></p> <p> </p> <p> </p> <p><span> </span></p> urn:store:1:blog:post:211 http://www.reagan.com/should-america-regulate-data-privacy-like-europe Should America Regulate Data Privacy Like Europe? <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><img src="https://images.clickfunnels.com/e9/6edc5047cb11e8a4e70d7e52cd3e8f/iStock-537708180.jpg" alt="" width="300" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Since its foundation, America has evolved from 13 idealistic colonies to a world superpower. The U.S. excels as a world leader in many crucial fields such as medical research, defense, aerospace and aviation, higher education, oil production, natural gas output, and technical innovation, just to name a few. Although the U.S. continues to dominate in these fields, there is one area in particular in which we trail: data privacy.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">In 2016, the European Union passed the <a href="https://gdpr.eu/what-is-gdpr/">General Data Protection Regulation (GDPR)</a> to give EU citizens greater control over their personal information and data. Under the GDPR, any organization that collects personal data must protect the rights of each data owner by ensuring that all personal information is collected legally and safeguarded from criminal abuse and exploitation. Since these organizations are legally obligated to adhere to these rules, they face strict penalties for any violations or infractions.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Unlike the EU, America’s data privacy regulations are a jumble of federal, state, and local laws, with an unhealthy dose of self-regulation from the big tech companies. This failure to provide strict and sweeping data privacy regulations has left US citizens vulnerable to a variety of criminal activity, fraud, and abuse. </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">America needs stricter and more clearly defined <a href="https://www.reagan.com/protecting-personal-data">protections for your personal data</a> - but should it be a carbon copy of the GDPR? Below we’ll weigh some of the pros and cons. </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>Pros of Adopting a GDPR-style Law</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">The biggest pro for adopting a GDPR-style data privacy law is the fact that the EU has already laid the groundwork for a new U.S. law. Since many American companies conduct business in the EU, they are legally obligated to comply with the GDPR. That being said, if U.S. data privacy laws and regulations were to closely follow the template set by the GDPR, this action would reduce the need to craft a different set of data protection regulations for U.S. consumers.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">The other main benefit of adopting GDPR-style regulations in the US is that it could help establish a global standard between all of the world superpowers. This would not only hold U.S. and EU companies accountable, it would also protect citizens' data from any violations that stem from businesses operating in China and Russia.  </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>Cons of Adopting a GDPR-style Law</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Although the GDPR has already laid the framework for a strict data privacy and protection law, what works for the EU may not work for the U.S. In fact, the GDPR may not be as effective as it’s perceived to be. <a href="https://iapp.org/resources/article/gdpr-at-two-expert-perspectives/">According to many experts</a>, the GDPR has actually resulted in very few fines and has provided a modicum of protection in the form of website privacy pop-notifications and the like. That’s not the robust protection that was promised.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Another negative aspect of following the EU’s path is that the GDPR could pave the path to bureaucracy. As <a href="https://www.inspiringquotes.us/author/3864-ronald-reagan/about-bureaucracy">President Reagan famously said</a>, “Unless bureaucracy is constantly resisted, it breaks down representative government and overwhelms democracy.” Instead of one sweeping federal law, the US could continue its long-established tradition of allowing private companies to manage their products and services with minimal local, state, and federal regulation. </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">While our country continues to operate without a clearly defined path for establishing real and practical data privacy protections, there are measures that Americans can take themselves. Ideally, consumers will seek out companies that actively protect their personal data, like working with a <a href="https://www.reagan.com/privateemail">private email service provider like Reagan.com</a>. Unlike the Big Tech free email providers, Reagan.com is not in the business of copying, scanning or selling your personal data. You value your freedom and right to privacy and so do we. <a href="https://www.reagan.com/reagancom-personal-email">Join now to protect your privacy</a> today, tomorrow and each day going forward!</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> urn:store:1:blog:post:210 http://www.reagan.com/brought-to-you-by-the-cia-tom-clancys-without-remorse Brought to You by the CIA: Tom Clancy’s Without Remorse <p><img src="https://images.clickfunnels.com/e1/1726ee70cb4eeb95685034e5bb821e/feature-image.jpg" alt="" width="300" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">It was only a matter of time before Tom Clancy adaptations came back into the fold, and after two decades of development hell and multiple delays, <em>Without Remorse</em> is finally available for viewing on Amazon Prime.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Click here to read more: <a href="https://myreelvalues.com/without-remorse/">https://myreelvalues.com/without-remorse/</a></span></p> urn:store:1:blog:post:208 http://www.reagan.com/attempting-free-enterprise-thief Attempting Free Enterprise: Thief <p><img src="https://images.clickfunnels.com/15/664653f6874292aaed5031cb0dfd12/thief.png" alt="" width="300" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Imagine what being in prison for a decade takes away from a person. Start with the immediate things such as time, opportunities and freedom of choice. Then think about what passes you by, such as technology and culture. It’s only natural for a person to feel lonely and irrelevant when they realize how much of the world has passed. Enter Thief, Michael Mann’s theatrical debut from 1981.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Click here to read more: <a href="https://myreelvalues.com/thief/">https://myreelvalues.com/thief/</a></span></p> urn:store:1:blog:post:207 http://www.reagan.com/rejecting-the-anti-social-experience-collateral Rejecting the Anti-Social Experience: Collateral <p><span style="font-family: &quot;times new roman&quot;, times; font-size: 12pt;"><img src="https://images.clickfunnels.com/3f/73bc0fe50f49e69fb213bf5a55edf0/collateral.png" alt="" width="300" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></span></p> <p><span style="font-family: &quot;times new roman&quot;, times; font-size: 12pt;">“What makes this __ not like any other?” It’s the fundamental question that must be answered in order to justify the existence of any film. “What makes this night not like any other?” “What makes this person not like any other?” “What makes this relationship not like any other?” The best dramatists understand how to pose these questions to the audience in a compelling way, and Michael Mann finds his unique way to do exactly that with Stuart Beattie’s screenplay for <em>Collateral</em>.</span></p> <p><span style="font-family: &quot;times new roman&quot;, times; font-size: 12pt;">Click here to read more: <a href="https://myreelvalues.com/collateral/">https://myreelvalues.com/collateral/</a></span></p> urn:store:1:blog:post:206 http://www.reagan.com/the-literal-cost-of-war-the-outpost The Literal Cost of War: The Outpost <p><img src="https://images.clickfunnels.com/72/ecb1f3db2849a6b25e3ba7e44e3be6/outpost.png" alt="" width="300" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Even though a lot has been said about the obvious aspects of war on screen, there are still more nuanced comments to be made through cinema. This is especially true in regards to American conflicts in the Middle East, as depicted on screen. </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Click here to read more: <a href="https://myreelvalues.com/the-outpost/">https://myreelvalues.com/the-outpost/</a></span></p> urn:store:1:blog:post:205 http://www.reagan.com/saving-private-ryan-what-separates-a-hero-from-a-bystander Saving Private Ryan: What Separates a Hero From a Bystander? <p><img src="https://images.clickfunnels.com/9a/afc26ece1d412a8aad9f8c7af4b9c6/ryan.png" alt="" width="300" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p></p> <div class="alith_post_except animate-box fadeInUp animated-fast"> <p><em>“Our heroes are men who do things which we recognize, with regret, and sometimes with a secret shame, that we cannot do. We find not much in ourselves to admire, we are always privately wanting to be like somebody else. If everybody was satisfied with himself, there would be no heroes.” – Mark Twain</em></p> </div> <div class="column-1 animate-box single-main-content fadeInUp animated-fast"> <p>As Americans, we know the stories, we’ve studied the events, we’ve seen the movies, we’ve argued over the history, and we’ve done this with no conflict more than we have with World War II.</p> <p>Click here to read more: <strong>https://myreelvalues.com/saving-private-ryan/</strong></p> </div> urn:store:1:blog:post:204 http://www.reagan.com/what-independence-day-meant-to-ronald-reagan What Independence Day Meant to Ronald Reagan <p><img src="https://images.clickfunnels.com/a8/14d39d60d94db6b211041ea91f9952/rreagan.png" alt="" width="254" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p></p> <p></p> <p><strong><em>“July Fourth is the birthday of our nation. I believed as a boy, and believe even more today, that it is the birthday of the greatest nation on earth.” - President Ronald Reagan, July 1981 </em></strong></p> <p><strong><em> </em></strong></p> <p>President Ronald Reagan’s gift for delivering engaging speeches and penning heartfelt essays and articles earned him the apt moniker “The Great Communicator.” Of all the topics that President Reagan spoke so eloquently and wrote so passionately about, the one subject that truly resonated with him was his patriotism. </p> <p>From motivating his fellow Americans to buy war bonds during World War II to delivering impassioned speeches at Arlington National Cemetery to <a href="https://www.reagan.com/ronald-reagan-memorial-day-speech">honor our fallen soldiers on Memorial Day</a>, our nation’s 40th President always wore his patriotic heart on his sleeve. Apart from Christmas Day, Ronald Reagan’s favorite holiday was the anniversary of our nation’s birth: The Fourth of July.</p> <p>In July 1981, while still recovering from the near-fatal wounds he suffered earlier that year from a would-be assassin’s bullets, President Reagan found the strength to write a sincere reflection of what the July 4th holiday meant to him. In <a href="https://news.google.com/newspapers?nid=1298&amp;dat=19810703&amp;id=KuFNAAAAIBAJ&amp;sjid=KYsDAAAAIBAJ&amp;pg=2520,415277&amp;hl=en" target="_blank">his piece for Parade Magazine</a>, Ronald Reagan not only gives us a nostalgic snapshot of July 4th memories of his Midwestern childhood, he reminds us that there is more to this holiday than backyard barbecues and fireworks displays. </p> <p>History books often overlook the personal and financial sacrifices that our founding fathers made in their quest to secure our country’s freedom. In his July 4<sup>th</sup> essay, President Reagan shines a spotlight on them. He writes, “They were soft-spoken men of means and education; they were not an unwashed rabble. They had achieved security but valued freedom more. Their stories have not been told nearly enough.”</p> <p>By telling their story, Reagan’s words cause us to step outside our own circles and reflect on the brave men and women of our armed forces who currently sacrifice so much to ensure that our nation remains free. In his own way, President Reagan makes us realize that the 4th of July is not just a celebration of our nation’s past and its declaration of freedom from tyranny; it’s also a reminder that to ensure that our country remains free we must all do our part to support it and protect it from threats both foreign and domestic.</p> <p>In his essay, Ronald Reagan says about July 4<sup>th</sup>: <em>“I’ve come to think of that day as more than just the birthday of a nation. It also commemorates the only true philosophical revolution in all history.” </em>This philosophical revolution extends into our everyday lives here in the 21<sup>st</sup> century where we strive for freedom from government overreach and the prying eyes of big corporations that try to use our data.<strong><em> <a href="https://www.reagan.com/privateemail">Creating your private email account at Reagan.com</a></em></strong> is one way to both honor President Reagan and take a stand against those who try to limit your privacy and freedom to communicate.</p> <p>Before signing-off, President Reagan shares one final piece of wisdom with us: </p> <p><em>“Let the Fourth of July always be a reminder that here in this land, for the first time, it was decided that man is born with certain God-given rights; that government is only a convenience created and managed by the people, with no powers of its own except those voluntarily granted to it by the people. We sometimes forget that great truth, and we never should.”</em></p> <p>These words continue to resonate 40 years later.</p> <p>Independence Day celebrations across America are a yearly reminder of our forefathers’ fight against tyranny. We may no longer face King George III, but we struggle each day to preserve our privacy in the face of Surveillance Capitalism. When you sign up for a private email address at Reagan.com, you take a stand for your personal liberties and can rest assured that your private communications will be protected online. <em><strong><a href="https://www.reagan.com/reagancom-personal-email">Start your account today</a>!</strong></em></p> urn:store:1:blog:post:203 http://www.reagan.com/3-reasons-why-you-should-use-a-vpn-to-protect-your-privacy-online 3 Reasons Why You Should Use a VPN to Protect Your Privacy Online <p><img src="https://images.clickfunnels.com/ac/8e67b0837b11e8acd5c18c1bce9803/iStock-471273976_high.jpg" alt="" width="196" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">A smart cybersecurity plan is multifaceted. From using a <a href="https://www.reagan.com/">private email service</a> to a secure password manager, protecting your online activity takes a well-rounded and well-researched strategy. One important piece of that is a VPN.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">VPN stands for <strong>virtual private network</strong>. It’s an essential cybersecurity tool that routes all internet traffic into one highly protected tunnel, masking data on everything from a user’s online habits to their sensitive information. It’s used both by businesses and individuals to offer a needed level of safety and security.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Here are 3 ways a VPN protects you:</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>1. Cloaks your internet activity: </strong>When internet users log onto a public WiFi network, they’re essentially handing over their entire browsing history. A VPN, however, is encrypted, allowing you to log on without being tracked by prying eyes—so you can keep your IP address and internet activity private, as they should be.</span></p> <p></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>2. Masks your sensitive information: </strong>If you’re wondering how a VPN protects you, it’s not just your internet history that’s cloaked. Consider all of the data that can pass through just one browsing session: credit card information, passwords, Social Security numbers, etc. With a VPN, all of that stays protected from potential hackers.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">A VPN can also help provide anonymity in terms of location. A regular IP address gives away personal data like the user’s physical location. With a VPN, users can reroute their actual location to a spoofed IP address, protecting their personal location and providing an added layer of safety. </span></p> <p></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>3. </strong><strong>Protects you from your internet service provider: </strong>Even if you’re using a private network, a VPN can be vital for your cybersecurity. Internet service providers have significant leeway when it comes to leveraging your private data—what you browse, where you shop, where you go even. ISPs commonly use that data, anonymize it and sell it to outside sources, who may use it to target you for ads or marketing purposes. A VPN can help users avoid that intrusion. Most people are fairly boxed in when it comes to selecting an ISP but, with a VPN, they get a bit more authority back over who sees their personal data and how it is used.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">These are just a few of the many ways how a VPN protects you. While a VPN can be a key tool in your efforts to prioritize cybersecurity, it is important to ensure you’re picking the right service. Similar to the <a href="https://www.reagan.com/paid_email_service">dangers of a free email service</a>, a free VPN can <a href="https://www.reagan.com/why-you-shouldnt-trust-free-vpns">pose significant threats to security</a>, even though users may think they’re taking steps to protect themselves. Instead, invest in a VPN service that you can be confident has your privacy at the forefront.</span></p> urn:store:1:blog:post:202 http://www.reagan.com/being-a-man-of-action-tenet Being a Man of Action: Tenet <p><img src="https://images.clickfunnels.com/48/78e0f6a0994bf085a3412433e0a5e3/reel-250.jpg" alt="" style="display: block; margin-left: auto; margin-right: auto;" width="249" height="169" /></p> <p></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><span>We find ourselves in an interesting dilemma here at RV discussing this film. This film is about as apolitical as one can be, but the circumstances surrounding its release could not be more ample fodder for the media circus. 2020’s cinematic and cultural drought collided with Christopher Nolan’s perseverance in making sure the theatrical experience was heralded back to the public with his latest film. </span></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Click here to read more: <a href="https://myreelvalues.com/tenet/">https://myreelvalues.com/tenet/</a></span></p> urn:store:1:blog:post:201 http://www.reagan.com/ronald-reagan-memorial-day-speech Ronald Reagan Memorial Day Speech <p><img src="/images/uploaded/memorialps.png" alt="" style="display: block; margin-left: auto; margin-right: auto;" width="300" height="181" /></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Memorial Day is a time for the country to reflect and remember—on the men and women who have sacrificed for our country, on the principles upon which the nation was founded and on the role we all have to play in protecting the freedoms of future generations. All of those principles were fittingly at the heart of the Ronald Reagan Memorial Day speech, which he delivered every year at a moving ceremony to both commemorate lives lost and celebrate victories won—all while connecting these ideas to center attention on the pressing current events of the time. Looking back on the messages and meanings behind these addresses is an important way for modern American culture to reconnect with the true mission of the holiday.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">The <a href="https://www.youtube.com/watch?v=vYWzFgQgacU">1982 Ronald Reagan Memorial Day speech </a> was among his most poignant. Fittingly delivered at Arlington National Cemetery, with scores of veterans and active-duty military members in attendance, the ceremony marked the return of the Unknown Soldier from the Vietnam War, who was being buried that day. Instead of speaking in broad platitudes about military might or valor, Reagan zeroed in on the true personal cost of fighting for freedom—both for servicemembers and their families.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">The president focused on the scourge of the Vietnam War, recognizing that the wounds of the conflict were still deep for many before him at the ceremony. He cited the unique circumstances that so many Vietnam vets faced, returning to a country where support for military members was sorely lacking. However, he struck a note of optimism that he sought to impart to his listeners: “We’ve learned that government owes the people an explanation and needs their support for its actions at home and abroad. And we have learned, and I pray this time for good, the most valuable lesson of all — the preciousness of human freedom.”</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">The impact of military service on families was a common throughout many of the Ronald Reagan Memorial Day speeches, especially his <a href="https://www.youtube.com/watch?v=vYWzFgQgacU">1982 remarks</a>. Reagan reflected on the deep losses so many Americans had suffered in the previous decades but sought to inspire those in attendance to funnel that loss into action—urging all present to redouble efforts to press for closure for the families of those missing in action: “Heal the sorest wound of this conflict,” the president said. “Return our sons to America. End the grief of those who are innocent and undeserving of any retribution.”</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><a href="https://www.youtube.com/watch?v=vYWzFgQgacU">Reagan’s Memorial Day speech</a> illustrates just why he was called the Great Communicator: He deeply understood his audience, connected with them and provided them with an actionable path forward — a model we should all look to this Memorial Day.</span></p> <p></p> urn:store:1:blog:post:200 http://www.reagan.com/are-conservatives-welcome-on-social-media Are Conservatives Welcome on Social Media? <p><img src="https://images.clickfunnels.com/8d/f498ac0e1d4f63bfaf8e3db59af29c/adem-ay-Tk9m_HP4rgQ-unsplash.jpg" alt="" style="display: block; margin-left: auto; margin-right: auto;" width="254" height="169" /></p> <p>Amid the constantly churning news cycle of the past year, the role of social media in conveying current events—and shaping public opinion about them—became clearer than ever. Social media giants like Twitter and Facebook have become primary sources in how American political debates are being waged. However, such sites are often left-leaning, leaving many scrambling to find social media sites that welcome conservatives in order to have a voice in American politics.</p> <h2>Pervasive Liberal Bias</h2> <p>The liberal bias across the major social media platforms is pervasive. A full 90% of Republicans polled in the fall of 2020 said they believed mainstream social media censors conservative viewpoints, according to the Pew Research Center. That belief has been supported by some high-profile cases: Many of former President Donald Trump’s social media postings last year were labeled as misinformation and, after the Capitol Riots, <a href="https://www.deseret.com/indepth/2021/1/12/22225290/parler-amazon-facebook-twitter-conservatives-social-media-free-speech">Trump was banned from Facebook and Twitter</a> while many other conservative political leaders were also restricted from posting.</p> <h2>Conservative Social Media Alternatives</h2> <p>Such moves have prompted some to seek out conservative social media sites. <a href="https://parler.com/">Parler</a> is one platform that has <a href="https://www.usatoday.com/story/tech/2020/11/11/parler-mewe-gab-social-media-trump-election-facebook-twitter/6232351002/">gained significant prominence in the last year</a>. Billing itself as the “Free Speech Social Network,” the site was founded in 2018 and amassed 15 million users in the next three years; however, it ran into problems of its own earlier this year after Parler users were implicated in the January 6th riot. Amazon dropped its hosting service and several companies removed the site from their app stores, although it relaunched in February.</p> <h2>Finding Freedom Online</h2> <p>In keeping with its commitment to free speech, Parler officials have said they conduct minimal monitoring of content and do not fact-check posts. Conservative social media sites like <a href="https://gab.com/">Gab</a> and <a href="https://mewe.com/">MeWe</a> also pledge little oversight, which has resonated with users resistant to the monitoring policies of Facebook and Twitter that many conservatives say amount to censorship. However, the relaxed policies have attracted some extremist elements, with groups spouting antisemitic, racist and Islamophobic sentiments taking up residence in these conservative social media sites. This could ultimately hamper their ability to appeal to more centrist conservatives.</p> <p>In a nation as politically divided as ours, it’s not surprising that our modes of online communication have also become just as politically segregated. If mainstream social media continues to favor left-leaning users, conservative social media sites will continue to spring up, as conservatives crave a space to learn and talk about the news without being marginalized for their views.</p> <p>The divisiveness of today’s social media environment highlights the work that remains to embed freedom and privacy into our digital world. As an <a href="/best_email_alternative">email provider with conservative values</a>, Reagan.com works to spread those values of privacy and safety through our services. Private email users can communicate without the fear that they personal data and information is being captured by advertisers or reviewed by the government. <a href="/reagancom-personal-email">Join Reagan.com today!</a></p> urn:store:1:blog:post:199 http://www.reagan.com/disney-and-marvel-should-we-sympathize-with-the-enemy Disney and Marvel: Should We Sympathize With the Enemy? <p><img src="https://images.clickfunnels.com/48/78e0f6a0994bf085a3412433e0a5e3/reel-250.jpg" alt="" width="249" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p style="text-align: center;"><span style="font-family: 'times new roman', times; font-size: 11pt;">“Beware of false prophets, which come to you in sheep’s clothing, but inwardly are ravening wolves.” – Matthew, 7:15</span></p> <p style="text-align: left;"><span style="font-family: 'times new roman', times; font-size: 12pt;">A hero is someone who has the courage to do what most others would not. Film used to largely be our way into their psyche. Villains always interested us and you could not have an effective hero/protagonist without an equally effective antagonist. Darth Vader, Hans Gruber, Biff Tannen; all classic bad guys that make us excited to revisit the films they belong to. However, something changed between 2007-2009. The audience became more interested in the villains than the heroes.</span></p> <p style="text-align: left;"><span style="font-family: 'times new roman', times; font-size: 12pt;">Click here to read more: <a href="https://myreelvalues.com/disney-and-marvel/">https://myreelvalues.com/disney-and-marvel/</a></span></p> urn:store:1:blog:post:198 http://www.reagan.com/it-starts-in-the-home-run-hide-fight It Starts in the Home: Run Hide Fight <p><img src="https://images.clickfunnels.com/48/78e0f6a0994bf085a3412433e0a5e3/reel-250.jpg" alt="" width="249" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">When independent film producer Dallas Sonnier first came on the scene in 2015 with the western/horror throwback, Bone Tomahawk, he started a pattern of funding challenging, “right of center” genre-filmmaking. Since then, he has put out increasingly overt political commentary with films like Dragged Across Concrete and The Standoff at Sparrow Creek. These films tackled the issues of policing, infringement of government on its people, and the justice system in America, all from the perspective of right-leaning filmmakers.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Click here to read more: <a href="https://myreelvalues.com/run-hide-fight/">https://myreelvalues.com/run-hide-fight/</a></span></p> urn:store:1:blog:post:197 http://www.reagan.com/managing-relationships-heat Managing Relationships: Heat <p><img src="https://images.clickfunnels.com/48/78e0f6a0994bf085a3412433e0a5e3/reel-250.jpg" alt="" width="249" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Action cinema has long been a genre that glorified strong and silent heroes. Classical stoics who work through their inner struggles by leaving a trail of bodies in their wake and being the coolest guy in every room they walk into. </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Click here to read more: <a href="https://myreelvalues.com/heat/">https://myreelvalues.com/heat/</a></span></p> urn:store:1:blog:post:196 http://www.reagan.com/are-private-surveillance-cameras-watching-your-every-move Are Private Surveillance Cameras Watching Your Every Move? <p><span style="font-size: 12pt; font-family: 'times new roman', times;"><img src="https://images.clickfunnels.com/9e/8e74e18a9011e8a018af9e15e6419d/iStock-518321696_super.jpg" alt="" width="300" height="200" style="display: block; margin-left: auto; margin-right: auto;" /></span></p> <p><span style="font-size: 12pt; font-family: 'times new roman', times;"> </span></p> <p><span style="font-size: 12pt; font-family: 'times new roman', times;">Private video surveillance has become a common component of city living, as residents seek to protect and monitor their own property. This includes everything from security cameras to Ring doorbells that allow property owners the ability to view, monitor and record any activity within view. However, some large metropolises—particularly those billed as “smart cities” for their advanced reliance on technology—could be taking this concept a step too far. </span></p> <p><span style="font-size: 12pt; font-family: 'times new roman', times;"> </span></p> <p><span style="font-size: 12pt; font-family: 'times new roman', times;"><strong>Eye in the Sky</strong></span></p> <p><span style="font-size: 12pt; font-family: 'times new roman', times;">Video surveillance in smart cities like San Francisco has <a href="https://www.nytimes.com/2020/07/10/business/camera-surveillance-san-francisco.html">recently made headlines</a> for the unconventional—and potentially unconstitutional—approach. In that city, tech mogul Chris Larsen is in the process of setting up a vast network of security cameras, in partnership with local neighborhood groups, whom he works with to identify high-crime or high-risk areas that could benefit from enhanced monitoring. He has committed up to $4 million for the devices and 1,000 of which have been installed since 2012. The stated motivation behind the project is to reduce property crime like car and home break-ins and assist police in criminal investigations. In theory, the cameras funded by Larsen are always running, so they are bound to catch wrongdoers at some point. </span></p> <p><span style="font-size: 12pt; font-family: 'times new roman', times;"> </span></p> <p><span style="font-size: 12pt; font-family: 'times new roman', times;"><strong>Could You Be Recorded?</strong></span></p> <p><span style="font-size: 12pt; font-family: 'times new roman', times;">However, they’re also going to catch a lot more—and that’s where the problem lies. While the cameras are in plain view, many passersby likely won’t notice them and therefore won’t know they’re being recorded, a major threat to personal privacy. The project’s goal of community-empowered policing also creates a risk for bias: It’s up to the camera owners how surveillance is monitored, stored and whether it’s turned over to police for investigative matters. Thus, a potential prosecution could be taken out of the hands of trained investigators. And while the video surveillance in smart cities like San Francisco is currently only directed at capturing basic surveillance, privacy experts say it can eventually be scaled up to facial recognition and license plate reading—a landmine of threats to privacy.</span></p> <p></p> <p></p> <p><span style="font-size: 12pt; font-family: 'times new roman', times;"><strong>Privacy Violations Spread</strong></span></p> <p><span style="font-size: 12pt; font-family: 'times new roman', times;">And San Francisco is not alone. Other tech-reliant cities are rolling out their own surveillance programs: San Diego spent $30 million to install “smart” streetlights whose video footage was often <a href="https://www.voiceofsandiego.org/topics/public-safety/smart-streetlights-are-now-exclusively-a-tool-for-police/">misused by law enforcement</a>, critics say. Using data analytics—often culled from private citizens’ smartphone patterns—the city of Santa Cruz rolled out a predictive policing strategy that sent law enforcement to certain neighborhoods at times when they anticipated crime to occur. In Detroit, police developed a new public-private partnership to dramatically expand surveillance points throughout the city.</span></p> <p><span style="font-size: 12pt; font-family: 'times new roman', times;">Video surveillance in smart cities may, on its surface, sound like an innovative solution for reducing crime; but, in reality, it’s an invitation to violate privacy. The adoption of such strategies will only continue to lay the groundwork for the United States to become a nation built on an infrastructure of mass surveillance—which presents a threat to our personal freedoms and the concept of American democracy itself.</span></p> urn:store:1:blog:post:195 http://www.reagan.com/walking-the-righteous-path-the-equalizer-series Walking the Righteous Path: The Equalizer Series <p><img src="https://images.clickfunnels.com/48/78e0f6a0994bf085a3412433e0a5e3/reel-250.jpg" alt="" width="249" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">“What do you see when you look at me?” This question is on the surface of Denzel Washington’s <em>The Equalizer</em> films as a source of intimidation for his adversaries. However, the meaning beneath these words resonates as an existential challenge posed to the evil-doers receiving them, the man who delivers the words and the people in the audience bearing witness to it all.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><span>Click this link to read more: <a href="https://myreelvalues.com/the-equalizer/">https://myreelvalues.com/the-equalizer/</a></span></span></p> urn:store:1:blog:post:194 http://www.reagan.com/is-america-a-technocracy-or-a-democracy Is America a Technocracy or a Democracy? <p><img src="https://images.clickfunnels.com/0b/bea4fe8a944cac8d4e72c2dc4d1a56/aaron-burden-9C8r4QUwZRQ-unsplash.jpg" alt="" width="300" height="205" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p></p> <p></p> <p></p> <p><span>American society is founded on the concept of democracy - our history, our constitution, and our form of government are all based around this principle. But what happens when technocracy comes into the picture?</span></p> <p><span>Technocracy is a type of governing in which those in power aren’t politicians as we traditionally know them, but rather belong to an elite class of professionals and academics. So, what are the arguments in the technocracy vs. democracy debate?</span></p> <p><strong><span>Technocracy vs Democracy</span></strong></p> <p><span>Historically, American policy is shaped and implemented by politicians—elected by and expected to represent the interests of citizens. But frustrations with everything from corruption to stalemates in D.C. have many Americans craving political leaders outside the norm. That’s what is putting the country at risk for becoming a technocracy.</span></p> <p><span>When comparing technocracy vs. democracy, the first should be understood as a society in which leaders are elected not because of their political expertise but rather their expertise in certain areas. Scientists, engineers and others with certain technical proficiencies are the ones who become the decision-makers, using their experience and expertise to contribute to a highly technical, scientifically structured society. </span></p> <p><strong><span> </span></strong></p> <p><strong><span>The Downsides of Technocracy</span></strong></p> <p><span>While deep experience should always be a prerequisite for leadership, putting those in power who have achieved elite status only further deepens the divides in this country. Leaders who are out of touch with everyday citizens make laws that also aren’t in step with the majority of the country.</span></p> <p><span>Corruption is also a threat. When academics or industry leaders find themselves in positions of governmental power because of their personal expertise, they’re beholden for that power to their specific industry, not to the people—opening the door for rampant corruption.</span></p> <p><span>The idea of technocracy vs. democracy seems like a hypothetical concept but it’s already infiltrating American society. While many elected leaders are cut from the same political cloth, the powerful forces behind the scenes often are elites at the top of their respective industries. For example, technology companies—from social media channels to Internet services corporations—have a significant amount of influence over daily American life and are also embedded in D.C., using their deep pockets and lobbying power to secure regulations and legislation that benefit the needs of the elite.</span></p> <p><span>In a democratic country, the rise of technocracy must be recognized for the threats that it brings to the American people, who much fight against it in order to preserve the freedoms on which the nation was founded.</span></p> urn:store:1:blog:post:193 http://www.reagan.com/why-you-should-use-a-private-search-engine Why You Should Use a Private Search Engine <p><img src="https://images.clickfunnels.com/f6/0dd0ed4a3b4668b67ad5e868c20f0c/best-private-search-engines.jpg" alt="" width="300" height="199" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p><span>Few people think twice about a quick online search. When you need directions, the latest news, a phone number, or any small bit of information, you typically head to the most popular mainstream search sites. However, you could be exposing your data and privacy by doing so. So, what is the safest search engine?</span></p> <p><span>It’s likely not the one you go to first. The big search engines use cookies, which allow them to discreetly gather data on users. These companies are able to see what you’re searching for – this alone can feel like an intrusion, but it can also create future problems. When search engines are able to build a history of users’ searches, they can create profiles compiled with their interests, habits and even frequent locations, all of which can be sold to marketers. These strategies lead to users being targeted by ads, which is a misleading and invasive practice. Search engines can even record your IP address, which could expose your physical location and, ultimately, your safety.</span></p> <p><span>Considering that, it’s time to switch to a private search engine. There are many reputable sites that provide a more secure alternative to the big search engines.</span></p> <p></p> <p></p> <p><strong><span>Top Private Search Engines</span></strong></p> <p><strong><span>StartPage: </span></strong><span>This Netherlands-based site doesn’t rely on tracking cookies and doesn’t track IP addresses. Also, since it’s based overseas, </span><a href="https://www.startpage.com/"><span>StartPage</span></a><span> is compliant with the General Data Protection Regulation, adding an extra layer of security. </span></p> <p><strong><span> </span></strong></p> <p><strong><span>DuckDuckGo: </span></strong><span>This is considered one of the most popular private search engines, perhaps because of the impressive results - the site sources results from more than 400 places. Its privacy policy ensures that it doesn’t store IP addresses or other sensitive personal information and also doesn’t use tracking cookies. </span><a href="https://duckduckgo.com/"><span>DuckDuckGo</span></a><span> does save search terms, but pledges to use the data in a responsible way. </span></p> <p><strong><span> </span></strong></p> <p><strong><span>Swisscows: </span></strong><span>Based underground in the Swiss Alps, </span><a href="https://swisscows.com/"><span>Swisscows</span></a><span> makes user privacy the company’s priority. It records no personal information—no IP address, device data or search terms. The only information is does track is the number of search requests that come through the site each day, which is completely anonymized. Plus, it uses privately owned servers, adding an extra layer of data security.</span></p> <p><span>It’s up to your personal priorities and preferences how you determine what is the safest search engine, but it’s important to do your research and build safe searching into part of a broader strategy for online security. That should include using a </span><a href="https://www.reagan.com/privateemail"><span>private email service</span></a><span>, practicing </span><a href="https://www.reagan.com/tips-for-secure-password"><span>safe password selection</span></a><span>, using device encryption where possible and avoiding public WiFi. With all of these measures in place, you can be more confident that you’re surfing and searching securely. </span></p> urn:store:1:blog:post:192 http://www.reagan.com/best-ways-to-keep-your-email-communications-private Best Ways to Keep Your Email Communications Private <p style="text-align: center;"><img src="https://images.clickfunnels.com/28/99516ad6ad45cf89bf7b41a9c8f4e3/iStock-519735146_high.jpg" width="300" height="199" /></p> <p style="text-align: center;"></p> <p style="text-align: left;"></p> <p>As the world has moved to remote work, online school, and virtual socialization, email has become more important than ever. While email allows us to stay in touch, stay productive, and stay keyed in to and engaged about our rapidly changing world, it does come with a certain level of threat to our privacy. Users risk having their messages tracked, shared, and mined for sensitive information, both by providers and hackers, if they don’t take precautions.</p> <p> <strong>How to Keep Your Emails Private and Safe</strong></p> <p></p> <p>1. <strong>Use a burner email account:</strong> Just like a burner phone is designed as a one-time-use device to cloak users’ identities, burner email functions much the same was. A burner email service (also called disposable email or temp email) generates a unique, anonymous email address for each message the user sends. This anonymity throws cybercriminals and <a href="https://www.reagan.com/google-monitoring-does-google-read-my-emails">companies eager to track you for advertising</a> off your path, which helps to keep your emails private. Burner email services come with some cons, so be sure to check the fine print. Watch out for hidden costs or services that track your usage of their platform.</p> <p> </p> <p>2. <strong>Switch to a private email service:</strong> While public email services like Gmail are attractive to many email users because they’re free and user-friendly, they come with a major tradeoff: your privacy. Gmail combs users’ email to tailor advertising toward their interests, and also tracks other online Google-related activity to build a digital profile, often unbeknownst to the user. Such services are also susceptible to cybercriminal activity, as they lack strict protocols when it comes to transmission and storage.</p> <p>On the contrary, a <a href="https://www.reagan.com/privateemail">private email service</a> offers leading-edge privacy mechanisms that keep your emails away from prying eyes. Make sure to only use private email companies, like Reagan.com, that properly encrypt messages and refuse to sell your data to third-parties.<span> </span></p> <p>Private email service and burner emails are just two of the ways to protect your digital communications, which should be a priority for all email users. Even if you think you don’t use your email for highly sensitive information-sharing, email is often the <a href="https://www.reagan.com/4-common-phishing-attacks-you-need-to-be-ready-for">first entry point that cybercriminals use</a> to gain access to your wider online activity—which can lead to loss of finances, fraud, and much more. If you want to take your email privacy seriously, consider these strategies, and always practice safe online habits.</p> urn:store:1:blog:post:191 http://www.reagan.com/book-review-the-fourth-turning-what-the-cycles-of-history-tell-us-about-americas-next-rendezvous-with-destiny Book Review - The Fourth Turning: What the Cycles of History Tell Us About America’s Next Rendezvous with Destiny <p style="text-align: center;"><img src="https://images.clickfunnels.com/a4/1a2f9657e24c37a55e329475942828/4thturning.png" alt="" width="347" height="299" /></p> <p></p> <p class="Body"><span>“Plausible scenario: The Centers for Disease Control and Prevention announce the spread of a new communicable virus… Congress enacts quarantine measures… Mayors resist. Urban gangs battle suburban militias. Calls mount for the president to declare martial law” - Strauss/Howe (1997)</span><span><o:p></o:p></span></p> <p class="Body"><b><span><o:p> </o:p></span></b></p> <p class="Body"><b><span>How Does This Book Relate to Current Events?</span></b></p> <p class="Body"><span>We are witnessing a profound shift in Western societies. What if we told you that the events of today were prophesied in a book published in 1997? Strauss and Howe authored one of the most important books of our modern day. If you are like most witnessing our troubled world, you want to know 1) what comes next, and 2) how long does this crisis last? By scrutinizing human nature, as it relates to the Anglo-American societies in particular, we can discern patterns of moods and resulting behaviors. We see cycles in nature as tides, day/night, and the seasons. Likewise, each of our physical lives cycle through a familiar pattern. So too are the cycles of humanity as a group. The reader will quickly recognize the events foretold in this book as having come to pass in recent years and further foretelling plausible. The revelations of the underlying forces that shaped such events are even more astounding.</span><span><o:p></o:p></span></p> <p class="Body"><span><o:p> </o:p></span></p> <p class="Body"><b><span>Summary</span></b></p> <p class="Body"><span>Strauss and Howe explain how and why a cycle of history is largely measured by the years of a “long life”, about 86 years (a “long life” also known as a saeculum). About the span of four 21.5 year generations. In fact, this four-type generational cycle theory is not new. It is evident in the Old Testament and the works of Homer, Toynbee, et. al. The authors further explain the generational moods that occur from one generation to the next. Using historical accounts, the authors painstakingly chronicle Anglo-American saeculums dating back from the Medieval, Reformation, New World, and Revolutionary forward to the Civil War, Great Power, and Millennial.<span>  </span>The individual generations largely coincide to “seasons” of the longer 86-year cycle. The book pivots on what was the imminent “Fourth Turning” from Fall to Winter at the time of publishing in 1997. As of this writing in 2020, it is now clear that Winter is upon our Anglo-American, indeed Western Civilization.</span></p> <p class="Body"><span>It is a treat to hear the explanations for the Beach Blanket Bingo ‘50s and the British Invasion of Rock in the ’60s and ‘70s. Why are some generations prolific in the arts and culture and others not? Why do some generations exhibit civic/social tendencies and others more triumphant of the individual? The reader marvels at the parallels that seem obvious, but only after the authors draw your attention to such distinctions. You will never see generations in the same way after reading this work. You will develop deep insights into the GI Generation, </span><span lang="DE">Artist Generation</span><span>, Baby Boomers, Gen-Xers, and Millennials. (In fact, Strauss and Howe are credited with coining the “Millennial” generation moniker.)</span></p> <p class="Body"><span>Why would human nature play out in such a predictable way? As the authors repeatedly state, generations are shaped by the previous generation and shape the next generation. Howe states it in another way, "<i>History creates generations because younger people are shaped by events; Generations create history because older people direct the course of events”</i>. Here in the West, we do not typically think in terms of cyclical time; the ancients knew better as do those in the East. There is “nothing new under the sun” (</span><span lang="ES-TRAD">Ecclesiastes 1:9</span><span>). We should awaken and respond to this immutable truth. Past is prolog. The curious will apply themselves to objective surveys of historical Fourth Turnings in order to prepare and brace for that which will be thrust upon each of us.</span><span><o:p></o:p></span></p> <p class="Body"><span><o:p> </o:p></span></p> <p class="Default"><i><span>“ There is a mysterious cycle in human events.</span></i><span><br /> </span><i><span>To some generations much is given.</span></i><span><br /> </span><i><span>Of other generations much is expected.</span></i><span><br /> </span><i><span>This generation has a rendezvous with destiny. ” </span></i><span><o:p></o:p></span></p> <p class="Default"><b><span>— Franklin Delano Roosevelt (1936)</span></b><b><span><o:p></o:p></span></b></p> <p class="Body"><span><o:p> </o:p></span></p> <p class="Body"><b><span>Why Should I Care?</span></b><b><span><o:p></o:p></span></b></p> <p class="Body"><span>Though history does not always repeat exactly, the future unfolds with familiar forces and outcomes. To appreciate <i><span style="text-decoration: underline;">when</span></i> we are, this book is essential - a mandatory read. “This is a book that turns history into prophesy”, our authors state. We cannot change history any more than we can deny our future. However, we can prepare. We can soften the effects; turn down the volume. Few imagined that our world could change like it has during 2020. The response to the corona virus would have been hard to imagine a year ago. The effects of the <i><span style="text-decoration: underline;">response</span></i> could be a total collapse of Western Civilization, at the risk of sounding hyperbolic. Certainly, small businesses cannot endure indefinite lockdowns, yet 70% of employment emanates from small businesses in the U.S. What we are seeing is an abolition of civil rights in exchange for promises of safety and security.</span></p> <p class="Body"><span>It is only through the lens of history can we evaluation the current motivations and likely outcomes. The one constant in all of life is that of human nature - it does not change. We should each deeply devote ourselves to the events of history within the context of this drum beat. Only then can we hold the promise of a joyous spring (First Turning).</span><span><o:p></o:p></span></p> <p class="Body"><span><o:p> </o:p></span></p> <p class="Body"><b><span><o:p> </o:p></span></b></p> <p class="Body"><b><span>Pros, Cons, and Is It Worth My Time?</span></b><b><span><o:p></o:p></span></b></p> <p class="Body"><span>The regularities of these seasonal turnings will astound even the most ardent skeptic. The reader will see generational moods and collective thinking in a new light. In fact, after reading this book (actually more than once for me), the reader will never see the world the same. The historical detail can be tedious for some. If that is the case, we would encourage you to go as deep as necessary to get the ideas and mark the cadence of time. For some of us, the book will prove a handy reference as questions mature throughout the readers’ overall research.</span></p> <p class="Body"><span>Some of the books that will be reviewed here at Reagan.com will pertain to financial manias, panics, and collapses. The <i>Fourth Turning</i> is foundational material. Knowing <i><span style="text-decoration: underline;">when</span></i> we are in the timeline could help shape important financial, social, and health decisions as each of us will be confronted with acute change. As we progress in our blogs, we will be making use of terminology and concepts from this important work. As you meet with family and friends to discuss current events (and you should schedule periodic meetings), this is a reference to explore in order to anticipate future forces and direction.</span><span><o:p></o:p></span></p> <p class="Body"><span><o:p> </o:p></span></p> <p class="Body"><b><span>References:</span></b><b><span><o:p></o:p></span></b></p> <p class="Default"><span>Strauss, William, &amp; Howe, Neil. (2009). <i>The Fourth Turning: What the Cycles of History Tell Us About America's Next Rendezvous with Destiny</i>. Broadway Books.</span><span><o:p></o:p></span></p> <p class="Default"><o:p> </o:p></p> urn:store:1:blog:post:190 http://www.reagan.com/how-the-pandemic-changed-the-future-of-cybersecurity How the Pandemic Changed the Future of Cybersecurity <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/33/700c70401f47fc9390b4e7d245d2ba/banner-5217683_1920.jpg" alt="" width="357" height="119" /></p> <p> </p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">The COVID-19 pandemic has highlighted frailties and flaws in many cybersecurity defense systems. While security and IT leaders across U.S. businesses have had cybersecurity as a top priority for many years, the virus has prompted many to refocus their attention on this area. Pandemic cybersecurity has become a hot topic largely because the shift to remote work has been one of the dominating effects of the health crisis. Millions of Americans previously worked in office buildings and other settings that had tight cybersecurity protocols - now they are logging on to work platforms, accessing work email and other systems from home. Without a smart, <a href="https://www.reagan.com/what-is-cybersecurity">proactive plan for tackling cybersecurity</a> during coronavirus, they could be exposing the safety and privacy of their company and its data.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>Risks of Remote Work</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">The potential for becoming victims of cybersecurity crimes grows as companies seek to give workers the tools they need from home. Organizations have to move quickly and with agility as they roll out collaboration platforms, document-sharing strategies, and communication systems to keep their workforces productive and engaged during this shift to remote work. Workers also have more autonomy without IT having direct, on-site oversight of their digital footprints, so they could be connecting to unsafe WiFi networks or downloading questionable materials that could put cybersecurity in jeopardy.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> <strong>Putting Personal Data at Risk</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">While pandemic cybersecurity is becoming a priority for businesses, individuals are also being impacted. Americans have spent significantly more time at home—and online—in the last few months, conducting work, homeschooling their kids, shopping, banking, and more all on their home computers and mobile devices. That supply has driven up demand among cybercriminals, who are capitalizing on internet users’ reliance on digital.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>The</strong> <strong>Changing Cybersecurity Landscape</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">The risks are real. According to a <a href="https://www.microsoft.com/security/blog/2020/08/19/microsoft-shows-pandemic-accelerating-transformation-cyber-security/">recent study on cybersecurity during coronavirus</a>, more than half of security leaders surveyed reported an increase in phishing attacks since the start of the pandemic.  As a result, top cybersecurity business leaders in the U.S. have been taking steps such as:</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <ul> <li><span style="font-family: 'times new roman', times; font-size: 12pt;">rolling out endpoint device protections</span></li> <li><span style="font-family: 'times new roman', times; font-size: 12pt;">new multi-factor authentication strategies</span></li> <li><span style="font-family: 'times new roman', times; font-size: 12pt;">anti-phishing tools</span></li> <li><span style="font-family: 'times new roman', times; font-size: 12pt;">VPNs</span></li> <li><span style="font-family: 'times new roman', times; font-size: 12pt;">end-user security education</span></li> </ul> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">One silver lining during the pandemic is that the increase in attacks has helped business leaders address and fix security gaps, which will benefit companies and their workers long term. <a href="https://www.reagan.com/what-is-cyber-resilience">Cybersecurity resilience</a>, in which security leaders are constantly evaluating and reevaluating risks and creating solutions, has become a priority. This trend that will yield significant, long-term results for those looking to protect their security and privacy.</span></p> urn:store:1:blog:post:189 http://www.reagan.com/how-hackers-use-html-code-to-steal-your-data How Hackers Use HTML Code to Steal Your Data <p><img src="https://images.clickfunnels.com/f5/f4cc112b304d1dac7bc9a6f51f9520/iStock-502192161_super.jpg" width="300" height="200" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><a href="https://www.reagan.com/phishing">Phishing emails</a> are among the trickiest, yet often most successful, types of cybersecurity attacks. By soliciting personal information through emails that look genuine, hackers can steal credit card information, banking details, Social Security numbers, contacts, addresses, and much more. Private email has long been equipped to stop such attacks, and some public providers have ramped up security to curb phishing. However, a new technique known as the phishing HTML code scam is on the rise, and users who still rely on public email are at risk.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">As phishing has emerged as a <a href="https://www.reagan.com/what-is-cybersecurity">top threat to cybersecurity</a>, email services have tightened filters to scan for red flags that could suggest a malicious email. With a phishing email, hackers disguise their scam by burying malicious code into the text that appears to the user as gibberish. On the back end, email security tools scan that code for uniformity—if it purports to include a brand name but the email actually doesn’t originate from that brand, it can be flagged as a potential phishing email.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">But hackers have wizened to those tools. With an HTML code approach, cybercriminals mask the malicious text, changing the color and font and embedding it within the complex arrangement of letters and numbers that allows for digital communication and security.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">“Attackers can embed text into their emails that is both invisible to end-users and visible—and confusing—to the machines that automatically scan the mail looking for signs of malicious intent or branding,” researchers explained to <em>Inky Technology</em>. “If the software is looking for brand-indicative text like ‘Office 365’, it won’t find a match.”  </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">That can ultimately trick the software into allowing the email to pass through to the user, which may ultimately trick the user into divulging personal, sensitive information.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><a href="https://www.reagan.com/bestprivateemailservice">Private email offers state-of-the-art security tools</a> that can root out even the most sophisticated cybersecurity scams. An <a href="https://www.reagan.com/">email service like Reagan.com</a> presents a strong line of defense against phishing HTML code emails and other threats. By educating yourself on the risks of public email and the increasingly complex nature of malicious cyberattacks, you can protect your data, your security, and your privacy.</span></p> <p> </p> urn:store:1:blog:post:188 http://www.reagan.com/leveling-the-playing-field-irresistible Leveling the Playing Field: Irresistible <p><img src="https://images.clickfunnels.com/23/791e94b8634c6fa226358e7d64e915/playing-field.png" alt="" width="239" height="152" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p></p> <p style="text-align: left;"><span style="font-family: 'courier new', courier; font-size: 9pt;"><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>“Liberal and conservative have lost their meaning in America. I represent the distracted center.” – Jon Stewart</strong></span></span></p> <p style="text-align: left;"><span style="font-family: 'times new roman', times; font-size: 12pt;">                                                                                                                                                                                                               Jon Stewart offers his solution in the form of this cathartic and entertaining tale of a political strategist that sets his sights on a middle-America farming town as his target for electoral interference. </span></p> <p style="text-align: left;"><span style="font-family: 'times new roman', times; font-size: 12pt;">Click this link to read more:  <a href="https://myreelvalues.com/irresistible/">https://myreelvalues.com/irresistible/</a></span></p> urn:store:1:blog:post:187 http://www.reagan.com/book-review-live-not-by-lies-a-manual-for-christian-dissidents Book Review - Live Not By Lies: A Manual for Christian Dissidents <p style="text-align: center;"><img src="https://images.clickfunnels.com/c5/2a72fa9e0e41e7a96a3f34296595b3/live-but-not.png" alt="" width="300" height="276" /></p> <p></p> <h1 style="text-align: center;"><span style="font-size: 11pt; font-family: 'courier new', courier; color: #000000;"><span style="font-size: 10pt;">“The price of liberty is eternal vigilance - first of all, over our own hearts.” - Dreher </span>                                                                                                                                                     </span></h1> <p><strong><span style="font-family: 'courier new', courier; font-size: 12pt;">How Does This Book Relate to Current Events?</span></strong></p> <p><span style="font-family: 'courier new', courier; font-size: 12pt;">We are witnessing a rising Totalitarianism throughout the West. It is troubling. Australians are being pulled from their cars and arrested for not wearing masks. Daily accounts of Europeans and Americans being denied employment, shamed, denied service, and largely “canceled” are chronicled. De-platforming for not following accepted orthodoxy is now commonplace. Refusing to wear a mask lands you on a list grounding you from air travel. This is Soft Totalitarianism, as Dreher defines it. The author’s subsequent discussion of Eastern Europe under Communism is an excellent <span lang="PT">expos</span><span lang="FR">é</span> of how this system operates and how to resist to the point of finally squelching this movement. </span><o:p></o:p></p> <p><o:p> </o:p></p> <p><strong><span style="font-family: 'courier new', courier; font-size: 12pt;">Summary</span></strong></p> <p><span style="font-family: 'courier new', courier; font-size: 12pt;">Rod Dreher pens an insightful record on the concept of Soft Totalitarianism in two steps. First, he dissects the concept by discussing the cultural shifts in Western Society, in particular.</span></p> <p><span style="font-family: 'courier new', courier; font-size: 12pt;">“It is not hard for a totalitarian regime to keep people ignorant. Once you relinquish your freedom for the sake of ‘understood necessity’, …, for conformity with the regime, …you cede your claim to the truth.” - Dreher</span></p> <p><span style="font-family: 'courier new', courier; font-size: 12pt;">Our Western culture has become one of “equality” and “the greater good”. These laudable concepts are shared by both contemporary society and dark periods throughout history. Though virtuous sounding, those behind this push know that many revolutions have begun with these very same precepts. (Sprinkle in economic downturn and food insecurity and history shows how bad our situation can get.) Dreher handles the “political correctness” threat, also referred to as “wokeness”, adroitly. Dissenters of all stripes (including conservatives) dismiss this movement at their own peril. Our “kids” will not grow out of it and, in fact, bring these views to their workplaces and public institutions. If you dissent from the woke party line, you will be destroyed. Canceled, stigmatized, and demonized as racist, sexists, homophobes, Islamaphobes, xenophobes, etc., many are recoiling in fear.</span></p> <p><span style="font-family: 'courier new', courier; font-size: 12pt;">As Ronald Reagan stated, “freedom is never more than one generation away from extinction”. The Millennial generation has been taught conformity like no generation since before WWII (Strauss &amp; Howe, 2009). As the author explains, Marx’s revisionist interpretation is that history depicted a manifestation of class struggle. These are the same lies being promulgated today. Moreover, Dreher discusses the epidemic of hate that has swept our Western societies. Even if the haters do not fully embrace Marx’s tenets, his views are a useful tool to punish the despised.</span></p> <p><span style="font-family: 'courier new', courier; font-size: 12pt;">Some of the strongest points made in the book are interviews with people who resisted communism in Eastern Europe, particularly in the 1960’s and 1970’s. We are not far removed from their dark days and each survivor has strong feelings about what they see today. They know well that we in the West have lost track of the atrocities of the past and are moving in a dangerous direction.</span></p> <p><span style="font-family: 'courier new', courier; font-size: 12pt;">This leads us to the second step of Dreher’s work, that is, how to live in truth. The book recounts Zofia Romaszewska who was a fierce figure within the anti-communist resistance. Today she admonishes the young to get off of the Internet and to join face-to-face to build resistance. She goes on to say that forming communities and networks of communities is critical. Come what may, communities are there for support.</span></p> <p><span style="font-family: 'courier new', courier; font-size: 12pt;">The hard totalitarianism of the past is essential to understand. However, the author cautions that this emerging totalitarianism is “softer, smarter, and more sophisticated”. Today, here in the U.S., you might characterize our existence (October 2020) as voluntary medical Martial Law. A person who accepts the risk of this virus (or any virus) has no ability to live freely. The young are particularly resistant to this virus, but not the virus response. That is not living within liberty, free choice, and self-determination. Yet, the population has complied with hardly a whimper. Frighten people and the Nation State can get the populace to do anything. The evil within our midst will use this to their advantage continually until they finally meet resistance.</span><o:p></o:p></p> <p><o:p> </o:p></p> <p><strong><span style="font-family: 'courier new', courier; font-size: 12pt;">Why Should I Care?</span></strong></p> <p><span style="font-family: 'courier new', courier; font-size: 12pt;">The new wave of Totalitarianism is right on time. The European 86-year revolutionary cycle is perfect - 1848, 1924, 2020. Clearly, Europe is in far worse shape than the U.S., but we follow a similar Anglo-American cycle (Strauss &amp; Howe, 2009). If you believe that our current situation is a temporary blip, you will soon see that a more enduring crisis has commenced. If you understand that a tectonic shift is underway, then a guidebook for dealing with an over-reaching and forceful Nation State is welcome and easily digested. Many of the books we will be reviewing are important from a historical viewpoint. This work is critical historically and as a manual - a rare combination.</span><o:p></o:p></p> <p><o:p> </o:p></p> <p><strong><span style="font-family: 'courier new', courier; font-size: 12pt;">Pros, Cons, and Is It Worth My Time?</span></strong><o:p></o:p></p> <p><span style="font-family: 'courier new', courier; font-size: 12pt;">Live Not By Lies is an important read worthy of your time and a fine book to pass to your friends. The byline of this book might be slightly off-putting to some, A Manual for Christian Dissidents. Importantly, this is not simply a book for Christians. Not at all. It might speak more distinctly to Christians but many varying levels of faith, different faiths, and, indeed, atheists will find this a practical guide in resisting Totalitarianism. Many historical references are made to the leftists/communists/revolutionaries in Eastern Europe and Russia who came to realize that Totalitarian regimes eventually prey on everyone. The book is outstanding as a practical guide to mounting a resistance. Importantly, that resistance is not about looking for trouble or yelling on every street corner. In contrast, the solutions that worked to bring about the Velvet Revolution in Czechoslovakia will work again and are far more fundamental centering on family, community, and eternal values. This book is truly a practical guide, a well researched manual.</span><o:p></o:p></p> <p><o:p> </o:p></p> <p><strong><span style="font-family: 'courier new', courier; font-size: 12pt;">References:</span></strong><o:p></o:p></p> <p><span style="font-family: 'courier new', courier; font-size: 12pt;">Dreher, Rod. (2020). Live Not By Lies: A Manual For Christian Dissidents. Sentinel Books.</span><o:p></o:p></p> <p class="Default"><span style="font-family: 'courier new', courier; font-size: 12pt;">Strauss, William, &amp; Howe, Neil. (2009). The Fourth Turning: What the Cycles of History Tell Us About America's Next Rendezvous with Destiny. Broadway Books.</span><o:p></o:p></p> urn:store:1:blog:post:186 http://www.reagan.com/did-reaganomics-help-ronald-reagan-win-a-second-term Did Reaganomics Help Ronald Reagan Win a Second Term? <p><img src="https://images.clickfunnels.com/49/d84530d9bf11e68d32f1b740e55ab4/Reagan-Presidential-Portrait.png" alt="" width="284" height="321" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"></span></p> <p><span>When Ronald Reagan was elected to his first term, the country was in dire economic straits: The nation was deep in a recession, inflation was soaring, jobs were being cut and the middle class was struggling. That’s why the president issued </span><a href="https://www.reagan.com/reaganomics-how-it-worked-why-it-was-successful"><span>sweeping economic reform known today as Reaganomics</span></a><span>. The president’s policies and programs are credited with turning the nation’s financial picture around. Several years later, Reagan won reelection in a landslide. Would Reaganomics today have the same impact, both for the country and the 2020 presidential election?</span></p> <p><span>The economic conditions of 2020 are similarly as bleak as they were when Reagan took office. At the start of the year, the country was speeding forward, job creation was soaring and unemployment was at a record low. Once the COVID-19 pandemic hit, however, the country’s financial progress ground to a halt, with record job losses, businesses shuttered and the employment gains lost. Would Reaganomics be able to get the country back on track today?</span></p> <p><span>Reaganomics was based on supply-side economics, rooted in tax cuts to grow the tax base, promote hiring, and stimulate the economy. Reagan reduced government spending, deregulated businesses, expanded the money supply, and cut taxes—particularly for corporations to motivate job growth. Ultimately, the strategy paid off, with inflation lowered by more than 8 percentage points and the GDP on the upswing.</span></p> <p><span>That improvement doubtlessly had an impact on Reagan’s reelection. He geared his campaign toward the middle class, who benefitted directly from his economic policies. While Reaganomics today may look a bit different, President Trump’s tax cuts earlier in his administration were touted by some as following in the mold of Reagan’s plans. Likewise, the current administration has tailored much of its messaging and strategizing around economic plans for the middle class.</span></p> <p><span>While the success of that approach will be determined by the presidential election, the legacy of Reaganomics today shouldn’t be underestimated. With a nation divided and economic concerns looming large, the success of Reagan’s economic plans can demonstrate the value of bold, decisive financial strategies that take long-term aim at supporting the middle class. </span></p> urn:store:1:blog:post:184 http://www.reagan.com/how-to-protect-your-kids-online-during-virtual-learning How to Protect Your Kids Online During Virtual Learning <p><img src="https://images.clickfunnels.com/be/e3d7ea602d495dbb26e4ec3227c694/learn-977545_1920.jpg" alt="" width="448" height="239" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Just months ago, concerns about school safety involved active shooter drills, metal detectors, and visitor policies. Now, security looks quite different—but it’s just as important.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">As millions of American kids get used to the new normal of attending school online full-time or on a hybrid basis, virtual school safety is something that parents need to familiarize themselves with. In many cases, parents today are juggling childcare, homeschooling, work and more responsibilities, so thinking about their kids’ cybersecurity may have taken a backseat. However, Zoom bombing, widespread hacking, and other scams are exploding now that so many new, and inexperienced, internet users are online. This could put your family’s private information at risk, as well as even your personal safety.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Here are a few tips for keeping on top of virtual school safety: </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>#1. Monitor email</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Many schools have set up personal school email addresses for their students, but parents need to impress upon their kids to only use that address for school purposes. Gaming, socializing, and other online communication should be ideally done through a <a href="https://www.reagan.com/privateemailservice">private email account</a>. Ideally, their email address should be secured by two-factor authentication and encryption. Blending home and school online communication could put too much personal information at risk. Parents also should feel empowered to access their kids’ email accounts, especially younger students, to ensure all communication is appropriate. </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong> </strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>#2. Parental controls</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Kids are now spending much more time on their computers, so parents need to be vigilant about just what they’re looking at and sharing. Tighten all parental controls on your kids’ devices, including on such sites as YouTube and Google. If the device is school-issued and you run into problems changing controls, you can change settings on your home WiFi network to limit what your kids can access. </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong><br /> #3. Teach them the basics</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Parents have to be involved in virtual school safety, but they can’t be looking over their kids’ shoulders every minute of the day. Teach youngsters <a href="https://www.reagan.com/stay-safe-on-the-internet">basic cybersecurity techniques</a>, like using a password manager and the importance of anti-virus software.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong> </strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>#4. Manage school apps</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">One of the most challenging aspects of virtual school safety is that so much of online learning is now new to both kids and their parents. To complete their schooling, students are using a wide range of new apps, many of which come pre-loaded into school-issued laptops. Parents should research each of the applications and platforms their kids are using, including reading privacy notices and ensuring they aren’t automatically connected to their kids’ social media and other accounts.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">With extra vigilance and just a few steps, you can be sure that your family’s personal data stays safe while virtual learning continues. </span></p> urn:store:1:blog:post:182 http://www.reagan.com/celebrating-national-cybersecurity-awareness-month Celebrating National Cybersecurity Awareness Month <p><img src="https://images.clickfunnels.com/00/c12abcc8d1467c9e3aa0eecaf39973/iStock-648439466_super.jpg" alt="" width="519" height="239" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Cybersecurity has never been more vital. In the past few months, the pandemic has forced normal in-person routines to all go virtual. Americans have spent an unprecedented amount of time online—working from home, completing virtual schooling, shopping, socializing, and much more. This October, <a href="https://www.cisa.gov/national-cyber-security-awareness-month">National Cybersecurity Awareness Month</a> should be on every American’s radar.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">The annual event, now in its 17th year, is organized by the <a href="https://staysafeonline.org/">National Cybersecurity Alliance</a> and the <a href="https://www.cisa.gov/">Cybersecurity &amp; Infrastructure Security Agency</a> as a way to spread education about the basics of protecting yourself and your privacy online. This year, the theme is: “If you connect it, protect it,” which speaks to the increasingly universal nature of the digital world. Americans are constantly connected—smart TVs, mobile phones, laptops, tablets, and more—and should prioritize safety on each of those devices in order to ensure their private information stays private. Cybercriminals are becoming more sophisticated by the day and are seeking to take advantage of how connected Americans are, which is why National Cybersecurity Awareness Month is so needed.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">In addition to the primary theme, the organizing hosts will also focus on securing devices both at home and at work, something that is unique this year because of the widespread shift to remote work and school. They will also focus on the security of internet-connected devices in healthcare and the future of connectivity. Online users can follow the hashtag #BeCyberSmart on social media to learn about all of the resources available during National Cybersecurity Awareness Month.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Educating yourself is the first step, but awareness shouldn’t stop there. Spread the education to your family members, especially children, as personal networks can only be completely secure if everyone that uses them understands <a href="https://www.reagan.com/stay-safe-on-the-internet">cybersecurity basics</a>. If you have children, take the opportunity of National Cybersecurity Awareness Month to speak with school administrators about what they’re doing to protect their kids online. Similarly, this is a good time to raise the issue with employers, and encourage IT and business leaders to prioritize cybersecurity organization-wide.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">This October, make it your mission to learn about the rapidly changing cybersecurity world and keep the learning going throughout your community, and throughout the year!</span></p> urn:store:1:blog:post:181 http://www.reagan.com/how-to-protect-yourself-against-keyloggers How to Protect Yourself Against Keyloggers <p><img src="https://images.clickfunnels.com/f5/f4cc112b304d1dac7bc9a6f51f9520/iStock-502192161_super.jpg" alt="" width="632" height="322" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">As the world continues to spend more time than ever at home, we’ve all grown accustomed to doing most of our business—work, school, and leisure—on our mobile devices and computers from the safety and comfort of our own homes. However, just because we’re using personal devices, it’s important to stay vigilant about security. Cybercriminals are increasingly using scams like phishing or keyloggers to steal sensitive information. While <a href="https://www.reagan.com/phishing">phishing is a common email-based solicitation</a> for personal data, you may ask yourself, “What is a keylogger?” By becoming more familiar with this term and the threat it could pose, you’re one step closer to reclaiming your privacy and security.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>What is a keylogger?</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">A keylogger is a software or hardware tool that captures keystrokes. While there are many types of keyloggers that function without malicious intent, such as parental controls or employee tracking tools, cybercriminals increasingly rely on keyloggers as a direct entry point to users’ personal devices. With a keylogger, criminals can see every keystroke you make, including passwords and credit card information. They can use this data to commit fraud or steal a user’s entire identity, resulting in widespread financial loss, not to mention a severe cost to your privacy.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong> </strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>How can I protect myself?</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Now that you know what a keylogger is, it’s time to explore how to prioritize your security. Email security is a primary goal for those seeking to fend off a keylogger attack, as cybercriminals often rely on email to deliver the initial malware. With a <a href="https://www.reagan.com/bestprivateemailservice">private email account</a>, users can rely on security measures to ensure they’re only communicating with those whom they intend to. Also, make sure you are protected with other security measures like firewalls and a virus scanner, invest in a password manager to generate and store <a href="https://www.reagan.com/tips-for-secure-password">secure passwords</a>.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">While keyloggers often function through software, there are also hardware-based keyloggers. For instance, USBs that are plugged into keyboards or devices inserted into credit card readers can have the ability to capture keystrokes for malicious purposes. Considering that, it’s important to avoid public computers and other non-secure devices, as well as rely on cash or other payment methods when making a financial transaction.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Keyloggers are among the many cybercrime strategies that can be hard to detect; yet, if online users practice consistent vigilance and proactivity, they can take important steps to protect their privacy.</span></p> urn:store:1:blog:post:180 http://www.reagan.com/playing-the-long-game-year-1-4 Human Nature <p style="text-align: center;"><strong><span style="font-family: 'courier new', courier; font-size: 26pt;">Chapter 2.  </span></strong></p> <p style="text-align: center;"><img src="https://images.clickfunnels.com/c5/946ed6826746b689789ebc97beb8e3/hnature.jpg" alt="" width="300" height="198" /></p> <p style="text-align: center;"></p> <p class="Default"><span style="font-family: 'courier new', courier; font-size: 12pt;">No matter how far evolved modern society is, our being is driven by necessity. When we are hungry, we seek food and nourishment. When we are cold, we seek shelter and warmth. When we are threatened, we do whatever we can to ensure our survival. When our comforts exceed our need to scavenge, we become complacent and apathetic to newly forming threats. This concept applies to our current world as Western Societies are within the throes of a cycle transition.</span></p> <p class="Default"><span style="font-family: 'courier new', courier; font-size: 12pt;">We can see this complacency in a government’s cycle when elected and unelected officials offer their constituencies handouts, favors/influence, and other perks in exchange for votes towards the candidate. However well-intentioned these offerings may sound, we can see throughout history these are just meant to curry favor for special interests. The politicians drive attention away from their own selfish vices by feigning charity. We are seeing an inflection point in our current cycle that perfectly resembles this historical constant.</span></p> <p class="Default"><span style="font-family: 'courier new', courier; font-size: 12pt;">The other important cycle we are seeing rapidly develop is our human migration pattern. Humans have a tendency to urbanize/colonize when it benefits groups within society. When urbanization no longer offers mutual benefit between governance and the governed, the people decolonize. As we are seeing now, living in an urban city is becoming more and more dangerous and less and less fruitful for job opportunities. If we go back in time to The Roman Empire, we see that a similar kind of exodus took place after it topped out at approximately 1,000,000 inhabitants. In Rome, the military was promised payments and “retirement” benefits by politicians in order to secure their supremacy. Naturally, their leadership couldn’t pay for these promises and the citizens could not be further taxed. The military subsequently sacked their own people for remuneration, forcing the survivors to scatter.</span></p> <p class="Default"><span style="font-family: 'courier new', courier; font-size: 12pt;">Fast forward to the present and you’ll see that in Illinois, for example, a law was passed ensuring that pension payments be paid before all other expenditures. Imagine a state where there is no police or trash pickup, but under- or un-funded pensions receive precedence. Illinois is sacking their people and forcing them to scatter. Plug in any number of other nations, states, provinces, cities, municipalities, or school districts, (regardless of their “blue” or “red” leaning) and you’ll see that the situation is no different. In the end, Rome dwindled to about 30,000 people.</span></p> <p class="Default"><span style="font-size: 12pt;"><span style="font-family: 'courier new', courier;">Understanding how human nature interacts with societal machinations like commerce and politics provides us with two things: acceptance of our behaviors and the clarity to find a solution. We must endeavor to challenge media pundits and popular opinion in order to navigate Winter within the context of history. It’s worth remembering that after Winter comes Spring, but the change of season can only come as we further seek to understand what got us to where we are.</span> </span><o:p></o:p></p> urn:store:1:blog:post:179 http://www.reagan.com/playing-the-long-game-year-1-3 Are We Going to be Okay? <p class="Default"><strong><span style="font-family: 'courier new', courier;"><o:p> </o:p></span></strong></p> <p class="Default" align="center"><span style="font-family: 'courier new', courier;"><span style="font-size: 26pt;"><strong>Chapter 1. </strong></span></span></p> <p class="Default" align="center"><span style="font-family: 'courier new', courier;"><span style="font-size: 26pt;"><strong><img src="https://images.clickfunnels.com/fa/dc34f365a946aca42c4d46bbe33c07/people-2590616_1920.jpg" alt="" width="644" height="281" /></strong></span></span></p> <p class="Default"><span style="font-family: 'courier new', courier;"><b><o:p> </o:p></b></span></p> <p class="Default"><span style="font-family: 'courier new', courier; font-size: 12pt;">How many of us have asked that question within the last five months? Some of us have been asking this question since the world shut down; some of us for the last three and a half years since the last election; and for some, it is a decades-long source of inner turmoil that we are now seeing manifest. In a lot of ways the hurt we see globally is the kind of pain we have been trying to steel ourselves against. Yet, here we are and no amount of preparation could truly ready us for this hurt.</span></p> <p class="Default"><span style="font-family: 'courier new', courier; font-size: 12pt;">When we speak of “us” we speak of the individuals who routinely see past the current moment. We read subtext, not headlines; we seek deep truths rather than accept surface facts. We act out of deliberation rather than emotion. The trouble with us is that this kind of thinking is not inherently easy and “financial collapse” is never a fun topic of conversation. There is a reason that the current political climate does not deal in truth as their commodity. Truth does not bring the ratings, the site views, the funding, or the validation that they so desperately need.<o:p></o:p></span></p> <p class="Default"><span style="font-family: 'courier new', courier; font-size: 12pt;">We are watching devastating and sinister behaviors and attitudes unfold before our eyes. These developing trends are not new to the human condition; they have simply repackaged themselves under the veils of a (seemingly) evolved society. If some form of evil is allowed to manifest itself, it is only because those opposed to said evil (the aforementioned “us”) allowed it to grow. The good news is that since this has happened throughout history before us, then we already have the answers to combat this current evil. The difficulty is that we have to repackage the answers ourselves under our unique circumstances. Stated simply, history repeats itself but the Human Herd does not learn from history.</span></p> <p class="Default"><span style="font-family: 'courier new', courier; font-size: 12pt;">We believe the modern turmoil has been engineered by the roots deeply planted in the soil by those seen and unseen; by people and ideas of the past and present. The most sinister individuals who walk this Earth are playing for keeps. However, as the saying goes: “Two can play at that game.” Make no mistake, 2020 is merely the first move in what will be a long game. In this series, we will develop the thought process required that will help the virtuous of the world play to win and protect our livelihoods.</span><o:p></o:p></p> urn:store:1:blog:post:178 http://www.reagan.com/ronald-reagan-featured-in-that-hagen-girl Ronald Reagan featured in 'That Hagen Girl' <p><img src="https://images.clickfunnels.com/48/78e0f6a0994bf085a3412433e0a5e3/reel-250.jpg" alt="" width="249" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Ronald Reagan’s filmography is something that the current generation are more than likely aware of, but have never explored to great depth. His career as president of the nation is more familiar to us, but it is worth reminding ourselves that he was an actor, and president of the Screen Actors’ Guild, first.  Read more <a href="https://myreelvalues.com/that-hagen-girl/">here.</a></span></p> urn:store:1:blog:post:177 http://www.reagan.com/common-gift-card-email-fraud-techniques Common Gift Card Email Fraud Techniques <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><img src="https://images.clickfunnels.com/8e/2f60f3cbdc4f12a2fe2696ea4195c2/stop.png" width="192" height="225" style="display: block; margin-left: auto; margin-right: auto;" /><br /><br /></span></p> <p></p> <p></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Gift card email scams are among the latest trends in cybersecurity threats. Since many Americans avoid using cash, especially nowadays with the threat of COVID-19, more are turning to gift cards as currency - they’re easy to use, work both online and in person, and are often reloadable. Our growing comfort with using gift cards has made them a target for thieves, many of whom exploit that comfort level for their own gain.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Gift card email scams are on the rise, particularly in business settings. Since many people are working from home, businesses may turn to this method as a convenient and quick way to collect funds remotely - to celebrate a colleague’s anniversary, as a gift for a supervisor, or towards a company lunch or event. That’s one reason why many workers may not think twice about the authenticity of an email from a manager, business leader or executive asking employees or co-workers to buy gift cards and send along the serial numbers and other sensitive information. However, in some cases, that email is coming from a cybercriminal who may use real logos, names, and company language to make the email request even more enticing.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">There are a few ways you can protect yourself from these gift card email scams:</span></p> <p></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>Keep Vigilant</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Like the old saying goes, if it sounds too good to be true, it probably is. Keep an eye out for misspellings and unusual language in the email. Verify any requests for gift cards in person or on the phone. And, just like with all proper digital practices, ensure that any links in the email actually direct to the correct location before clicking them.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>Reduce risks</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Employers can alleviate the threat of gift card email scams through cybersecurity training for all employees, as well as written protocol surrounding gift card requests. Such policies should limit who can initiate such requests and educate employees on how to spot fakes and report potential scams.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>Rely on Tech</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><a href="https://www.reagan.com/bestprivateemailservice">Private email services</a> are the best way to ensure intruders can’t access your system and send out phishing emails. Other tech strategies include instituting filters and blocks on suspicious emails. If you're looking to tighten up your email presence, the private email service offered by Reagan.com includes several safeguards that will personal data out of the hands of both big corporations and potential thieves.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> urn:store:1:blog:post:176 http://www.reagan.com/how-to-avoid-email-phishing-scams-and-credential-theft How to Avoid Email Phishing Scams and Credential Theft <p><span style="font-size: 12pt; font-family: 'times new roman', times;"><img src="https://images.clickfunnels.com/97/dec4235b4d4328920bad6c81f248e8/iStock-875618304_super.jpg" alt="" width="541" height="211" style="display: block; margin-left: auto; margin-right: auto;" /></span></p> <p></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Email phishing scams have been on the rise for years—and, in recent months have exploded as cybercriminals try to exploit the widespread fear and anxiety related to the COVID-19 pandemic. Anyone can fall prey to phishing, especially now as so many are hungry for information and assurance and are willing to let their guard down when it comes to cybersecurity in order to attain it. However, email phishing scams can create significant security breaches, leading to financial losses and large-scale logistical challenges as email users struggle to recover their digital privacy—which is why it’s important to remain informed about the latest trends in email phishing scams and the best ways to protect yourself and your data.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>What is Phishing?</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">First, it’s important to <a href="https://www.reagan.com/phishing">understand what phishing is</a>: an attempt by a cybercriminal to mask a malicious email as coming from a trusted, reputable source in order to solicit personal information from the recipient. The message may appear as though it is coming from a bank, employer, or other known entity, which is why so many people become victims of such scams. The sender may ask the recipient to input personal data like credit card information, or another common scheme is requesting login credentials. For instance, a criminal may disguise an email as coming from a financial institution and then prompt the recipient to enter his or her usual online login—which then hands over that credential to the sender, which could lead to financial ruin.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><strong>Don’t Click on Random Links or Attachments</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">To protect against such fallout, keep an eye out for red flags like links and attachments, which could be tricks to redirect email recipients to cloned websites. Hover over any links to ensure they actually are connected to the site they’re purporting to link to.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <p><span style="font-size: 12pt; font-family: 'times new roman', times;"><strong>Don’t Use the Same Passwords</strong></span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"><a href="https://www.reagan.com/tips-for-secure-password">Safe password use</a> can also reduce the risk of being a victim of email phishing scams. Don’t use the same password across multiple sites; if hackers are successful in stealing credentials for one of your logins, they’ll likely try them for many different sites. Additionally, multifactor authentication like that offered by Reagan.com helps to <a href="https://www.reagan.com/bestprivateemailservice">enhance private email</a>, as it requires several levels of credentialing that can deter cybercriminals. Biometric logins, such as facial or fingerprint recognition, also heighten the level of protection.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">Despite the challenges so many Americans are facing today, digital privacy needs to remain a priority, as email phishing scams and other cyber schemes are becoming more sophisticated and pervasive. Use these tips and practice safe online and email habits to keep your security and safety at the forefront.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> urn:store:1:blog:post:173 http://www.reagan.com/4-effective-tips-to-avoid-a-data-breach 4 Effective Tips to Avoid a Data Breach <p><img src="https://images.clickfunnels.com/51/ee09d1fd6c11e8bf5a8bc63e985eba/iStock-479801118_super.jpg" alt="" width="377" height="210" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p></p> <p>We’ve all seen the headlines the last few years about the dreaded data breaches: From financial institutions that have been hacked, exposing millions of clients’ sensitive information, to <a href="https://www.reagan.com/cyber-security-of-the-2020-presidential-election">cyber election interference</a> that has plagued both sides of the political aisle, cybercriminals are getting increasingly sophisticated at targeting large-scale sources of information. However, they’re not only going after corporations and organizations; it’s just as important for everyday internet users to know how to avoid data breaches. Individual, personal data can be just as valuable to criminals as organizational information—and the loss of the privacy of that data can be a nightmare for victims.</p> <p>If you’re looking to understand how to avoid a data breach, here are four simple, but effective, tips:</p> <p><strong>1. Always Use a Search Browser</strong></p> <p>A browser that is not secured can easily be accessed by cybercriminals, who may be able to find your IP number, browsing history and other personal information. A secure browser, however, adds another layer of defense. Make sure to research the security protocols of your selected browser before logging on so that you can keep your privacy as a top priority.</p> <p> </p> <p><strong>2. Use Private Email</strong></p> <p>Free, public email like Gmail or Yahoo! may entice users with its free, easy to set up accounts, but that convenience may come at the price of your privacy, as such sites have been known to use lax security measures and even sell your information to third parties. Instead, <a href="https://www.reagan.com/privateemailservice">private email services like those offered by Reagan.com</a> use end-to-end encryption and other leading-edge security measures to ensure only the sender and receiver can access the message. As email is often an entry point for cybercriminals, this is one of the most basic yet valuable strategies for how to avoid data breaches.</p> <p> </p> <p><strong>3. Be Smart with Your Passwords</strong></p> <p>We’ve all heard it’s important to not use basic, identifying information in your passwords, but there are many other things you should also be considering when <a href="https://www.reagan.com/tips-for-secure-password">setting your login credentials</a>. The more complex, the better—so use a combination of upper- and lower-case letters, numbers, and special characters, none of which should be related to any people, places, or events in your life that could be figured out. Also, don’t use the same passwords for your accounts and make sure to change them often.</p> <p> </p> <p><strong>4. Control Your Linked Accounts:</strong></p> <p>Linking your accounts—and your devices—can make logging in and using email or social media a bit easier, but it poses a major threat to your cybersecurity. For instance, a recent data breach at Facebook exposed millions of users’ personal information—and those that had their accounts linked to other social media or email sites may have given hackers much easier access into those data sources.</p> urn:store:1:blog:post:172 http://www.reagan.com/hypocrisy-exists-within-your-minority-report Hypocrisy Exists Within Your Minority Report <p><img src="https://images.clickfunnels.com/48/78e0f6a0994bf085a3412433e0a5e3/reel-250.jpg" alt="" width="249" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p></p> <p style="text-align: center;"><span style="font-family: 'times new roman', times; font-size: 12pt;"><a href="https://myreelvalues.com/minority-report/">MyReelValues</a> identifies the moralism behind the social evolution of mankind through film. Click <a href="https://myreelvalues.com/minority-report/">here</a> to read more.</span></p> urn:store:1:blog:post:171 http://www.reagan.com/password-security-tips-during-covid-19 Password Security Tips During COVID-19 <p><img src="https://images.clickfunnels.com/6d/26dca0ca4f11e7a6988dd54074b66b/Cyber-Security.jpg" alt="" width="504" height="340" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p></p> <p>Among the many changes ushered in by the coronavirus pandemic is the shift to remote work, which has brought unprecedented <a href="https://www.reagan.com/what-is-cybersecurity"><span>cybersecurity challenges</span></a> for organizations around the world. Working from home has meant employees need to rethink their work/life balance, while IT professionals have to reconsider how they educate their workers on internet security, <a href="https://www.reagan.com/"><span>secure emails</span></a>, and more digital privacy factors.</p> <p>While workplaces generally have regulations in place to keep their employees’ email accounts safe, now that those employees are at home, the same security protocols likely haven’t been upheld, so COVID-19 email security tips can help to fend off any unwanted email intrusions. And when it comes to email security, the <a href="https://www.reagan.com/tips-for-secure-password"><span>password</span></a> is the first and most important line of defense against cybercriminals.</p> <p> </p> <p><strong>Choosing a Password</strong></p> <p>Everyone knows it’s important to select a password that isn’t easy to guess; however, making the password complex involves more than picking a hard-to-guess word. While that may stop amateur cybercriminals from accessing your account, more advanced thieves could use automated tools that are able to easily crack the code. One of the primary COVID-19 email security tips is to create a password that involves no identifying information and a full mix of upper- and lower-case letters, numbers, and special characters all in an unpredictable pattern. Read more about <a href="https://www.reagan.com/tips-for-secure-password"><span>how to make a secure password</span></a></p> <p> </p> <p><strong>How to Store Password </strong></p> <p>How that password is stored is another key consideration. While organizations may have some security protocols in place for the office, remote workers may be challenged to remember all of their passwords and could be jotting them down in Word documents or other workforce-management tools, which can create a serious security risk. Instead, a password manager allows for secure password storage that can help keep accounts secure and information protected.</p> <p> </p> <p><strong>Multi-Factor Authentication </strong></p> <p>Another of the COVID-19 email security tips is to use multi-factor authentication. This provides another layer of protection in addition to the initial password, requiring the user to verify their identity at least twice. While some may see this method as overreaching, it is a significant deterrent for cybercriminals.</p> <p> </p> <p><strong>Monitor Access Levels </strong></p> <p><span>Finally, organizations should be intentional about the levels of access employees have. The more people who have access to certain accounts, for instance, the greater the likelihood that those accounts could be compromised. By controlling access and limiting the number of people who are able to login to a certain platform, employers can protect their people and their data</span></p> urn:store:1:blog:post:170 http://www.reagan.com/the-masterful-portrayal-of-agent-007 The masterful portrayal of Agent 007 <p><img src="https://images.clickfunnels.com/48/78e0f6a0994bf085a3412433e0a5e3/reel-250.jpg" alt="" width="249" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p style="text-align: center;"><span style="font-family: 'times new roman', times; font-size: 12pt;"><a href="https://myreelvalues.com/skyfall/">My Reel Values</a> looks at James Bond as a symbol of patriotism and national pride. Read more <a href="https://myreelvalues.com/skyfall/">here.</a></span></p> urn:store:1:blog:post:169 http://www.reagan.com/expectation-forgiveness-and-rebirth-in-born-on-the-fourth-of-july Expectation, Forgiveness, and Rebirth in Born on the Fourth of July <p><img src="https://images.clickfunnels.com/48/78e0f6a0994bf085a3412433e0a5e3/reel-250.jpg" alt="" width="249" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p style="text-align: center;"><span style="font-family: 'times new roman', times; font-size: 12pt;">The Academy Award winning film by Oliver Stone that shows parallels with the current climate in America and perseverance of an American soldier during the Vietnam War as portrayed by Tom Cruise. </span></p> <p style="text-align: center;"><span style="font-family: 'times new roman', times; font-size: 12pt;">Click here to read more:  <a href="https://myreelvalues.com/born-on-the-fourth-of-july/">https://myreelvalues.com/born-on-the-fourth-of-july/</a></span></p> urn:store:1:blog:post:167 http://www.reagan.com/avoid-work-from-home-email-phishing-scams Avoid Work from Home Email Phishing Scams <p>The coronavirus pandemic has brought with it threats to our physical, mental, and financial health—and now, it’s risking our digital health. The rise of COVID-19 email scams is another unfortunate side effect of the global health crisis.</p> <p>Cybercriminals have turned their attention to the pandemic to try to take advantage of the moment, using <a href="https://www.reagan.com/phishing">phishing techniques</a> that are made all the more convincing by our current state of affairs. We’re all hungry for information and answers about the pandemic, and online thieves are exploiting that reality for their own personal gain. However, just as we have all become more educated about hand-washing and social distancing, by understanding the red flags of COVID-19 email scams, you can also help protect your online footprint.</p> <h2>Subject lines</h2> <p>Criminals are trying to entice email users to click on their message by using the pandemic in the subject line. An email that references COVID-19 or coronavirus in the subject line—even if it appears to come from a reputable source—may instead be a phishing email. While attention-grabbing, the subject line could simply be an attempt to get the user to follow prompts in the message that request personal and sensitive information, or may infect the individual’s device with malware that tracks his or her online activity.</p> <h2>Impersonal Emails</h2> <p>Like other <a href="https://www.reagan.com/how-to-spot-signs-of-a-phishing-email">phishing messages</a>, many COVID-19 email scams are automated and sent en masse, so they lack personal greetings. Be extra cautious of any email that doesn’t include your name. Even for those that do address you by name, it’s still smart to exercise caution and closely investigate the message.</p> <h2>Password Reset Requests</h2> <p>We’ve all forgotten passwords from time to time and had to use the reset function on different sites but be wary of any unsolicited message about resetting a password. Some new COVID-19 email scams suggest a password reset is needed because of pandemic-related security changes, so if you receive such a message follow up outside of email with the requesting institution before taking any action.</p> <h2>Linked Accounts</h2> <p>With so many people working from home, social media has become an even bigger part of day-to-day life. However, it brings its own security issues; for instance, a data leak at Facebook involved an untold number of users’ private information being shared with third parties to influence people—and the users weren’t even informed. That risk is heightened exponentially if you have many of your online and social media accounts linked together increasing the chances that your private data will be shared and, ultimately, could fall into the wrong hands.</p> <p>To further help you with email security, use our <a href="https://www.reagan.com/">secure email services</a> and stay informed and educated with more from our <a href="https://www.reagan.com/blog">blog</a></p> urn:store:1:blog:post:166 http://www.reagan.com/the-media-hides-the-facts-once-again The Media Hides the Facts Once Again <p><span style="font-size: 12pt; font-family: 'times new roman', times;">Below is a video taken a little over a week ago. Once again, for all the “happy talk” of re-openings, we need to think through the media’s continual lies.</span></p> <p style="text-align: center;"><span style="font-size: 12pt; font-family: 'times new roman', times;">The following <a href="https://www.youtube.com/embed/mb5dkuINS1c">video</a> shows Chicago, NYC, and Minneapolis after the rioting. Click <a href="https://www.youtube.com/embed/mb5dkuINS1c">here</a></span></p> <p style="text-align: center;"><img src="https://images.clickfunnels.com/e1/e8b60674564579a00786230837942e/blogboardup.png" alt="" width="686" height="265" /></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">This <a href="https://www.youtube.com/embed/mb5dkuINS1c">video</a> is demoralizing to every American. What was once a grand shopping experience is now a picture of a society in decline. Once again, this <a href="https://www.youtube.com/embed/mb5dkuINS1c">video</a> story illustrates that the media’s agenda is not aligned with that of the vast majority of Americans.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;">This deception will backfire on the media. History shows that the media will enter their own perilous times. The people’s trust in all media forms is quickly approaching zero and, in future postings, we will provide historical precedent for the media’s future collapse.</span></p> <p><span style="font-family: 'times new roman', times; font-size: 12pt;"> </span></p> <ul> <li><span style="font-family: 'times new roman', times; font-size: 12pt;">The Reagan Team</span></li> </ul> urn:store:1:blog:post:165 http://www.reagan.com/myreelvaluescom-discusses-who-is-responsible-for-the-joker MyReelValues.com discusses Who is Responsible for The Joker? <p><br /><img src="https://images.clickfunnels.com/48/78e0f6a0994bf085a3412433e0a5e3/reel-250.jpg" alt="" width="249" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p style="text-align: center;"><span style="font-family: 'times new roman', times; font-size: 12pt;"><a href="https://myreelvalues.com/joker/">The Joker</a> gives us an opportunity to take an introspective look at who ultimately is responsible when society fails an individual. <a href="https://myreelvalues.com/joker/">Read more</a>...</span></p> urn:store:1:blog:post:164 http://www.reagan.com/introducing-reel-values-a-fresh-look-at-film-television-and-emerging-platforms Introducing REEL VALUES, A Fresh Look at Film, Television and Emerging Platforms <p><br /><img src="https://images.clickfunnels.com/48/78e0f6a0994bf085a3412433e0a5e3/reel-250.jpg" alt="" width="249" height="169" style="display: block; margin-left: auto; margin-right: auto;" /></p> <p> </p> <p>Black Ops and Espionage, <a href="https://myreelvalues.com/enemy-of-the-state/">MyReelValues.com</a> takes an in depth account of the cinema blockbuster, Enemy of the State with Will Smith and Gene Hackman. <a href="https://www.reagan.com/introducing-reel-values-a-fresh-look-at-film-television-and-emerging-platforms">Learn More.</a></p> urn:store:1:blog:post:162 http://www.reagan.com/national-space-day-reagans-commitment-to-space-exploration National Space Day & Reagan’s Commitment to Space Exploration <p>While the recent announcement of the Space Force has reignited passion for space voyaging and protection, it’s a topic that has been at the heart of the American consciousness for decades—and one that was particularly championed by President Ronald Reagan. The many space achievements Reagan ushered in are among the innovations celebrated on National Space Day. Recognized the first Friday of May, National Space Day is an opportunity to look back on the breakthroughs, the challenges and the people who have made the United States the world’s leader in space exploration. Among those people is President Ronald Reagan. From the time he took office in 1981, he started following through on his campaign pledge to reenergize the national commitment to space. That year, the nation saw the Space Shuttle Columbia launch back into space, after six years of delays and challenges, showing Americans the path forward. When the crew returned, Reagan personally celebrated with them, holding a Fourth of July event in their honor in which he modeled for Americans the honor and respect their sacrifices deserved—laying the groundwork for National Space Day. He also held a public event to celebrate the launch of the Shuttle Orbiter Challenger, another high point early in his administration. Check out <a href="/blog/category/1">additional achievements of Reagan’s presidency</a>.</p> <p>While the United States was and still is a global leader when it comes to studying and exploring space, Reagan had the forethought to know we needed to work with our international partners. To that end, he authorized the creation of a permanent space station, with an intentional focus on the cooperation of space experts from around the globe. Today, the International Space Station stands in tribute to his innovative leadership and is a major focus of National Space Day.</p> <p>While <a href="/major-accomplishments-of-ronald-reagan">Reagan’s tenure was filled with achievements</a>, there were also challenges. One of the nation’s most tragic accidents occurred in the pursuit of space exploration: the explosion of the Space Shuttle Challenger in 1986, in which seven crew members were killed. While the nation mourned, President Reagan offered words of support and solace, all while keeping their hopes for the United States’ leadership in space alive. “The future doesn’t belong to the fainthearted; it belongs to the brave,” said.</p> <p>On this National Space Day, let’s honor the brave men and women who have paved the way for American innovation—and recommit to President Ronald Reagan’s bright and visionary leadership.</p> urn:store:1:blog:post:161 http://www.reagan.com/online-security-basics-that-shouldnt-be-ignored Online Security Basics Everyone Should Implement <p><img src="https://images.clickfunnels.com/28/99516ad6ad45cf89bf7b41a9c8f4e3/iStock-519735146_high.jpg" alt="" style="display: block; margin-left: auto; margin-right: auto;" width="529" height="304" /></p> <p></p> <p>Some online security basics may seem like no-brainers: not leaving a list of passwords lying around, avoiding clicking on pop-up ads, not sharing credit card through non-secure sites. But we’re all using the internet for so much these days, some of these commonplace items may start to fall off our radar. We need to be paying constant attention to even the smallest details of online security, on top of making smart choices like opting for a private <a href="/paid_email_service">paid email provider</a> or an <a href="https://www.reagan.com">secure email services</a> with the toughest possible protections, in order to stay ahead of cybercriminals, data breaches, and more.</p> <p>Here are a few online security basics to keep in mind to help you <a href="/stay-safe-on-the-internet">stay safe on the internet</a> while safeguarding your digital activity and profile personal:</p> <p><strong>Do the updates: </strong>Many of us ignore the alerts on our computers or mobile devices to update our software, not wanting to disrupt what we’re doing or learn new features for our apps. That’s a mistake, as updating operating systems for our internet-connected phones, for instance, allows us to have the most up-to-date security features. So, when the update alerts start cropping up, pay attention immediately.</p> <p><strong>Don’t “allow access”: </strong>When playing a game or reading an article online, you may have encountered pop-up boxes asking if you want to “allow access,” and many of us, who are used to immediate gratification, immediately click through in order to get back to what we’re doing. That can be a costly decision, however, as even on popular sites like Facebook, you don’t really know who you’re giving access to, what information they can see and how they’re going to use it. Carefully read any fine print before clicking “yes.”</p> <p><strong>Do vary your password: </strong>This is one of the most well-known online security basics, but also one of the most commonly ignored – <a href="/tips-for-secure-password">make a secure password</a>. Using a birthday, child’s name or other information that’s easy to remember can help you not get locked out of your accounts—but it can also give criminals easy access to those same accounts. If one site has a breach and your data is stolen, those cyber thieves can easily try this password and guessable variations of it on other sites—and if you don’t use different passwords, they just might be successful.</p> <p><strong>Don’t overshare: </strong>In these days of social media, oversharing is common, but it can also be dangerous. Especially if you’re using non-secure WiFi—which you shouldn’t do in the first place—posting personal pictures on social media, checking in to different locations and more can all help those with malicious intentions to build a profile of you that can be used to hack your accounts and steal sensitive information.  </p> <p><strong>Do back up your data: </strong>It’s an unfortunate reality that you can never be sure if and when your data may be lost or stolen, so it’s always a good idea to ensure you have control over a separate backup location. If your information is compromised, you want to know at least you have secure files elsewhere in order to minimize the harm</p> urn:store:1:blog:post:159 http://www.reagan.com/how-to-recognize-a-phishing-email How to Recognize a Phishing Email <p></p> <p style="text-align: center;"><img src="https://images.clickfunnels.com/ca/f648d3fa384c34bd1f025825abd029/shutterstock_462670036.jpg" alt="" width="536" height="172" /></p> <p style="text-align: center;"></p> <p></p> <p>Email powers a significant amount of our communication—so it’s become a main target of scammers. One of the most common techniques used by online thieves is <a href="/phishing">phishing</a>, in which they send an email that looks identical to one that might be sent from a trusted source—and use that trust the user automatically has to solicit personal information, including passwords, phone numbers, account data and more. That information can then be used to directly hack into accounts—largely for financial gain—or to use one’s identity for a larger scheme.</p> <p>Email phishing examples have many elements in common, and it’s important to recognize all of them in order to protect your digital privacy. Phishing emails are getting increasingly sophisticated so familiarizing yourself with common techniques is just the first step; staying vigilant and always looking for innovative ways to safeguard your online activity, such as through <a href="/bestprivateemailservice">private email services</a> like Reagan.com, is necessary to keep your security at the forefront.</p> <p>Here are a few email phishing examples:</p> <p><strong>Sensitive information: </strong>An email that asks for credit card numbers, tax records or other sensitive information would not come from a valid source. While real organizations like banks or workplaces may request such information, they would never do it via email, which is a major red flag.</p> <p><strong>Spelling errors: </strong>Real emails from trusted companies go through a series of editing steps before being deployed, with marketing, legal and other experts chiming in and looking for any possible errors. So, if a message contains spelling or other glaring errors, there’s a chance it’s phishing.</p> <p><strong>Attachments: </strong>Email phishing examples often include attachments, which credible organizations wouldn’t send unsolicited. Phishing scam artists may use .exe or .zip files to embed malware in a user’s email.</p> <p><strong>Incompatible URLs: </strong>If an email redirects a user to a website, the URL should match what the message says it is. To check, hover the mouse over the link and ensure that the preview text that pops up matches the real organization’s site.</p> <p><strong>Domain emails: </strong>Credible organizations typically have the company name in all associated email addresses. If an email arrives purportedly from a bank, for instance, and has additional numbers or characters after the bank name in the sender email address, it’s likely a scam.</p> urn:store:1:blog:post:158 http://www.reagan.com/why-you-shouldnt-trust-free-vpns Why You Shouldn’t Trust Free VPNs <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/28/99516ad6ad45cf89bf7b41a9c8f4e3/iStock-519735146_high.jpg" width="357" height="238" /><img /></p> <p>Online security and using an <a href="https://www.reagan.com">secure email service</a> should be a priority for all Americans, as our entire lives are largely powered by the internet—meaning that any intrusion to our online privacy can be a major disruption. We should all learn <a href="https://www.reagan.com/stay-safe-on-the-internet">how to stay safe on the internet</a> and take the right precautions. Some have opted for tools that they think will keep their information secure, but the frightening reality is that many of these products actually exploit and expose users, offering anything but online security.</p> <p>A virtual private network (VPN) is one resource that some believe can make their online surfing safer. A VPN is designed to hide the user’s ID address and location; it’s a good idea, in theory, but the way many are accessing these VPNs is actually making their online security more vulnerable. A number of free VPNs have popped up, offering to cloak users’ information without any catches; however, we all know that nothing is entirely free and the tradeoff for these companies is that they get access to all of the users’ private data. They can see where they’re going online, what they’re doing, what their interests are and other private information—which they then later use for targeted advertising and other purposes. Other free VPNs have actually been linked to cybercriminals, who’ve used them to disguise malware, while others have been shown to be susceptible to hacking—which can put users’ entire digital profile at risk.</p> <p>On the other hand, paying for a VPN is a smart idea: In that case, users can rest assured that they’re making a smart investment, and not being scammed by the attractive pull of a freebie. Similarly, free email services are notorious for putting email users’ data privacy in jeopardy, as those providers also entice users with the promise of a free service—but in the process, the company is gaining access to all of their private information. </p> <p>For true online security, a <a href="https://www.reagan.com/paid_email_service">secure paid email account</a> like those offered through Reagan.com ensure private information remains private. Though it comes with a small fee, that investment is a small price to pay for having your data actually protected.</p> <p>Unfortunately, few things in life are actually free. And when they are, there’s often a hidden motive, like with free VPNs and email services. By opting instead for paid services, users can trust that their online security is a priority both for them and their providers.</p> <p> </p> urn:store:1:blog:post:157 http://www.reagan.com/mailbox-update Mailbox Update <p><span>We at Reagan.com would like to introduce our new banner feature which will appear highlighted along the top of your mailbox. This banner will only appear and be utilized when we have critical information to communicate to our clients. When logged into the mailbox you may review the banner and access another separate page which will contain further details on the information provided in the banner, when necessary. This page will also serve as record of previous entries.</span></p> <p><span>See the example of how the banner will appear within your mailbox:</span></p> <p><img src="https://images.clickfunnels.com/40/ceed63c3c143c7ac8f6dbd1398039d/banner-image-for-blog-jpeg.jpg" alt="" width="746" height="69" /></p> <p></p> <p></p> urn:store:1:blog:post:155 http://www.reagan.com/how-to-avoid-coronavirus-scams How to Avoid Coronavirus Scams <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/d2/fb683aee424538b487fe7afef94377/COVID.png" width="357" height="238" /><img /></p> <p>The current global pandemic is inducing anxiety and panic around the world, as citizens everywhere struggle through these unchartered territories. Travel restrictions, school closures, and lockdowns have nearly everyone on edge—but that doesn’t mean you should drop your guard when it comes to your digital privacy, which is at an even higher risk right now.</p> <p>As is the case with any major world event, the scammers are coming out of the woodwork, preying on the fears so many understandably are experiencing. And they’re targeting people where they are: stuck at home, on their mobile devices and computers. While the internet has been used for tremendous good during this time—we’ve all seen the viral videos of citizens on lockdown joining together in song, or the many online campaigns to rally funds and support for those who’ve lost their jobs in this crisis—it’s also become a magnet for coronavirus scams.</p> <p>Here are a few reminders to keep yourself safe and secure during this uncertain time:</p> <p><strong> </strong></p> <p><strong>Be Cautious When Purchasing</strong></p> <p>Lines in grocery stores are long and many people don’t want to leave their houses, prompting them to turn to the internet for purchases. However, price gouging has become a real issue, so consider comparing prices and avoid the urge to panic buy. Similarly, several items, such as masks and hand sanitizer, are in such popular demand that scammers are selling counterfeit items online – if it sounds too good to be true, and is at a price that also seems too convenient, then it likely is.</p> <p><strong> </strong></p> <p><strong>Make Smart Social Media Decisions</strong></p> <p>Many of us are getting our news and staying connected through social media. Make sure to thoroughly vet any news items you share through multiple sources; that’s a smart strategy to employ any time of the year but especially now as rumors can further inflame already tense situations. The situation is changing rapidly, so be wary of jumping on the bandwagon and reacting to stories before you vet them.</p> <p>Additionally, in your social media feed you may see requests to fill out a survey or take a poll, but you have to sign up with your email address in order to see the results. Often scammers will use this technique to get you to give them your email address while they also capture information about you through platforms like Facebook. Before you dive in, ask yourself about the account that is requesting your information. Is it associated with a reputable company, website, or news organization? Would you be comfortable getting emails from this organization, or does it seem like they might send spam? Now, more than ever, is the time to <a href="https://www.reagan.com/keep-big-business-from-snooping">protect your email account</a> from spammers and spies.</p> <p><strong> </strong></p> <p><strong>Read the Fine Print</strong></p> <p>Many companies are trying to capitalize on the captive audiences they have by offering free services, but some coronavirus scammers have gotten onboard and are burying troublesome language in the fine print. Make sure to read all disclaimers before signing up for any service. Once the world starts to get back to a new normal, you don’t want to find yourself trapped into a costly subscription that you didn’t realize you were signing up for.</p> urn:store:1:blog:post:153 http://www.reagan.com/part-one-what-google-knows-about-you What Your Search Engine Knows About You <p><img src="https://images.clickfunnels.com/62/aa27e3975549259ac06c673465dea8/search-ingine.jpg" alt="" width="275" height="150" style="display: block; margin-left: auto; margin-right: auto;" /><br /><img /></p> <p>If you’re concerned about digital privacy, you’ve likely heard that search engines are one of the biggest offenders when it comes to collecting data about users—but the extent of what a search engine knows about you may be even more alarming than you realized. These companies have acknowledged that it has read the email messages of users—which highlights the value of a private email address to ensure optimum safety and security—but it also gathers information across many similar platforms.</p> <p>Here are just a few of the examples of what they knoq about you, which you can see for yourself to grasp the full impact:</p> <p><strong>Location:</strong> <a href="https://maps.google.com/locationhistory">This page shows Android users where they’ve been</a>, using data from the maps application. It can offer extremely precise information, including home addresses and more. Apart from the likely unwanted tracking, this service can also be a significant threat to security if the information falls into the wrong hands.</p> <p><strong>Searches:</strong> The store app will include <a href="https://www.google.com/history/">all of the items you have ever searched</a>. In the History tab, you can see a list of everything that’s ever been searched for on your computer or device, and even clearing the history won’t permanently erase that record.</p> <p><strong>Ads:</strong> The company creates a unique user profile based on your online activity, which informs the tailored advertising that you see. You can review the data amassed to gain insight into the motivation behind the ads you see—which sheds light on what a search engine knows about you and your online habits, and how it uses that information.</p> <p><strong>Analytics:</strong> Analytics is a service that many businesses use to track traffic that’s coming to its website; however, that information provides them a close look into your private data, including geographic location and more. You can however <a href="http://tools.google.com/dlpage/gaoptout">opt out of this tracking</a>. The extent of what a search engine knows about you is already vast, and using free email services make that data pool even broader. Private email such as Reagan.com is the best way to protect yourself against unwanted digital intrusions and make your online activity private—as it should be.</p> <p></p> <p> </p> <p> </p> <p> </p> urn:store:1:blog:post:152 http://www.reagan.com/national-safer-internet-day National Safer Internet Day | How to Stay Safe on The Internet <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/22/6128dd912940bfa761bbe672813bb7/safer.png" width="357" height="238" /><img /></p> <p>February is known as the month in which we remember icons like President Ronald Reagan on President’s Day. But in recent years, that holiday has been joined by another that pays tribute to the ideals Reagan championed, such as freedom and privacy. National Safer Internet Day is marked the first Tuesday of February in an effort to raise awareness about cybersecurity threats—and educate the public about the myriad steps they can take to protect themselves on the web. </p> <p>National Safer Internet Day was founded in 2013 and is now observed in more than 100 countries, with significant leadership from the U.S. Department of Homeland Security and the European Commission. The U.S. effort includes a website that offers information about cybersecurity year-round as well as a live streaming event on Feb. 11 from California’s Computer History Museum, to give internet users the latest tips and trends on internet security.</p> <p>A major aim of the National Safer Internet Day is to arm everyday web and email users with the information they need to fend off threats like identity fraud, theft, cyberbullying and human trafficking. Though each of those challenges, and the many other threats that exist in online spaces, are complex, international struggles, there are many things individual users can do to contribute to the internet being a safer place for everyone to communicate, work, play and learn.</p> <p>Here are a few topics of discussion that will be sure to be addressed on National Safer Internet Day — and which should be on every internet user’s mind year-round:</p> <p> </p> <ol> <li><strong> Password security:</strong> While it may seem simple, many internet and email users aren’t proactive enough about <a href="https://www.reagan.com/tips-for-secure-password">selecting strong passwords</a> and changing them frequently. A weak password can be an easy entry point a hacker needs.</li> </ol> <p> </p> <ol start="2"> <li><strong> Private email:</strong> A <a href="https://www.reagan.com/privateemail">private email service like Reagan.com</a> provides the vital security email users need. With end-to-end encryption and other safety features, private email is the best way to know that your messages are being sent and stored securely—and that you won’t fall victim to the growing trends of email-based scams.</li> </ol> <p> </p> <ol start="3"> <li><strong> Social media:</strong> National Safer Internet Day has a strong focus on educating young people, the majority of whom are communicating frequently on social media. Such sites can be treasure-troves for hackers, who can easily access personal information that can be used for a range of schemes, as well as cyberbullies. It’s imperative that young folks know how to identify red flags and report any instances of harassment on social media so that they can fully reap the benefits of these sites without worrying about the threats that also exist there.</li> </ol> urn:store:1:blog:post:151 http://www.reagan.com/4-common-phishing-attacks-you-need-to-be-ready-for 4 Common Phishing Attacks You Need to be Ready For <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/d6/72dc6b566048a498efab2bc45f91af/iStock-465528487_super.jpg" width="357" height="238" /><img /></p> <p>You’ve likely heard the term “<a href="https://www.reagan.com/phishing">phishing</a>” before, but just being aware of this trend is only the first step to protecting yourself from cyber threats. Learning about the most common phishing attacks, and how each is carried out, is the next thing you need to do to ensure you know how to spot a fake email or other digital communication—and avoid the serious implications of falling prey to one of these schemes.</p> <p><strong>Deceptive Phishing</strong></p> <p>This is one of the most common <a href="https://www.reagan.com/how-to-spot-signs-of-a-phishing-email">phishing attacks that targets email users</a>. In this approach, cybercriminals mask a fraudulent email message as a legitimate one—using the logos, colors and common language of known senders, such as financial institutions or employers. Phishers also can cloak the sender's address to appear genuine and craft a message that is often meant to inspire fear to solicit the recipient’s confidential information. For instance, a cybercriminal using deceptive phishing may send a message that appears to come from a mortgage company and demands the recipient update his or her bank information to avoid defaulting on the loan. This type of urgent threat is one red flag to look for, along with spelling and grammatical errors. Email users can also hover their cursor over the sender’s email address to ensure the linked account is the same; if it’s not, it’s likely this could be a deceptive phishing email. Another way to protect yourself is by registering for a <a href="https://www.reagan.com/bestprivateemailservice">private email address</a>, which uses end-to-end encryption so you can trust the message is authentic.</p> <p><strong>Spear Phishing</strong></p> <p>Email is also a channel that criminals use for spear phishing, in which they use a significant amount of personal information about the recipient to be even more convincing—to secure a response with sensitive information or motivate the recipient to click on an infected link or attachment. This type of scheme is also common on social media, where many users put a wealth of identifying information out for the public — including cybercriminals — to see.  It’s important to be careful about opening messages on social media sites, even if you believe you know the person — and they seem to know a lot of information about you.</p> <p><strong>CEO Fraud</strong></p> <p>This is becoming one of the more common phishing attacks, as phishers attack the email account of a high-ranking company executive. This type of scam can enable criminals to authorize wire transfers or conduct other illegal financial activities with the stolen email identity. The cyber attacker may also use the email address to request financial information, such as W-2 forms, from employees, who may be tricked into providing such information, since they know and seemingly trust the sender. This type of attack highlights the organizational need for a private email service, which can be just as valuable to companies as it is to individual email users.  </p> <p><strong>Pharming</strong></p> <p>A pharming scheme is among the most challenging of the common phishing attacks to spot, as a pharmer can redirect users to a malicious website by changing the IP address — even if the users type in the correct URL, if it has been compromised, they could find themselves unwittingly on a fraudulent site. Web users can protect themselves against pharming schemes by only visiting verified secure sites (which use HTTPS, instead of HTTP).</p> <p>If you are looking for a safe and secure step to protecting yourself online, consider <a href="https://www.reagan.com/reagancom-personal-email">using a Reagan.com email address</a>. Our private and secure email can put you on the right track to protecting your personal information from cyber criminals.</p> <p> </p> urn:store:1:blog:post:150 http://www.reagan.com/39-year-anniversary-of-reagans-inaugural-address-jan-20-1981 39 Year Anniversary of Reagan’s Inaugural Address (Jan 20, 1981) <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/85/6fcc3c3a8a44be9992ec18e4a27904/inauguration.jpg" width="357" height="238" /><img /></p> <p> </p> <p>It has now been 39 years since the first Ronald Reagan delivered his inaugural address on January 20, 1981. The world has been transformed in many ways since that day; but in other ways, many of the challenges the U.S. faced as Reagan entered the White House are just as prevalent today as they were four decades ago.</p> <p><strong>Focus on the Economy</strong></p> <p>One that is on the mind of many Americans today as we enter a presidential election year is the economy, which took center stage in Reagan’s speech. He opened with a focus on the “economic affliction of great proportions” that the country was facing. “We suffer from the longest and one of the worst sustained inflations in our national history,” he said. “It distorts our economic decisions, penalizes thrift and crushes the struggling young and the fixed-income elderly alike. It threatens to shatter the lives of millions of our people.” While our current economy is vastly improved since the time of the Reagan inaugural address—much of that progress owed to the work Reagan did while in office—many economic pundits are predicting a downturn on the horizon. Americans who are facing the same worries that abounded in 1981—and, particularly, the elected officials who lead them—should take note of the rest of Reagan’s speech, which noted that government is not the solution to economic crises, but rather is part of the problem.</p> <p><strong>Giving Voice to the Voiceless</strong></p> <p>Along those lines, the Reagan inaugural address also shed light on one of the most neglected segments of Americans, whose voices get lost in the attention given to special interest groups. Working-class Americans, Reagan said — such as “men and women who raise our food, patrol our streets, man our mines and our factories, teach our children, keep our homes and heal us when we are sick” — are truly the “we the people” enshrined in our founding documents.</p> <p>It is this population Reagan spoke directly to, and whom he geared the bulk of his work in office and his ensuing legacy toward. Nearly 40 years later, the working class still remains an often-forgotten segment of society — and one that will surely be paying attention this campaign season and looking forward to an inaugural address next year that echoes the promises Reagan made.</p> <p> </p> urn:store:1:blog:post:149 http://www.reagan.com/cybersecurity-pledge-signed-by-27-countries Cybersecurity Pledge Signed by 27 Countries <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/00/c12abcc8d1467c9e3aa0eecaf39973/iStock-648439466_super.jpg" width="357" height="238" /><img /></p> <p> </p> <p>Now that we're in another presidential election year, an issue that garnered significant international attention four years ago is again a hot topic of debate: <a href="https://www.reagan.com/cyber-security-of-the-2020-presidential-election">cybersecurity</a>. In the leadup to the 2016 election, hacking by foreign countries, Russia in particular, became a central focal point of campaigning on both sides, and it’s sure to again take center stage — particularly as dozens of countries around the world took a stand on the issue with a cybersecurity pledge.</p> <p>The United States was one of 27 nations that signed onto a pledge this fall condemning cyberattacks designed to infiltrate another country’s infrastructure or further the attacking nation’s political pursuits. While not named directly, Russia and China were presumably top of mind by many signatories of the cybersecurity pledge, as they both have documented histories of staging large-scale, politically motivated cyberattacks internationally. For instance, the pledge condemns actions that undermine democracy, seemingly pointed at highly publicized Russian interference in the U.S. and other international elections, which many cybersecurity experts caution is likely an ongoing issue that could again affect the 2020 election. China’s history of cyberattacks on private businesses to obtain trade secrets that benefit Chinese companies was also the likely motivator behind a select passage of the cybersecurity pledge that decries business attacks.</p> <p>While the document didn’t directly name those sources, it also didn’t directly name any potential penalties for those who violate the tenets of the cybersecurity pledge. It called for “consequences for bad behavior in cyberspace,” but lacked further information about what such consequences may be.</p> <p>American’s new <a href="https://www.reagan.com/americas-cybersecurity-workforce">cybersecurity workforce</a> paired with the cybersecurity pledge is a significant first step toward reducing the international implications of cyberattacks, which are growing increasingly more sophisticated and prevalent. A strong and unified voice, such as that provided by the 27 countries who signed onto the pledge, sends an important message that the world is on high alert for cybercrime—and the next step is a clear definition of ramifications to illustrate a serious deterrent for those looking to use the internet for political gain.  </p> <p> </p> <p>             </p> <p> </p> urn:store:1:blog:post:148 http://www.reagan.com/president-reagans-1983-address-to-the-nation-on-christmas President Reagan's 1983 Address to the Nation on Christmas <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/30/f982a177b54bf79279736ddefdabdc/1985-Reagan-Christmas-Tree.jpg" width="357" height="238" /><img /></p> <p> </p> <p>President Ronald Reagan was known for countless stirring addresses that were able to bring together Americans—across the aisle, across backgrounds, and across beliefs. Reagan's Christmas radio address in 1983 was one such occasion and even now, more than 35 years later, it can still be looked to as a way to bring hope and healing to the nation every Christmas.</p> <p> </p> <p><iframe width="560" height="315" src="https://www.youtube.com/embed/WL9RQCv5-no" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p> <p>Reagan delivered the seminal speech on Christmas Eve from the Oval Office, focusing on two key tenets of the Christmas holiday — faith and family — and expertly interweaving another important principle: freedom. The president recounted the spirit of the season, recalling Christmas as the birth of Jesus, an idea that is all too often lost in the hustle and bustle of the holiday season. He noted that no government, parliament or king had ever been able to spread peace and goodwill like Jesus had—an idea that was meant to inspire both a commitment to the true meaning of Christmas, as well as a call to action to Americans to strive to live that example.</p> <p>Family was also a primary topic in Reagan’s Christmas radio address, as he referenced the young girl who had helped him light the official national Christmas tree, and noted her joy and hope. While many listeners were likely gathered with their own families that Christmas Eve, he encouraged them to think of families who were less fortunate — and to give thanks for the many Americans whose sacrifices enabled their family’s safety and prosperity, as well as those who work each day to provide meals for the hungry, shelter for the cold and support for the sick. That work, he said, demonstrates that the Christmas spirit is still alive and well, and that we only need to look to our fellow Americans, and all that we do to take care of one another, as proof — a message that still resonates today.</p> <p>Those ideas extended across oceans as well, as Reagan’s Christmas radio address also urged listeners to pray for the needy in places like the Soviet Union and Lebanon, where American actions at the time were helping to spread freedom and independence. “With patience and firmness, we can help bring peace to that strife-torn region and make our own lives more secure,” the president said. “The Christmas spirit of peace, hope, and love is the spirit Americans carry with them all year round, everywhere we go. As long as we do, we need never be afraid, because trusting in God is the one sure answer to all the problems we face.”</p> <p> </p> <p> </p> <p> </p> urn:store:1:blog:post:147 http://www.reagan.com/how-to-spot-signs-of-a-phishing-email How to Spot Signs of a Phishing Email <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/ca/f648d3fa384c34bd1f025825abd029/shutterstock_462670036.jpg" width="357" height="238" /><img /></p> <p> </p> <p>Phishing emails are among the simplest, yet most effective ways cybercriminals gain access to victims’ personal information. Using things like email addresses, logos, color schemes, and signatures that mirror the setup of known email senders, phishers rely on the rapid pace at which most of us click through our emails in order to trick their way into our inbox. Once a user clicks on such a message, he or she is often prompted to share personal, sensitive information, such as a credit card or Social Security number — and, because the email user believes the message is coming from a known source, like a financial institution or an employer, many freely share the data. The simplicity of the scams is often what makes phishing emails so successful.</p> <p> </p> <p>One of the best lines of defense against falling prey to a phishing email is <a href="https://www.reagan.com/privateemail">using a private email address</a>. With such an account, like those <a href="https://www.reagan.com/reagancom-personal-email">offered by Reagan.com</a>, users are given an added layer of protection through end-to-end encryption — so both sender and receiver can be assured the other is valid. Outside of a private email, here are a few other things to look out for in order to protect yourself from a phishing email:</p> <p> </p> <p><strong>An unusual salutation:</strong> If the email opens with a greeting that sounds promotional or extremely vague, there could be a chance the sender is not who you think.</p> <p> </p> <p><strong>URL mismatch:</strong> Hover your mouse over the sender’s email address; if the linked address that pops up is different (even only by one or two characters), this could be a phishing email.</p> <p> </p> <p><strong>Misspellings:</strong> While not every email message has perfect spelling and grammar, errors are a red flag for a phishing email. Genuine messages from trusted senders, like a bank or retail store, are often thoroughly vetted for any spelling or grammatical errors—so messages purporting to be from those organizations that are littered with inaccuracies shouldn’t be trusted.</p> <p> </p> <p><strong>Threats:</strong> Phishing email often contains a threat that is designed to make the recipient concerned enough that he or she would give up personal information to avoid the promised outcome. For instance, a message may warn the recipient an account will be shut down without their sharing updated credit card information.</p> <p> </p> <p><strong>Links and attachments:</strong> Clicking on links within the text of an email can give cybercriminals a gateway into your email, as can attachments, which can have spyware embedded. Many reputable companies will not send links or attachments to email recipients, so it’s best to completely avoid clicking on them if you do receive such a message.  </p> <p> </p> urn:store:1:blog:post:146 http://www.reagan.com/5-safety-tips-for-using-a-public-computer-or-wifi 5 Safety Tips for Using a Public Computer or WiFi <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/bb/80b1062fa94c2a96648ef85de54187/shutterstock_115174897.jpg" width="357" height="238" /><img /></p> <p>In today’s fast-paced, on-the-go world, many of us have had the occasion to use a public computer. Whether our internet-powered personal device is running out of battery, or we have to do work or personal business while on vacation or at a local library, public computers can be a lifesaver. However, they can also be a security risk, if the proper precautions aren’t taken. It’s important to understand basic safety tips for using a public computer before doing so. And, equally key is an appreciation for the steps we should all take when using public WiFi, which can be another threat to privacy if not handled appropriately.</p> <p> </p> <p>Here are a few of the most important safety tips for using a public computer or WiFi:</p> <p><strong> </strong></p> <ol> <li><strong>Don’t divulge personal information: </strong>Think hard about what type of business you want to conduct on a public computer. It’s impossible to know who may use the computer before and after you, and the extent to which your information is protected — or <a href="https://www.reagan.com/private_email_account">could be monitored</a> — so avoid any financial transactions or transmitting any other sensitive information on public computers.</li> </ol> <p><strong> </strong></p> <ol start="2"> <li><strong>Only use secure sites: </strong>Make sure the sites you visit begin with the prefix https; without the “s,” the site is considered unsecured and could put your browsing at risk of prying eyes.</li> </ol> <p><strong> </strong></p> <ol start="3"> <li><strong>Don’t save logins: </strong>We’re often prompted to save passwords or usernames when visiting a password-protected site, which should be avoided as one of the top safety tips for using a public computer.</li> </ol> <p><strong> </strong></p> <ol start="4"> <li><strong>Use private email: </strong>End-to-end encryption and secure storage are just a few of the <a href="https://www.reagan.com/privateemailservice">benefits of private email</a>. In addition, when using a public computer, email users can have the peace of mind that their information is as secure as possible.</li> </ol> <p><strong> </strong></p> <ol start="5"> <li><strong>Avoid public WiFi: </strong>It’s best to only rely on WiFi you personally set up; however, if you can’t connect to your own or access a personal hotspot, only consider connecting to public networks from known entities. For instance, connecting to a WiFi network operated by a coffee shop you visit frequently is preferable to a public network from an anonymous source. Hackers can create dummy hotspots and trick users into logging into that public WiFi in order to steal their information.</li> </ol> <p> </p> <p>Knowing the top safety tips for public computer users can help save you from a world of hurt. Keeping your information safe is a must, so always use your judgment when using a public computer. Remember, you can never be too safe with your private information online.</p> urn:store:1:blog:post:145 http://www.reagan.com/looking-back-a-reagans-veterans-day-speech Looking Back at Reagan’s Veterans Day Speech <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/bb/a69c3aa98b46e4bf3176e4548ab6e9/shutterstock_735840070.jpg" width="357" height="238" /><img /></p> <p>It’s been nearly 35 years since President Reagan Veterans Day Speech became an iconic emblem of American patriotism. While much has changed in our country and around the world since the president delivered that address, his words still very much ring true today — and hold a wealth of lessons for today’s public servants, as well as members of the military and civilians, to take forward. Reagan, whose legacy includes a deep commitment to our armed forces, spoke the now-famous words during a wreath-laying ceremony at Arlington National Cemetery honoring Veterans Day in 1985. The president used the occasion to pay tribute to the men and women who lost their lives fighting for our country, but also to tie their sacrifice to the work that still needed to be done. Both the victims of war and the reason they died, Reagan said, should be remembered by Americans — not just on Veterans Day, but year-round.</p> <p>“There is a special sadness that accompanies the death of a serviceman, for we're never quite good enough to them — not really; we can't be, because what they gave us is beyond our powers to repay,” Reagan said. “And so, when a serviceman dies, it's a tear in the fabric, a break in the whole, and all we can do is remember.”</p> <p>Each person who has died in battle for the United States, the president said, is a victim of a failed peace process — something which is often lost on many Americans. Our country losing citizens to war represents that we, as a whole, have forgotten many things: the principles on which the United States was founded, the fact that we’re stronger together and even that common sense will always prevail.</p> <p>This aspect of the Reagan Veterans Day Speech alluded to the ongoing tensions at the time with the Soviet Union — but they have resounded through the years. In 2019, fears over nuclear weapons and increasing tensions with foreign powers continue to ramp up, leading many to question if we’ve taken Reagan’s words to heart. When the peace process breaks down, perhaps it reflects deeper erosion in the country — a failure to recognize the prevailing American principles, the unity that we all need and the necessity for practical problem-solving that puts America first.</p> <p>This Veterans Day, listening to these echoes of the past from the Reagan Veterans Day Speech can be an insightful way for modern Americans to both pay tribute to military heroes and find the resolve to prevent any further lives lost.</p> <p> </p> urn:store:1:blog:post:144 http://www.reagan.com/beware-rise-in-mobile-phishing-attacks Beware: Rise in Mobile Phishing Attacks <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/bd/186c2151ba4c93a31c60dc7f4634a5/shutterstock_499281688.jpg" width="357" height="238" /><img /></p> <p> </p> <p> </p> <p>For many, our mobile devices are nearly attached to us at all times — in our hands, in our pockets, or in our purses. Beyond using them for business and personal calls and texting, our mobile smartphones have given us unprecedented access to the world wide web right at our fingertips — with email, e-commerce, banking, social media and much more all just a few clicks away. With that convenience, however, has come some added security risks, such as a rise in mobile phishing attacks.</p> <p><a href="https://www.reagan.com/phishing">Phishing</a> has become a problematic threat across many platforms in recent years — as scammers mask communications as coming from a known user or organization to solicit sensitive information from targets — and, with our increasing reliance on mobile smartphones, that’s where many cybercriminals are turning their attention. Phishing has traditionally been relegated to emails, but according to a <a href="https://securityboulevard.com/2019/05/the-rise-in-mobile-phishing-attacks/">recent report from Security Boulevard</a>, some scammers have started using SMS text messaging as well.</p> <p>Since so many of us reflexively open text messages without even considering the source, it’s no wonder that this has become a prime target for phishers. With a simple spoofing of a phone number, cybercriminals can easily mask their identities and just may be successful at scamming their target into divulging personal information, all in a method that is much harder to track, report and stop than other types of phishing.</p> <p>While there has been a rise in mobile phishing attacks based on SMS texting, the trend has also extended to email. Many email users today check their messages through their phones and, as such, are used to emails designed for mobile use, as opposed to desktop. Phishers have picked up on this and are creating phishing messages modeled after the mobile versions used by banks, stores, and other organizations that could involve sensitive information-gathering.</p> <p>It’s vital that mobile users begin to think differently about how they use their phones — instead of just enjoying their potential for information and entertainment, they should be treated as a significant security threat. Taking smart steps like only using a private email is one way to start shifting that mindset. With a <a href="https://www.reagan.com/bestprivateemailservice">private email, such as Reagan.com</a> no matter if you’re checking your messages on your mobile device or a desktop, you can trust that senders are who they say they are — and that all of your confidential information will be treated safely and securely.</p> <p> </p> urn:store:1:blog:post:143 http://www.reagan.com/reagans-legacy-30-years-later Reagan’s Legacy 30 Years Later <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/10/757bc920fe46a489479d619ec4a75e/shutterstock_177028802.jpg" width="357" height="238" /><img /></p> <p> </p> <p>Though it may be hard to believe, it’s been three full decades since President Ronald Reagan left office — but his impact is continuing to be felt. That’s because the Reagan legacy was rooted in a number of foundational American beliefs — freedom, equality, and independence — and he set into motion a series of policies and programs that were constructed around those lasting principles.</p> <p>Many of today’s young voters weren’t even alive when President Reagan left the White House, but the America that they have always known was indelibly changed by him. When Reagan took office, the country was at the brink — on a number of fronts. The economy was on a downturn, tensions with the Soviet Union and other foreign powers were at unprecedented highs and the country’s increasing global focus was leaving millions of Americans in limbo, dashing morale, and patriotic pride. Reagan saw the writing on the wall and sought to instill an entirely new approach to what it meant to be American, which would ultimately fuel the <a href="https://www.reagan.com/life-of-ronald-reagan-timeline">Reagan legacy</a> for years to come.</p> <p>He instituted <a href="https://www.reagan.com/tax-day-ronald-reagan-tax-cutting-legacy-reagancom">major tax reforms</a>, including tax cuts that have been credited with reinvigorating the American economy. Jobs creation was another focus, as was moving away from government-assistance programs, efforts that got many Americans back to work and helped strengthen real estate, education, and many other markets. Reagan took a hardline approach to conflicts with the Soviet Union and is considered the driving force behind the easing of Cold War tensions. His Strategic Defense Initiative gave the American military the shot in the arm it deserved and helped reestablish the country as the global power it is today.</p> <p>All of that work was centered on the concept of “America first,” an idea that has seen a resurgence in recent years. Reagan knew that it was important to solidify the country’s position on the global stage, but also to first and foremost invest in the American people themselves, particularly the hardworking middle class.</p> <p>By doing so, Reagan elevated national pride, a sentiment that has inspired and shaped generations of Americans — and made the Reagan legacy a cornerstone of American history.</p> <p> </p> urn:store:1:blog:post:142 http://www.reagan.com/new-social-scoring-system-how-will-it-affect-you New Social Scoring System: How Will It Affect You? <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/bf/0af77dd2524a858e7d3248e6988dcf/shutterstock_1085086556.jpg" width="357" height="238" /><img /></p> <p>Is Silicon Valley censoring conservatives? That certainly appears to be the case, as the trend toward banning Americans—from social media use to ride- or house-sharing services—is gaining more and more traction, and many see conservatives as a prime target.  </p> <p>We’ve all heard the stories of prominent conservative voices being kicked off—both temporarily and permanently—of social media sites like Twitter and Facebook for sharing their views. As big-name tech companies are largely left-leaning and led by liberally minded individuals, that begs the question; is Silicon Valley censoring conservatives on a wider scale? A <a href="https://www.fastcompany.com/90394048/uh-oh-silicon-valley-is-building-a-chinese-style-social-credit-system">recent report by Fast Company</a> suggests so, likening the process to China’s controversial “social scoring system.”</p> <p><strong>Government Monitoring of Morals</strong></p> <p>In China, the government has formalized a rating system whereby all residents are scored on their lifestyle and habits. For instance, they can lose points for having a messy sidewalk and gain them for acts of kindness. However, the system takes a decidedly oppressive turn with the consideration of political behavior, donations, and religious beliefs, all of which are monitored by the government in power, which seemingly is aiming to stamp out belief systems that counter it or other dominant groups.</p> <p><strong>Could Social Scoring Affect You?</strong></p> <p>The treatment of conservative Americans may be headed in this direction. Popular house-sharing site Airbnb and ride-sharing apps like Uber and Lyft have the ability to permanently ban users from their services, with no explanation on the part of the companies. This opens up the door to these left-leaning companies to restrict access by conservatives.</p> <p>Apart from tech companies themselves monitoring and restricting usage, the concept of Silicon Valley censoring conservatives also extends to companies that use their tech products. For instance, the Fast Company article notes that insurance companies have been known to monitor social media of applicants and clients. They could deny coverage or make it more costly to those whom they deem to take health risks, simply on account of the photos or messages the person posts. It isn't a far cry to imagine companies using this rationale to restrict activity by conservatives.</p> <p>As these tech companies wield more and more power and authority in American society, the slippery slope that could continue to lead to the restricting of rights and privacy violations of conservatives continues to become steeper. One way to protect yourself is by using a <a href="https://www.reagan.com/bestprivateemailservice">private email service</a> like Reagan.com to keep your data and personal information out of the hands of Big Tech in Silicon Valley.</p> <p> </p> urn:store:1:blog:post:141 http://www.reagan.com/september-11ths-impact-on-cybersecurity September 11th’s Impact on Cybersecurity <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/92/1bab24819e4fa79a3b35cac2c11878/911.jpg" width="357" height="238" /><img /></p> <p> </p> <p>The terrorist attacks of September 11th, 2001, have had a lasting effect on the security of our country. From enhanced airport security and flight restrictions to new safety protocols for workplaces and schools, the impact continues to resonate nearly two decades later. More recently, the issues of cybersecurity and September 11th have also come into play, as our world continues to become digitally driven and more interconnected than ever before — which can expose security issues and threats to national safety.</p> <p>We’ve all seen the security repercussions of the counterterrorism efforts that have arisen since the terrorist attacks: long lines at airports as travelers show plastic bags of liquids or take off their shoes. However, the intersection of cybersecurity and September 11th has been less observable — but still just as impactful.</p> <p>For instance, after Sept. 11, Congress several times amended the Foreign Intelligence Surveillance Act to give federal authorities more power to engage in surveillance activities. There is an element of cybersecurity to this legislation, as it has been updated to take into consideration the role of cyber-attacks, as well as the digital mechanisms investigative authorities can use to enhance the nation’s security. Another major shift was the creation of the U.S. Department of Homeland Security, dedicated to combatting terrorism. In the years since September 11th, the agency has evolved its focus to include cybersecurity, as the reality that America’s digital borders are just as threatened as its physical ones became clearer.</p> <p>The infrastructure that developed in the wake of September 11th has also been key to strengthening the country’s approach to cybersecurity. After the attacks, there was a renewed sense of collaboration — among federal, state and local law enforcement authorities as well as government agencies tasked with protecting the nation. The same has been true with cybersecurity, as federal authorities now operate on the foundation that shared information can be a major defense against terrorism. With that in mind, authorities at all levels need to continue to find innovative and proactive ways to continue to prioritize American safety, both on and offline.</p> <p>A continued way to find cybersecurity is through the use of a <a href="https://www.reagan.com/bestprivateemailservice">private secure email account</a> like Reagan.com. Take the proper precautions for your online safety and keep your personal information protected. Get started with a private email today!</p> <p> </p> urn:store:1:blog:post:140 http://www.reagan.com/cyber-security-of-the-2020-presidential-election Cyber Security of the 2020 Presidential Election <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/00/c12abcc8d1467c9e3aa0eecaf39973/iStock-648439466_super.jpg" width="357" height="238" /><img /></p> <p>In this upcoming presidential election, cyber security is sure to be a hot topic — but, as it turns out, a surprising number of politicians vying for the Oval Office aren’t themselves familiar with one of the most basic email privacy features.</p> <p> A recent report by Agari confirmed the troubling reality that barely any of presidential hopefuls are using domain-based message authentication, reporting and conformance policy, or DMARC. This security feature automatically verifies the sender’s email address — and, if it can’t, it marks the message as potentially dangerous for the recipient. Here at <a href="https://www.reagan.com/privateemail">Reagan.com private email</a>, we use both DMARC and DomainKeys Identified Mail to ensure our users have the highest level of confidence that they’re safe and secure when using email.</p> <p> However, that is not yet a commitment that leading politicians share. According to Agari, Democratic presidential candidate Elizabeth Warren is the only of a dozen people pursuing the top post whom it could confirm uses DMARC. The list of those not yet on board with the security feature includes incumbent President Donald Trump and front-runners like Joe Biden and Bernie Sanders.</p> <p> When it comes to the 2020 presidential election, cyber security should be top of mind for all of the candidates — especially considering how central it was to the 2016 campaign, during which Russian hackers are said to have breached the emails of Hillary Clinton, who was already embroiled in her own scandal regarding email privacy. Thankfully, DMARC has seen a surge in adoption by federal agencies, with more than 80 percent of them rolling out the feature in recent years, a move that Sen. Ron Wyden acknowledged was a “no-brainer that increases cyber security without sacrificing liberty.”</p> <p> If candidates don’t soon tighten up their security and start incorporating DMARC into their email systems, they risk falling prey to <a href="https://www.reagan.com/phishing">scammers and phishers</a><strong>, </strong>who could seek to use the candidates’ name recognition to steal personal information from everyday Americans — a serious black eye for anyone seeking to hold the highest office in the country. In the presidential election, cyber security is important regardless of party lines.</p> urn:store:1:blog:post:139 http://www.reagan.com/national-veep-day-vice-presidents-becoming-president National Veep Day | Vice Presidents Becoming President <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/b3/38681073c511e8b32e1d75664be1aa/iStock-502892481_high.jpg" width="357" height="238" /></p> <p> </p> <p>Celebrate National Veep Day<img /></p> <p>We all know that the country honors its commander-in-chief every February, but did you know there is also an occasion in which Americans pay tribute to the second in command? National Veep Day is marked every year on August 9th.</p> <p>The holiday recognizes the office of the vice president of the United States, and the many distinguished men who have held the title throughout the country’s existence. While the vice president often doesn’t have the same headline-generating title as the president, nor the same place in the history books, our nation’s vice presidents have been integral to shaping public policy and ensuring American success. Many have also used the position as a jumping-off point to ascend to the Oval Office.</p> <p>For instance, President Ronald Reagan’s vice president, George H.W. Bush, ultimately went on to become commander-in-chief. Bush had actually run for the top spot in the 1980 Republican primary election, going head to head with Reagan for months before Reagan ultimately secured the party’s nomination — and picked Bush as his running mate. For eight years, the two worked side by side rebuilding the nation’s economy and establishing lasting foreign diplomacy. When Reagan’s two terms came to a close, Bush took his turn to pursue the White House; while Reagan stayed neutral in public, seemingly because of complex political and personal affiliations, it’s reported that he privately backed Bush’s election.</p> <p>Today, we’re seeing another occasion of the vice president seeking to return to the White House, as former Vice President Joe Biden is considered a front-runner for the Democratic nomination for the 2020 presidential election. Only time will tell if history will repeat itself. But what is certain now is that National Veep Day will continue to be a time for the country to reflect on leaders of the past and consider what tomorrow’s leaders can learn from their example.</p> <p> </p> urn:store:1:blog:post:138 http://www.reagan.com/online-retail-hacks-more-prevalent-than-ever Online Retail Hacks More Prevalent Than Ever <p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://images.clickfunnels.com/ee/efe2040fcb442b911820072fb87eb0/iStock-840031624_super.jpg" alt="" width="357" height="238" /><img alt="" /></p> <p><strong>Protect Yourself From Online Retail Hacks</strong></p> <p>In recent years, online shopping has exploded — so, too, have <a href="https://krebsonsecurity.com/2019/04/data-e-retail-hacks-more-lucrative-than-ever/">online retail hacks</a>. Previously, cyber criminals would tend to target merchants themselves, stealing credit card data that would net them $15-$20 per card, and which would then be used to clone a new, fraudulent card. This method was traditionally more popular than swiping individual card numbers from cyber shoppers, data that they would use to make their own online purchases — but which was only worth less than $8 per stolen card. Recently, however, the tables have turned and those individual-based scams are rising in popularity — as cybercrooks have found it more difficult to obtain those individual card numbers (thanks to new methods like security chips), demand has increased, as has the amount criminals can net for each stolen card.</p> <p>So, what can you do to prevent yourself from becoming a victim of one of these online retail hacks? Practicing basic cyber safety is an important first step. A <a href="https://www.reagan.com/bestprivateemailservice">private conservative email provider</a> can be a vital first line of defense against cyber criminals, who often attack public, insecure emails as their entrance into a victim’s most personal information. Even if you think you don’t transmit risky content in your messages, such as credit card numbers, criminals can use a person’s email to start building a profile of their online habits, which can be a building block for theft and even identity fraud.</p> <p>Beyond securing a private email, another method to preventing online retail hacks is smart password protection: Use a password that is hard to guess, change it frequently and do not store passwords anywhere on your computer.</p> <p>Finally, a quick way to protect yourself online is to <a href="https://www.lifewire.com/cyber-attacks-4147067">check the URL of the web address</a> you’re visiting. If it includes an “s” after http, that means it is a secure site through which you can safely share information on this website; if it read just as “http,” it’s best to avoid it.</p> urn:store:1:blog:post:137 http://www.reagan.com/ronald-reagans-4th-of-july-speech-to-constituents Ronald Reagan’s 4th of July Speech to Constituents <p><img height="238" src="https://images.clickfunnels.com/c3/734f307da511e8ad713fd6c6433080/iStock-541869170_super.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img />Ronald Reagan’s 4th of July Speech</p><p>When it comes to presidential 4th of July speeches, Ronald Reagan is known to have topped them all. It’s no wonder that the Great Communicator would be remembered for his poignant addresses, but it wasn’t just the way Reagan delivered these speeches that have made them such an important part of his legacy — it was also the universality and timelessness of his messages.</p><p>Take his <a href="https://qz.com/1020031/elegant-4th-of-july-speeches-by-past-us-presidents-of-both-parties-remind-us-unity-makes-america-great/">1986 address</a>, for instance. In it, Reagan sought to unify the country, successfully illustrating the power that each and every American has individually — and the strength that power can represent when unified. “All through our history,” he said, “our presidents and leaders have spoken of national unity and warned us that the real obstacle to moving forward the boundaries of freedom, the only permanent danger to the hope that is America, comes from within.” Reagan delivered these words at a time of great social and political upheaval in the country: from the Challenger explosion to tensions with the Soviet Union. The president sought to inspire and motivate Americans to band together to overcome obstacles, subtly tying the issues of the time to the nation’s longstanding history of drawing strength from the unity of its people.</p><p>That theme has carried through many other presidential 4th of July speeches from Reagan’s successors. President George Bush heralded the holiday as a “time to rejoice” in the country’s success, “which has inspired all those who seek to break the shackles of totalitarian rule and breathe in the life-giving air of liberty.” In 1993, President Bill Clinton noted that “our people have always known that government could not solve all the problems and that citizens had to be responsible to build this nation together.” More than 20 years later, President Barack Obama noted that the country’s earliest patriots all came from different backgrounds and beliefs, “but they were unified by a belief in a simple truth: that we are all created equal.”</p><p>All of these presidential 4th of July speeches have sought to drive home the points Reagan also communicated — that, despite differences and challenges, all Americans can and should rally around the founding principles that have driven our country for centuries: that we all have the right to life, liberty and the pursuit of happiness. And that these aims are all more attainable when we work together.</p><p>&nbsp;</p> urn:store:1:blog:post:136 http://www.reagan.com/ronald-reagan-on-border-security Ronald Reagan on Border Security <p><img height="238" src="https://images.clickfunnels.com/cc/7113f3640f41239a8ec6514f99701c/america-1999384_1280.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><br /></p><p>The Ronald Reagan border security position is a topic that has been in the news a fair amount recently, as proponents on all sides of the hot-button issue of immigration continue to search for a solution. While President Trump has made the claim that Reagan was in favor of building a wall along the Southern border to restrict illegal immigration from Mexico, that wasn't quite the case. Here is a more accurate look at what Reagan's approach truly was:&nbsp;</p><p>First and foremost, the president advocated for legal migration, understanding that the best way for migrants to join American society was through the legal channels available to them. A strong believer in the principles of American freedom and the equality they promise to all, Reagan recognized the value that immigrants have always brought to the country and the potential they could have on its future.&nbsp;</p><p>The president advocated for American borders to be “two-way,” noting that a physical barrier wouldn’t solve the deeper issues that fuel illegal immigration. So, the Reagan border security approach wasn't centered on a wall, but more so on a comprehensive formula.</p><p>“Rather than talking about putting up a fence, why don’t we work out some recognition of our mutual problems, make it possible for them to come here legally with a work permit?” Reagan said in a 1980 presidential debate. “And then while they’re working and earning here, they pay taxes here. And when they want to go back, they can go back.”</p><p>Among the steps Reagan took to address immigration was advocating for more stringent surveillance—believing increased resources and use of technology to monitor borders by both land and air was a more practical approach than a barrier. He also signed into law the Immigration Reform and Control Act in 1986. It instated tougher penalties for employers that hired illegal immigrants, while also allowing undocumented immigrants who came into the country prior to 1982 to legally remain—as long as they hadn’t committed crimes and could demonstrate cultural knowledge—while levying taxes and fines. The next year, he signed an executive order to grant amnesty to children of undocumented immigrants living in stable households with parents who were attempting to legalize.</p><p>“I believe in the idea of amnesty for those who have put down roots and who have lived here, even though some time back, they may have entered illegally,” Reagan said in a 1984 presidential debate.</p><p>While President Reagan championed stronger border security, he did so in a way that recognized the underlying problems at play and worked to create sensible solutions.</p><p>&nbsp;</p><p>&nbsp;</p> urn:store:1:blog:post:135 http://www.reagan.com/the-us-governments-online-security-history The US Government’s Online Security History <p><img src="https://images.clickfunnels.com/28/99516ad6ad45cf89bf7b41a9c8f4e3/iStock-519735146_high.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="238" /><img /></p> <p>US Government Online Security History | Reagan.com Blog</p> <p>The worlds of cybersecurity and data privacy are rapidly developing, meaning laws regulating them are continuing to evolve. While there’s considerable debate on both sides of the aisle about the best way forward to keep Americans safe online, perhaps the best way to illuminate the future is to examine where we came from. When it comes to the government's online security history, there have been many stops and starts in the past few decades, as federal leaders explored how to navigate this quickly changing arena.</p> <p> </p> <p>Here’s a look back at how some of the recent administrations handled this increasingly important issue:</p> <p> </p> <p><strong>Bill Clinton: </strong></p> <p>The Democratic president signed into law the Communications Assistance for Law Enforcement Act in 1994. The legislation was designed to require phone companies and manufacturers of phone equipment to build in equipment for surveillance, allowing federal law-enforcement agencies to wiretap any phone device. The measure was prompted by the rise in digital-telephone networks, which law enforcement said posed an obstacle in their work to pursue criminal investigations through wiretapping. Privacy advocates, however, pushed back against the law, arguing that it too broadly allows for domestic surveillance.</p> <p> </p> <p><strong>George W. Bush: </strong></p> <p>Not unsurprisingly, after the Sept. 11 attacks, all eyes were on President Bush to tighten security on all levels, marking a turning point in the government's online security history. Shortly after the terrorist attacks, Bush created the President’s Surveillance Program, which authorized the National Security Agency to conduct warrantless telephone surveillance of anyone communicating with someone overseas if either person is suspected of having a link to terrorism. The administration also relied on the Patriot Act, adopted in 2001, to allow electronic surveillance in the fight against terror, a program that was heavily criticized for giving the NSA broad authority in surveilling phone, email, text and other communications.</p> <p> </p> <p><strong>Barack Obama:</strong></p> <p>In 2017, Obama expanded NSA’s ability to share intercepted communications from global targets with 16 other federal agencies. While the move was applauded by some for instating a tighter series of checks and balances, others criticized it for opening up collected data — before privacy protections are instated — to too broad of a group of agencies.</p> <p> </p> <p>If you're concerned about your safety online, start with a <a href="/private_email_service">conservative email service</a> through Reagan.com.</p> <p> </p> <p> </p> urn:store:1:blog:post:134 http://www.reagan.com/turning-off-the-location-for-android-devices Turning Off The Location For Android Devices <p><img height="238" src="https://images.clickfunnels.com/22/461ca3332142c78ebd6a03ec873ea0/android.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" /><img /></p> <p>How To Turn Off Android Location Tracking</p> <p>As our digital devices increasingly power all aspects of our life — from our work to our personal communications and everything in between — there’s rarely a moment where most of us are without such products in our hands, or at least our pockets. However, that reliance has come with a price, as many of these devices are constantly tracking our whereabouts, information that puts our privacy and security at risk.</p> <p>If you have an Android device, you likely use it for taking photos, ride sharing, sending messages, browsing the web, navigation and much more — but with each of these activities, the device shares your <a href="https://www.technobezz.com/turn-off-geotagging-android-devices/"><strong>geotagged location</strong></a> with your search engine. Turning off the location for Android devices involves a few simple steps that, while they may take a bit of time, can ultimately keep you and your privacy protected.</p> <p>Many people think that <a href="https://www.androidcentral.com/how-stop-your-android-phone-sharing-your-location-google"><strong>disabling the location</strong></a> history alone will stop your location from being tracked but that unfortunately is not the case; instead, turning this option off simply stops your phone from displaying all the places you’ve been on a visual map, but doesn’t actually have any impact on the collection of that data. Actually, turning off the location for Android devices involves first opening the Settings tab and clicking Security. Follow the prompt for Privacy and then Location, toggling off the Use Location option. From there, click on Advanced and Location Services to turn off tracking for options like emergency location and location sharing.</p> <p>You may also want to consider turning location tracking off by individual apps. Under the Apps tab in the Settings box, explore App Permissions to see which apps use location tracking; by clicking on each, you can disable the feature.</p> <p>To take this a step further, you can also fully block the search engine from recording your activities, apart from just turning off the location for Android devices. On your device, click the Settings button and open the Accounts tab. From there, follow the prompts to manage data and personalization. Under Activity Controls, you can toggle off each of the monitoring options for activities like web browsing, audio usage, video searches and more. While that will prevent future tracking, you also should consider the data that has already been collected: Under the Manage Your Activity Controls tab, review saved data by clicking on My Activity and, from there, manually delete all of the files saved. </p> <p>If you’re looking to further your internet security and protect your private information you need to consider getting a <a href="/email_privacy_risks"><strong>private email account</strong></a> such as Reagan.com to keep your personal data and information protected.</p> urn:store:1:blog:post:132 http://www.reagan.com/5-reasons-not-to-use-work-email-for-personal-use-reagancom 5 Reasons Not To Use Work Email For Personal Use | Reagan.com <p><img alt="Cyber hand simulation coming out of laptop screen" height="238" src="https://images.clickfunnels.com/25/ea701e22b847f1af27cc2cd5b750ab/iStock-641382150_super.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" /><img /></p> <p>With the interconnected, on-the-go nature of today’s workforce, the lines between work and home life are increasingly blurred. That tendency may blend into our email — though, unless you’re using a <a href="/privateemailservice">private secure email </a>, mixing business and personal can be a tricky undertaking, one that may be setting you up for serious privacy risks.</p> <p>Here are five of the top reasons you should never use your work email for personal use:</p> <ul> <li><strong>Scams:</strong> Because corporate email addresses are often easily searchable and may be listed on a company’s website, they’re at increased risk for being targeted by scammers. If someone was able to infiltrate a work email from a phishing attack or other sophisticated hacking scheme, the scammer would not only have access to all of your work data but, if you use the account for personal reasons, would also be able to see and potentially use sensitive personal information.</li> <li><strong>Corporate policies:</strong> Unless you’re using a <a href="/privateemail">private secure email</a>, it’s likely that your manager and IT staff have access to your emails. Many corporate policies prohibit personal use of work email, so violating that provision could lead to fallout for your position.</li> <li><strong>Data breaches:</strong> Corporations are increasingly at risk for cyber-attacks, as hackers aim to get their hands on the treasure trove of information companies hold about both their employees and customers. If workers use their company email for anything from shopping to discount programs, and the company is the victim of one of these widespread data breaches, hackers can gain insight into an employee’s behavior and potentially information like bank account or credit card numbers.</li> <li><strong>Social media:</strong> All of our social media accounts require an email for login and, if you use your work account, that could pose a risk to your privacy. Social media often contains highly personal information — from photos to personal conversations — and someone looking to access that information could be one step closer if you use an email address that is easily identifiable.</li> <li><strong>Thinking about the future:</strong> It’s likely that you won’t be at your current position forever, so what happens to your personal email when you leave work? Without a private secure email, it’s likely that others in the company, or your successor, will easily be able to access all of your messages once you leave the organization.</li> </ul> <p>To learn more about our private secure email options, visit Reagan.com today!</p> urn:store:1:blog:post:131 http://www.reagan.com/-how-hackers-use-your-information-in-identity-theft-reagancom How Hackers Use Your Information in Identity Theft | Reagan.com <p><img alt="hackers using your info" height="238" src="https://images.clickfunnels.com/f5/f4cc112b304d1dac7bc9a6f51f9520/iStock-502192161_super.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p>Nearly 17 million Americans have one thing in common: They’ve all been victims of identity theft.</p><p>When hackers access personal data, they can use it in countless ways. Backed by identifying information like a Social Security number, addresses, and passwords, hackers can do everything from max out credit cards to apply for loans to make big-ticket purchases.</p><p>Together, the losses to individuals and companies per year in this country are more than $17 billion. On top of the monetary effects, the impacts of identity theft are both wide-ranging and long-lasting: Victims have to grapple with insurance companies, jump through red tape, track down paperwork and much more, all in attempt to minimize their financial losses. Concerns over financial strain and worries about future complications that could arise from an incident of identity theft can put significant strain on victims’ mental, emotional and even physical health. Ultimately, the ramifications can last for years.</p><p>While the impact of identity theft is severe, avoiding it can be made simpler. A <strong>private email service </strong>[link to /t/bestprivateemailservice ] is one way to safeguard your sensitive information. Even if you don’t think you transmit any sensitive information in your messages, without a private email, you may be opening the door to identity theft. If hackers are able to access your email, they can find a treasure trove of identifying information — from contact lists to passwords to your online behavior. All of that can be used to lay the foundation for identity theft, as, armed with all of that personal data, hackers can strengthen their ability to assume your identity and, ultimately, target your finances.</p><p>Identity theft may make victims feel helpless, but email users can have some of that authority returned to them with a private email, which uses encrypted messages and secure data storage, vital safeguards that public email lacks. While many Americans may be lax about email security, thinking identity theft is a crime that could never happen to them, 17 million of their fellow citizens are proof otherwise. By taking steps like using a <strong>private email account </strong>[link to Reagan.com], it’s possible to put up roadblocks that will help deter those on the path to committing identity theft.</p> urn:store:1:blog:post:130 http://www.reagan.com/tax-day-ronald-reagan-tax-cutting-legacy-reagancom Tax Day & Ronald Reagan Tax Cutting Legacy | Reagan.com <p><img alt="scissors cutting words tax cuts" height="238" src="https://images.clickfunnels.com/53/1d9e7cadfb46a0b751a3f09bc689bf/cuts.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>&nbsp;“Government's view of the economy could be summed up in a few short phrases: If it moves, tax it. If it keeps moving, regulate it. And if it stops moving, subsidize it." - Ronald Reagan</p><p></p><p>Ronald Reagan’s view of the government was straightforward: Government wasn’t the solution, it was the problem. One of the most obvious examples of the flaws in U.S. government, the president believed, was the tax system — which is why he set his sights on righting how Americans were taxed even before he took office. The work of President Reagan on tax cutting is among the cornerstones of his legacy — and continues to serve as an example of what our country should be striving for today.</p><p>Reagan’s beliefs about the lopsided nature of American taxes are perhaps best encapsulated in this famous quote of his: “Government's view of the economy could be summed up in a few short phrases: If it moves, tax it. If it keeps moving, regulate it. And if it stops moving, subsidize it." To remedy the obvious problems with that system, Reagan instituted a multipronged approach that involved a reduction in government spending, deregulation and tax cuts.</p><p>When it comes to President Reagan on tax cutting, he approached the issue as aggressively as he did all other economic plans — a commitment that was imperative, given the recession and mounting inflation. In 1981, he cut the individual top tax rate from 70 percent to 50 percent, and five years later, again slashed it to 28 percent. During his presidency, the corporate tax rate also fell from 48 percent to 34 percent.</p><p>The policies of Reagan on tax cutting were informed by his view that such cuts would promote economic expansion, leading to a stronger economy and ultimately a broader tax base. Reagan’s plan helped advance significant increases in the gross domestic product, fueling economic growth and a reduction in unemployment. Couple with the other strategies of Reagan’s economic approach — dubbed Reaganomics — the tax cuts were a significant step for a country that had been lagging financially to finally find its footing and surge forward.</p><p>The flaws in the American tax system continue to be hotly debated today, more than 35 years after Reagan’s first round of tax cuts. The success his administration realized from its economic policies should shine as a beacon for today’s leaders to fuel forward financial momentum.</p> urn:store:1:blog:post:129 http://www.reagan.com/how-to-turn-off-locations-on-your-iphone-reagancom How to Turn Off Locations on Your iPhone | Reagan.com <p><img height="238" src="https://images.clickfunnels.com/0a/75f757f78941f08c0ade14be223500/location.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p>We’ve all heard that our digital devices have the ability to track our online behavior — from our emails to our shopping history — but did you know they can also record our actual physical movements? If you use Apple products, you’ll want to pay attention.</p><p>Unbeknownst to many iPhone users, the tech giant tracks all the places they’ve traveled and stores all of that data. That can lead to a number of privacy concerns, as few people would likely be comfortable with a corporation having a list of their every movement — and, if this data got into the wrong hands, the implications could be wide-ranging. Thankfully, if you’re wondering how to <a href="https://www.businessinsider.com/how-to-turn-off-iphone-list-of-your-locations-2019-3#underneath-youll-find-a-list-of-every-app-on-your-iphone-and-the-kind-of-access-each-one-has-to-your-location-data-but-skip-that--3">turn off your locations</a> on your iPhone, the process is relatively straightforward — although the company makes the fix a bit tricky to find.</p><p>First, access your Settings on your iPhone and click on the Privacy tab. From there, you can navigate to Location Services. This page lists all of the apps on your phone that track your physical location — an eye-opening realization for those concerned about data privacy. While many think that simply toggling off the location tracking on different apps will offer some level of privacy, that’s actually not how to turn off your locations on your iPhone because the device has a treasure trove of all of your past movements.</p><p>At the bottom of the Locations tab, you’ll find a Systems Services button and, from there, you can access Significant Locations (make sure to have your phone’s password — which you should certainly use — handy). On this tab, you’ll see a history of the locations you and your iPhone have recently visited. Using locations identified through Maps, Calendar, Photos, and other apps, this section of the device tracks the cities you’ve been to, the places you visited, the dates you were there, how long you spent at each location and even how you got there. This comprehensive location history offers a snapshot of your movements, behaviors, and routines — a worrisome set of data that could put your privacy at risk.</p><p>Clear the Significant Locations history at the bottom of the page, and then toggle the button at the top to ensure Apple is no longer tracking and storing this sensitive information. Once you’ve done that, make sure you explore the Location Services page in full to ensure your location isn’t being used unnecessarily by any of your apps.</p> urn:store:1:blog:post:128 http://www.reagan.com/how-a-government-shutdown-effects-cybersecurity-reagancom How A Government Shutdown Effects Cybersecurity | Reagan.com <p><img height="238" src="https://images.clickfunnels.com/00/c12abcc8d1467c9e3aa0eecaf39973/iStock-648439466_super.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><br /></p><p>Of all the long-lasting impacts of the recent government shutdown, cybersecurity may be the most concerning — especially as the vulnerabilities exposed during this situation are sure to emerge again, putting the digital privacy of countless Americans on the line. The partial government shutdown at the beginning of the year shuttered numerous federal agencies, with each of their IT departments closing alongside them. For more than a month, the work that federal IT specialists perform on a daily basis was halted, setting in motion a series of threats to cybersecurity that persist today.</p><p>For one, the basic maintenance that each agency’s IT team performs was paused. Among the many implications, that caused more than 130 security certificates for federal sites to expire, making it easier for hackers to redirect users to a fake site modeled after one of the agency’s pages. In that case, a visitor looking to learn more about their Social Security benefits, for instance, could have been easily enticed to submit a Social Security number and other personal, sensitive data to a fake site, putting data privacy at extreme risk.</p><p>Among the other effects of the government shutdown, cybersecurity was also threatened by the lack of staff actively monitoring threats. With a digital presence as robust as the U.S. federal government, we need many pairs of eyes actively at work every day to root out potential risks. However, for 35 days, IT staff weren’t able to do that.</p><p>Now that the government is back up and running, the IT tasks that fell by the wayside during the shutdown have created a backlog that could pose its own risk to cybersecurity. With staffers focused on catching up and getting things in order that were knocked off course by the shutdown, their attention may be diverted from pressing security threats. On top of this complication is the fact that, because of the government shutdown, cybersecurity experts who work for the federal government may be among the scores of employees now questioning their future with the government. The shutdown was a major blow to the morale of the federal workforce and could impact both retention and hiring — setting off a trickle-down effect on the quality of cybersecurity departments.</p><p>Thankfully, the shutdown is in the rearview mirror — and the many ramifications of it have lawmakers and decision-makers scrambling to ensure any future shutdowns won’t have such adverse effects on the American economy and cybersecurity. Among the solutions floated is elevating the status of some IT workers to ensure they’re deemed essential personnel and can keep working to protect cybersecurity in the face of any interruptions. While the shutdown generated a wealth of lessons learned, among the most apparent is the vital need of high-quality IT professionals to protect the privacy, safety, and freedom of Americans in our digital age.</p> urn:store:1:blog:post:127 http://www.reagan.com/-conservative-search-results-blacklisted-reagancom Conservative Search Results Blacklisted | Reagan.com <p><img height="238" src="https://images.clickfunnels.com/72/75c5d08e7c11e8ad039b9320483154/iStock-941926350_medium.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" /><img /></p> <p>It’s long been known that certain browsers are the leading offenders when it comes to liberal bias — and now, with news of its practice of making conservative search results blacklisted — the evidence of its left-leaning policies has become even more apparent. Recently, a Breitbart investigation revealed that the company operates a list of “blacklisted” words and terms that, when users input them into the search engine, prompt the agency to manually regenerate the list of returned websites. The strategy has called into question the legality of such practices and caused many to question, is there a conservative search engine that would be more accurate and fair — as it’s becoming clearer by the day that many browsers are neither.</p> <p>The recent news was based on a leaked email thread directly from staffers at a certain search engine company, in which they admit that blacklisting is a common and accepted practice at the company. Queries relating to abortion seem to be at the top of the priority list when it comes to conservative search results blacklisted from the site. The documents in question came to light after an inquiry from left-leaning media outlet Slate, in which a reporter questioned a search engine's protocol for the topic of abortion, which the writer deemed to be too conservative-leaning. the search engine evidently revamped its search function to reorganize content, appearing to manually manipulate the search results to artificially rank items relating to liberal views on abortion higher than others.</p> <p>This is in direct contradiction to leadership at these respective companies claiming that their company does not “manually intervene on any search result."  The new evidence showing otherwise suggests an investigation into deceptive practices is in order, let alone the consideration of perjury charges.</p> <p>The inherent bias in action illustrates the value of a conservative search engine and a <a href="/best_email_alternative">conservative email provider</a> like those at Reagan.com. Our members are seeking a service built on trust, transparency and freedom, the principles that were at the foundation of President Ronald Reagan’s legacy — and which continue to guide our work every day.</p> urn:store:1:blog:post:126 http://www.reagan.com/how-reagans-role-in-hollywood-politics-prepared-him-for-the-white-house How Reagan’s Role in Hollywood Politics Prepared Him For the White House <p><img height="238" src="https://images.clickfunnels.com/5f/4bd10051ee11e781e665e85e133b92/Ronald-Reagan-official.png" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p>How Reagan’s Role in Hollywood Politics Prepared Him For the White House</p><p>Ronald Reagan had a rather unconventional path to the White House. Instead of being reared in elite circles that were firmly entrenched in Washington, D.C., Reagan instead entered the political sphere through Hollywood.</p><p>The eventual presidency of Reagan and Hollywood politics were interconnected, with the Great Communicator’s background as a successful actor preparing him in several ways to ascend to the Oval Office. First, Reagan’s decades of experience in front of the camera allowed him to hone in on his ability to communicate a message, a skill that became integral to his success. His reputation as an outstanding communicator—especially as the country became ever-more reliant on television—served him well as he went head to head in debates with great political minds of the time and, ultimately, when he became president and was tasked with speaking to and connecting with the diverse melting pot that is America.</p><p>He also got his feet wet in political organizing in Hollywood. In 1937, as his acting career took off, Reagan joined the Screen Actors Guild, the fledgling union for Hollywood actors. Within four years, he was elected to SAG’s board, later became its vice president and, in 1947, was chosen as the organization’s president. In this role, he quickly went to work advocating on behalf of working actors, who were seeking better regulations for residuals payments. He even organized an industry-wide strike to press for this issue, the first ever in Hollywood, which also resulted in SAG members being eligible for health insurance and a pension.</p><p>Through Hollywood, Reagan was introduced to politically active circles of actors and other influencers, propelling his political career forward. The leadership, dedication, and savvy that resulted when Reagan and Hollywood politics collided were a precursor to his later presidency. Once he was elected, Reagan again quickly set to work negotiating for fairness and equality—whether for a right-sided federal budget or on international affairs like the Iran hostage situation, bringing with him the same skill set that made him so successful in Hollywood politics.</p> urn:store:1:blog:post:125 http://www.reagan.com/protecting-your-privacy-on-social-media-reagancom Protecting Your Privacy On Social Media | Reagan.com <p><img height="238" src="https://images.clickfunnels.com/b6/76fbe12a1d11e9b750ad5b47f72fd3/iStock-869149488_super.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p>Sites like Facebook and Twitter have become the major social currency of our digital age, connecting billions of people around the world. Social media plays an unprecedented role in our society, one that even five years ago few people would have believed. Whether users tap into social media for entertainment, for news, for jobs or a combination of all of the above, it has become ingrained into the fabric of our global communication.</p><p>With a web that large and complex, however, come concerns about social media privacy issues. Is that message you’re shooting to a college on the other side of the world only being seen by that person? Are the operators of Instagram tracking and recording your activities to target you for paid advertising? How widely is your profile information available—to prospective employers and people you’d rather not connect with? These social media privacy issues have also risen to prominence as social media itself has flourished.</p><p>There is no clear answer to any of these or the countless other questions concerning social media privacy issues. However, <a href="http://www.pewresearch.org/fact-tank/2018/03/27/americans-complicated-feelings-about-social-media-in-an-era-of-privacy-concerns/" target="_blank">research has shown</a> that 60 percent of social media users want to better protect themselves on such sites, and there are some simple steps social media users can take to maximize their digital privacy.</p><p>You wouldn’t advertise your full name, address or phone number in the newspaper, so don’t advertise in on modern platforms like Facebook. Users do not need to use their full name so pick a moniker that doesn’t identify you completely, and leave profile boxes that ask for your address, phone number or other personal information blank. Similarly, select a standard photo, not one of yourself, for your profile. Only connect with “friends” you personally know; even be careful if you know the person’s name, as hackers often create fake accounts that copy a real “friend’s” photo and information.</p><p>Be careful about what you post, understanding that, once it’s on a social media site—even if you later delete it—there will always be a record of your post. Similarly, turn off your phone’s GPS if you’re posting from a mobile device, as your location may be inadvertently shared when you post on social media without taking that step. Do an overall sweep of your privacy settings as well, ensuring only the people with whom you are connected can access your profiles. As with all online accounts, select complex passwords that cannot be easily guessed and change them frequently.</p><p>Social media is a given fact in today’s society—but social media privacy issues don’t have to be part of that reality.</p> urn:store:1:blog:post:124 http://www.reagan.com/ronald-reagan-and-religious-freedom-reagancom-1 Ronald Reagan and Religious Freedom | Reagan.com <p><img height="238" src="https://images.clickfunnels.com/ea/3739601e7711e98551cdd94481350b/1stam.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p>Reagan and Freedom of Religion</p><p></p><p>The views of Ronald Reagan on religious freedom illustrate how the concept of liberty was present in all of corners of his presidency. Like all other areas, Reagan believed that Americans should have the ability to exercise the principles of their faith, and that the government can’t be in a position to dictate what those principles should be.</p><p>Reagan was brought up in the Disciples of Christ faith, and learned how to respect those of differing religions from an early age, especially since his mother came from a Catholic upbringing. That respect for diversity followed through Reagan’s political career and into the White House; he believed that Americans had an inherent right to practice their individual faith, but also that no citizen, community or government should try to oppress that ability. He was a pro-life advocate, a champion of prayer in school and even declared 1983 the Year of the Bible. Reagan spoke frequently to Christian associations and encouraged them to continue to live their faith.</p><p>The strength of Ronald Reagan on religious freedom was that he didn’t just look at the topic in tunnel vision, but rather connected it to other intertwined issues. For instance, he knew that religious freedom was being threatened by Communist Russia. At the time, many of those who were being victimized by Communist pressure weren’t just having their political or even financial freedoms put at risk, but also were losing their religious freedom.</p><p>He spoke directly to those who were threatening religious freedom: “You may jail your believers. You may close their churches, confiscate their Bibles and harass their rabbis and priests, but you will never destroy the love of God and freedom that burns in their hearts. They will triumph over you.”</p><p>Reagan’s stances on religious freedom were both foundational and timely. While he was firmly committed to the concept of individual expressions of faith, he was able to effectively illustrate how challenges to such freedom were tied to other challenges of the times—Communism, liberalism and other movements that de-emphasized the value of religion—bolstering support from followers on the entire range of issues.</p> urn:store:1:blog:post:123 http://www.reagan.com/restricting-free-speech-on-college-campuses-reagancom Restricting Free Speech on College Campuses | Reagan.com <p><img src="https://images.clickfunnels.com/7f/33b9a0699511e8b6cf49c5b8f65a71/iStock-178485797_small.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="238" /><img /></p> <p>College campuses have long been considered beacons of the free exchange of ideas. Universities have served as the backdrops of famous protests and riots, particularly in the 1960s, and have been the sites for the birth of countless movements, ideas, and developments that have shaped our country in the last half-century. However, while colleges are considered safe havens for free thinkers, that rule has often been applied more so to liberal thinking, with increasing efforts at restricting free speech on college campuses that runs counter to more left-leaning ideals.  </p> <p>In our highly politicized world, college campuses have come front and center in the fight over free speech. In recent months, conservative commentator Ben Shapiro’s speech at Berkeley led to a sharp uprising from students, as did author Charles Murrary’s address at Middlebury College. Such incidents, and many others, have led to security issues and campus tensions that continued long after the respects events wrapped up. The dustups that have followed so many conservative speakers onto college campuses have doubtlessly caused many other right-leaning speakers to think twice about visiting a college campus.</p> <p>Restricting free speech on college campuses isn’t an issue that only affects young adults. In just a few short years, these students will be out in the working world, where they will need to be equipped with the skills to find common ground with those with whom they have differing views. Without that ability, future workplaces and other organizations will be laden with conflict. Restricting free speech on college campuses is giving students a false sense of reality, as they will surely encounter—and need to work alongside—those whose political or personal views are in opposition to their own.</p> <p>As long as messages are free of violence or hate speech, restricting free speech on college campuses provides a disservice to young people, as well as to future students and members of the public—who all deserve to benefit from the rewards of free thinking. In order for college campuses to truly live up to their missions as places where young people can grow and learn from and with one another, that circle needs to include people of all views. At Reagan.com, we are committed to promoting free speech among individuals of all ages, including college students. We created a <a href="https://www.reagan.com/private_email_service">private email service with conservative values</a> to protect privacy, free speech, and other individual freedoms. Spread the message of protecting free speech and create your own email today.</p> urn:store:1:blog:post:121 http://www.reagan.com/ronald-reagan-cold-war-policies-reagan-and-russia Ronald Reagan Cold War Policies | Reagan and Russia <p><img height="238" src="https://images.clickfunnels.com/5f/4bd10051ee11e781e665e85e133b92/Ronald-Reagan-official.png" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>Reagan and the Cold War</strong></p><p>The ongoing questions over Russian election meddling have placed the country in the American public consciousness on a level not seen since the Cold War. At that time, Americans looked to the president for strong leadership and defense—promises on which Ronald Reagan delivered.</p><p>The Ronald Reagan Cold War policies came to define his presidency, future foreign policy and the country’s international standing. Reagan escalated the Cold War with the goal of putting pressure on the Soviet Union and rooting out the detriments of Communism. He significantly increased American spending on defense, such as through missile development and the Strategic Defense Initiative, a proposed missile defense initiative that put the country in a better bargaining position with the Soviets.</p><p>However, it wasn’t all about defense. The Ronald Reagan Cold War policies also included a fair amount of international mobilization. Under Reagan’s direction, the United States built teams of anti-Communist forces throughout the world, particularly in Soviet-occupied lands. The Reagan Doctrine, as that approach came to be called, was centered on the idea that those directly impacted by the perils of Communism should be empowered to actively take a stand against it. And with the American resources he had at his disposal, Reagan made that idea a reality.</p><p>Throughout his presidency, Reagan took a hard line in his rhetoric toward the Soviet Union, going far beyond any previous presidents in vocalizing his opposition to the regime, and his commitment to breaking it down. When Mikhail Gorbachev came to power halfway through Reagan’s tenure, he somewhat reframed his approach to introduce more negotiation and advised the leader on reforms yet remained a stalwart supporter of rooting out Communism. Against a backdrop of the Berlin Wall in 1987, Reagan delivered a few of his most iconic lines: “General Secretary Gorbachev, if you seek peace, if you seek prosperity for the Soviet Union and Eastern Europe, if you seek liberalization: Come here to this gate! Mr. Gorbachev, open this gate! Mr. Gorbachev, tear down this wall!”</p><p>A few short years later, that’s exactly what happened.</p> urn:store:1:blog:post:120 http://www.reagan.com/best-practices-for-elderly-cybersecurity-reagancom Best Practices for Elderly Cybersecurity | Reagan.com <p><img height="238" src="https://images.clickfunnels.com/51/ee09d1fd6c11e8bf5a8bc63e985eba/iStock-479801118_super.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p>Cybersecurity Best Practices for the ElderlyKW: Elderly Cybersecurity</p><p>From email to IP addresses and everything in between, there are so many factors involved in protecting one’s digital footprint that keeping up with the latest cybersecurity tips and trends can seem like a full-time job. Cybersecurity is a complex issue for anyone to understand—even tech-savvy professionals who work every day in digital realms may struggle to ensure they’re protecting their online presence. And for those without a strong background in technology, cybersecurity can especially seem like a never-ending maze.</p><p>While many older Americans are well-versed on the ins and outs of the Internet, the reality is that today’s seniors grew up and spent most of their working lives in a time when digital didn’t power all facets of society, as it does today. So for the elderly, cybersecurity can be especially challenging to keep on top of—but it’s imperative that they do, as seniors can be a prime target for hackers and others with malicious intent.</p><p>Here are a few quick tips to enhance elderly cybersecurity:</p><p><strong>Treat your email like your postal mail.</strong></p><p>&nbsp;We don’t open every piece of mail we get, recognizing that much of it may be “junk” or solicitations. The same holds true for email. Only open messages from senders you know.</p><p><strong>Use a secure email provider. </strong></p><p>Private <a href="/t/paid_email_service">paid email services</a> prioritize users’ privacy, offering enhanced security features to ensure their safety.</p><p><strong>Be smart about social.</strong></p><p>&nbsp;Don’t share your location or other identifying or personal information in any social media posts.</p><p><strong>Choose strong passwords. </strong></p><p>Be creative when it comes to passwords, and change them often. Make sure they’re long and are free of any information, such as birth dates or addresses, that can be easily figured out.</p><p><strong>Use secure networks. </strong></p><p>Only connect to the internet on your home, password-protected network. Using public and unsecured networks can open up your devices, and all of your information, to prying eyes.</p> urn:store:1:blog:post:119 http://www.reagan.com/ronald-reagans-thanksgiving-day-messages-reagancom Ronald Reagan’s Thanksgiving Day Messages | Reagan.com <p><img height="238" src="https://images.clickfunnels.com/b3/67b791ec3911e89073fd72bea097be/ronald-and-nancy-reagan-and-the-presidents-daughter-maureen-reagan-enjoying-thanksgiving-at-their-santa-barbara-california-home-rancho-del-cielo-1985-1024x666.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p>Ronald Reagan's Thanksgiving Day Messages</p><p>Thanksgiving is a time for expressing gratitude for family, friends, and good fortune. It is also an opportunity to reflect on the founding of our nation, the principles and ideals it stands for and the ongoing need for citizens to give back to community and country to uphold that vision. Often, however, the true meaning of the day can get lost in the chaos and commercialization of the holiday season, prompting a need to redirect Americans’ attention back to the cause of all the celebrations.</p><p>That’s what President Ronald Reagan did in a series of proclamations on Thanksgiving Day during each year of his presidency, urging Americans to remember the spirit of the holiday throughout the year. He used the opportunity to comment on issues affecting the country and to mobilize citizens to join forces to affect positive change. These Ronald Reagan Thanksgiving quotes may have a particular relevance to the time period in which they were delivered, but can also be applied in a modern context, as our country continues to struggle to embrace the meaning of Thanksgiving, both on the holiday and year-round.</p><p>Here is a sampling of some of the most iconic Ronald Reagan Thanksgiving quotes:</p><p><em>“Americans have always understood that, truly, one must give in order to receive. This should be a day of giving as well as a day of thanks.”</em></p><p>&nbsp;(1981)</p><p><em>“Although we are a pluralistic society, the giving of thanks can be a true bond of unity among our people. We can unite in gratitude for our individual freedoms and individual faiths. We can be united in gratitude for our nation’s peace and prosperity when so many in this world have neither.”</em></p><p>&nbsp;(1983)</p><p><em>“Today let us take heart from the noble example of our first president. And let us ever be mindful of the faith and spiritual values that have made our nation great and that alone can keep us great.”</em></p><p>&nbsp;(1986)</p><p><em>“In this year, when we as a people enjoy the fruits of economic growth and international cooperation, let us take time both to remember the sacrifices that have made this harvest possible and the needs of those who do not fully partake of its benefits.”</em></p><p>&nbsp;(1988)</p> urn:store:1:blog:post:118 http://www.reagan.com/presidential-election-1980-ronald-reagans-election-reagancom Presidential Election 1980 | Ronald Reagan’s Election | Reagan.com <p><img height="238" src="https://images.clickfunnels.com/5f/4bd10051ee11e781e665e85e133b92/Ronald-Reagan-official.png" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p>Ronald Reagan’s Victory in the Presidential Election of 1980</p><p>It is, once again, election season, as politicians from both sides of the aisle go head to head on the airwaves, the debate floor and, ultimately, in the voting booth. This has been a highly anticipated election season, with control of Congress at stake, and with results that are expected to set the tone and direction of the 2020 presidential election.</p><p>&nbsp;The history-making nature of this season harkens back to the presidential election of 1980 when Ronald Reagan secured a victory and set the course of the country for decades to come. Reagan, the former governor of California, ran against Democratic incumbent Jimmy Carter and Independent John B. Anderson. It was a hotly contentious race, one that highlighted the serious issues affecting the country at the time, such as inflation, high unemployment, the threat of Communism, and other ongoing international issues. Reagan focused his campaign in the months leading up to the presidential election 1980 on the country’s economic state, pledging to cut tax rates, create jobs, eliminate wasteful spending and increase government spending. While Carter ran a campaign focused on personal attacks against Reagan and decidedly pessimistic views on the state of the country, Reagan took the opposite approach, projecting an optimistic outlook about where the nation was headed.</p><p>Reagan’s strategy paid off, as he easily bested the other candidates, capturing nearly 44 million votes, 8 million more than Carter, as well as 489 electoral-college votes compared to Carter’s 49. Carter’s loss represented the worst defeat by an incumbent presidential candidate in more than 50 years and marked a turning point in Republican politics. Reagan wasn’t the only one who was ushered into power that night: Republicans picked up 12 Senate seats, as voters flocked to the polls to support Reagan. The Senate flipped to Republican control, the first time in nearly 30 years that Republicans took control of either Congressional chamber.</p><p>The presidential election of 1980 marked a significant turning point for the Republican Party, setting the stage for the Reagan Revolution—and decades of American politics since, leading right up to this month’s election.</p> urn:store:1:blog:post:117 http://www.reagan.com/celebrity-conservative-supporters-politics-and-hollywood Celebrity Conservative Supporters | Politics and Hollywood <p><img height="238" src="https://images.clickfunnels.com/ed/fbd360dc4811e897bef520e363858b/kanye-west-e1524872897442.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>Trump, Kanye West and Celebrity Political Support&nbsp;&nbsp; </strong></p><p>While the worlds of politics and Hollywood have been increasingly colliding, celebrity conservative supporters aren’t as outspoken as left-leaning celebs—but with each media figure who opens up about his or her views, that may start to shift.</p><p>In recent months, rapper Kanye West has been one of the most visible celebrity conservative supporters, backing right-leaning causes and political figures, including President Donald Trump. West has been a longtime supporter of the president and met with the then-candidate at Trump Tower in 2016 when Trump was on the campaign trail. After he took office, West has continued to advocate for the president as well as conservative candidates and commentators, views that generated some sharp backlash on social media from his fans and fellow celebrities, such as John Legend. However, unlike the modern trend of backing down under threat of pushback on social media, West reaffirmed his positions.</p><p>That commitment could encourage other celebrity conservative supporters to follow suit. That’s the position recently taken by Fox News analyst Gianno Caldwell, who said the rapper’s stance could even initiate <a href="http://insider.foxnews.com/2018/04/28/kanye-west-support-donald-trump-could-lead-competition-among-celebrities">“competition” among other celebrity conservative supporters</a>. West may have lost the support of more left-leaning fans because of his political views, but he also certainly picked up a wealth of new conservative supporters, as well as gained respect from moderates for his refusal to back down. The musician’s ongoing success may serve as a catalyst for other celebrities to open up about their own political views. The world of politics is no longer one that functions in a bubble, but rather it touches all facets of American society, including Hollywood. It’s only natural that celebrity conservative supporters should have the same comfort level with discussing and debating current topics as their liberal counterparts do. And with today’s world of viral videos, soundbites on repeat and Tweets being shared thousands of times, celebrities may even find a bump in their success when they start taking a stand.</p> urn:store:1:blog:post:115 http://www.reagan.com/how-to-protect-yourself-from-phishing-scams-private-email How to Protect Yourself from Phishing Scams | Private Email <p><img height="238" src="https://images.clickfunnels.com/83/8db080cc9311e882e2f38a0c30517d/iStock-172166270_medium.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" /><img /></p> <p><strong>How Reagan's Administration Fought Scammers—and How you can Protect Yourself from Phishing Scams</strong></p> <p>While they have considerably changed in scope and reach, scams have been an unnecessary reality in American society for as long as anyone can remember. From fraud impacting the government to individual attacks against private citizens, scams have resulted in widespread financial loss, and put public faith in organizations, including the government, at risk.</p> <p>When Ronald Reagan was in office, he made fighting scammers a top priority. This goal was in keeping with his overarching mission of cutting waste, right-siding the financial health of the government and encouraging accountability. Reagan incorporated this aim into all of his major programs and policies, such as his tax reform efforts, which closed loopholes and penalized tax dodgers.</p> <p>The president also instated the Council on Integrity and Efficiency to root out any wasteful or illegal actions taken by federal employees or those scamming the federal government. He set up a hotline for individuals to report scams and promised confidentiality and protections against retaliation. "We are going to follow every lead, root out every incompetent, and prosecute any crook we find who's cheating the people of this nation,” he pledged in 1981.</p> <p>That same zero-tolerance attitude is still needed to fight today’s scams; however, the form such fraud takes today is decidedly different, as it’s most often conducted online, primarily through email. For example, phishing—in which <a href="/phishing">scams disguise an email</a> as having come from a legitimate source to solicit users’ personal data—have become all-too-common. So how can you protect yourself from phishing scams?</p> <p>Using a private, <a href="/private_email_service">conservative email service</a> is one of the best ways. Phishing scams can easily sneak into public email accounts, which have few security restrictions. Instead, a private email service offers built-in security measures, such as end-to-end encryption that ensure only valid, non-automated emails make it to the user’s inbox. As digital fraud becomes more and more sophisticated, it becomes even more difficult to protect yourself from phishing scams, but common-sense approaches like a private email service are the first lines of defense.</p> urn:store:1:blog:post:114 http://www.reagan.com/healthcare-email-under-president-ronald-reagan Healthcare & Email under President Ronald Reagan <p><img height="238" src="https://images.clickfunnels.com/d9/3018b1c66311e884cc1d9c41a567e7/iStock-617394450_super.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>Healthcare under Reagan</strong></p><p>The future of healthcare in America has been one of the most contentious debates in recent years, but the discussion is nothing new to American politics. Healthcare under President Reagan was a hot topic even then, and the changes that have—and haven’t—happened since then illustrate the evolving, and complex, nature of the topic.</p><p>Reagan took the viewpoint that less government intervention in Americans’ healthcare was needed. He reduced funding for a number of federal health and welfare programs, actions designed to not only cut excessive spending but to enable Americans to have more control over their own wellbeing. Instead, he contended that the country should invest in jobs and empower Americans to take the lead on their own healthcare. The view of healthcare under President Reagan was essentially that health is a private endeavor, and not one that should be regulated by the government.</p><p>The privacy aspect of healthcare is now one that’s tied to the Health Insurance Portability and Accountability Act. The law dictates how health information can be shared by providers and others; while most Americans likely understand the basics of the law, as technology evolves, we also need to shift our awareness of its impact of HIPAA.</p><p>For emails to be fully compliant with HIPAA, it’s important to use encrypted email providers. Such services add an extra level of protection that ensures only the sender and receiver see the information contained within the email. That’s a basic tenet of HIPAA: that healthcare communications should be solely restricted to the patient and his or her physician or other provider. Unsecured emails, whether in a professional or personal setting, can put users at risk for violation of HIPAA; if such messages were intercepted—either maliciously or even unintentionally—it could open the user up to liability.</p><p>Encrypted email providers support Reagan’s goal for American health to be a private, personal experience.</p> urn:store:1:blog:post:113 http://www.reagan.com/protecting-personal-information-email-privacy Protecting Personal Information & Email Privacy <p><img height="238" src="https://images.clickfunnels.com/b9/eb3a706e7511e89c95bfb0e1d6f595/iStock-519735146_high.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" /><img /></p> <h3>Keeping Your Personal Information Away from Big Corporations</h3> <p>Protecting personal information is one of the primary concerns of many Internet users, especially as scams and data breaches continue to plague the country. However, there is no easy fix to the issue, as threats to Internet security and email privacy become more and more sophisticated.</p> <p>Complicating matters is the idea that private citizens not only have to think about protecting personal information from hackers but also from seemingly less threatening sources, such as big corporations. Whereas in the past, the mailboxes outside of our homes may have been bombarded with circulars, postcards and more aiming to sell products and services, those messages have since gone digital. Online marketing is a huge business for most large corporations, but repeated and unwanted email messages are yet another cause for headaches. Likewise, corporate use of private email addresses is rarely regulated, meaning if a corporation has your address, you have little control over what it does with it, which makes protecting personal information a major obstacle.</p> <h3>How to Keep Your Information Safe from Corporate Interference:</h3> <p>1.<span style="white-space: pre;"> </span><a href="https://www.reagan.com/bestprivateemailservice">Use private email</a>: Email privacy is best protected when the user relies on a private service. This allows for end-to-end encryption, better safeguards, in-house data storage and tight restrictions on the use of your email address</p> <p><span style="font-size: 0.75em;"></span>2.<span style="white-space: pre;"> </span>Avoid retail sign-ups: It may be tempting to enter your email address to score extra coupons or for certain deals, but once you release that information, you may be bombarded by messages from the retailer and an untold number of other sources.</p> <p><span style="font-size: 0.75em;"></span>3.<span style="white-space: pre;"> </span>Don’t shop online: Reduce your digital footprint by shopping in store instead of online, where most companies require your email address, putting email privacy at risk.</p> <p><span style="font-size: 0.75em;"></span>4.<span style="white-space: pre;"> </span>Read the fine print: If you do provide your email to a corporation, make sure to read privacy policies and any other fine print that could regulate how your address is used. If you click OK without actually reading through the policies, you could be at a loss if you ever want to challenge how the company used your email address.</p> urn:store:1:blog:post:112 http://www.reagan.com/ronald-reagan-reaganomics Ronald Reagan Reaganomics <p><img height="238" src="https://images.clickfunnels.com/5f/4bd10051ee11e781e665e85e133b92/Ronald-Reagan-official.png" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p>Reagan and His Four Pillars of Reaganomics&nbsp;</p><p>Like any sturdy building, the Ronald Reagan Reaganomics plan was built on four strong pillars. These goals served as the cornerstones for the policies and programs put in place during Reagan’s time in office, and as a guidebook for future generations looking to emulate the success of the economic approach.</p><p>The revolutionary nature of Ronald Reagan Reaganomics has been heralded for decades. <a href="http://www.econlib.org/library/Enc1/Reaganomics.html">The Heritage Foundation</a> called the plan the “most serious attempt to change the course of U.S. economic policy of any administration since the New Deal.” To fully appreciate just how much the strategy affected the country, it’s important to first dive into those four pillars upon which Ronald Reagan Reaganomics was built:</p><p><strong style="font-size:0.75em;"><span style="font-size:small;">1.</span><span style="white-space:pre;"> </span><span style="font-size:small;">Reduce government spending:</span></strong><span style="font-size:small;"> Reagan was able to reduce federal spending from 4 percent during the Carter administration to 2.5 percent by the time he left office. He did so by cutting wasteful spending and government overreach that enabled him to reduce overall spending while still increasing vital defense budgets.</span></p><p><span style="font-size:0.75em;"></span><strong style="font-size:0.75em;"><span style="font-size:small;">2.</span><span style="white-space:pre;"> </span><span style="font-size:small;">Reduce tax rates:</span></strong><span style="font-size:small;"> This aim was among the most substantial changes ushered in by Ronald Reagan Reaganomics. According to the </span><a href="http://www.econlib.org/library/Enc1/Reaganomics.html" style="font-size:0.75em;"><span style="font-size:small;">Library of Economics and Liberty</span></a><span style="font-size:small;">, Reagan reduced the individual tax rate for the top margins from 70 percent to 28 percent and the corporate rate from 48 percent to 24 percent.</span></p><p><span style="font-size:0.75em;"></span><strong style="font-size:0.75em;"><span style="font-size:small;">3.</span><span style="white-space:pre;"> </span><span style="font-size:small;">Reduce regulation:</span></strong><span style="font-size:small;"> In an effort to reallocate spending and ensure individual rights weren’t being trampled by government influence, Reagan reduced federal regulations in a range of industries, including telecommunications, transportation and banking.</span></p><p><span style="font-size:0.75em;"></span><strong style="font-size:0.75em;"><span style="font-size:small;">4.</span><span style="white-space:pre;"> </span><span style="font-size:small;">Reduce inflation:</span></strong><span style="font-size:small;"> During Reagan’s tenure, the inflation rate decreased significantly, from 10.4 percent in 1980 to 4.2 percent eight years later.</span></p><p>The trickle-down mission at the heart of Ronald Reagan Reaganomics has again been in the news in recent months as the current administration seemingly adopts some aspects of Reagan’s successful economic plans into its own strategies. These four pillars can serve as a roadmap for modern and future political leaders looking to bring economic revitalization back to the country.</p> urn:store:1:blog:post:111 http://www.reagan.com/mccain-ronald-reagan-speech McCain Ronald Reagan Speech <p><img height="238" src="https://images.clickfunnels.com/98/0dee21b2b311e8b55ce72690b543d8/220px-John_McCain_official_portrait_2009.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p>John McCain Addresses the Reagan Forum&nbsp;</p><p>About 20 years ago, Sen. John McCain <a href="https://www.mccain.senate.gov/public/index.cfm/speeches?ID=17AF5A57-4C70-426D-9C1A-2A7A70EF50DB">delivered an address</a> at the Ronald Reagan Presidential Foundation's Reagan Forum that embodied both his and Reagan’s views on the future of the country—lessons that are just as applicable today as they were two decades ago.</p><p>The iconic McCain Ronald Reagan speech centered on the lessons the senator drew from Reagan’s leadership, including throughout the Vietnam War, during which McCain was a prisoner of war. Even when he and his comrades were locked away and tortured, McCain said, they took heart in the news that Reagan, then governor of California, and his wife were fighting for them. The spirit behind that work, he said, was Reagan’s unwavering faith in the promise of the country, an idea that was especially needed at the time, as America was struggling with vast social and economic upheaval.</p><p>“The great, robust, missionary democracy that had given its name to the century was perceived to be exhausted. Ronald Reagan believed differently,” McCain said in his Ronald Reagan speech. Reagan countered the cynicism abounding in the country by envisioning a future based on the four pillars that later defined his presidency: preserving individual liberty, promoting economic opportunity, advancing democracy to those struggling with tyranny and spreading pride in our national heritage. The first three, McCain said, can largely be credited for turning the country around and bringing about the widespread social peace and economic prosperity the country was seeing at the time of his speech in the late 1990s. However, that fourth pillar, McCain said, remained a bit elusive.</p><p>“I worry that we do not see, as clearly as we once saw, that we are a part of a great experiment,” he said about America, which he noted is a country “that is forever becoming something.” These ideas are especially salient today, when we’re at a time many have compared to the upheaval of the 1960s. The McCain Ronald Reagan speech predicted that the best antidote to that disarray is a better investment in civic life—voting, running for office, supporting the military—driven by a belief in the strength of the country and its future.</p><p>As McCain said: “The power of faith in our heritage is overwhelming, and it is, as Ronald Reagan knew, the greatest strength of American life.”</p> urn:store:1:blog:post:110 http://www.reagan.com/labor-day-reflections Labor Day Reflections <p><img height="238" src="https://images.clickfunnels.com/a1/8d4100b06311e893ae33cb825e9b93/IMG-8219.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p>Labor Day</p><p>Most Americans celebrate Labor Day as the unofficial close of summer—a time to get together with family and friends, enjoying the sunshine and day off work with some barbecue and outdoor activities. However, the occasion was founded to honor the contributions American workers have made to our society—an idea that was embodied in the Ronald Reagan Labor Day remarks of 1980, which may be eye-opening for most Americans to revisit.</p><p>Reagan delivered the iconic speech while on the campaign trail, and, appropriately, in front of the Statue of Liberty. Given the date, the future president centered his remarks on the wide-ranging impact that American laborers, in all industries, had on the country’s unparalleled success. Reagan contended that the backbone of the country was the work invested by the men and women who envisioned and sought to attain the great “American Dream.” Interestingly enough, the Ronald Reagan Labor Day remarks weren’t just focused on the pivotal role of American workers in general, but rather the involvement of foreign-born workers in that effort.</p><p>Reagan said that the prosperity of America was built on the shoulders of citizens from around the world, who all agreed that hard work and dedication would help them and the country—an idea that was emphasized by the Statue of Liberty and Ellis Island as the backdrop. "These families came here to work," he said. "They came to build. Others came to America in different ways, from other lands, under different and often harrowing conditions, but this place symbolizes what they all managed to build, no matter where they came from or how they came or how much they suffered."</p><p>Looked at through the lens of today’s politics, the Ronald Reagan Labor Day speech takes on even more meaning. The debate over immigration wages on, causing divides even in the Republican Party, with Reagan’s address illustrating how the party has evolved over the last few decades. While some politicos today have cast doubt on the value of immigration, Reagan instead emphasized that hardworking Americans come from all backgrounds, a decidedly different message from the modern climate. As Labor Day celebrations commence, it may do the country some good to take a break from their parties to ponder the spirit behind Reagan’s words.</p> urn:store:1:blog:post:109 http://www.reagan.com/ronald-reagan-freedom-speech Ronald Reagan Freedom Speech <p><img height="238" src="https://images.clickfunnels.com/cd/548a90998511e8952b0f07663663dc/american-flag-flag-flower-1093645-_1_.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>“Freedom is never more than one generation from extinction”</strong></p><p>President Ronald Reagan delivered hundreds of addresses before, during and after he was in the Oval Office. While each had its own audience and intent, a common theme was threaded throughout many of them: the need for—and value of—Americans’ constitutional liberties.</p><p>Of all of his remarks, the Reagan Freedom Speech is perhaps his most iconic, as it not only shed light on the precarious nature of freedom but served as inspiration for generations to come. He delivered the famous address on Oct. 27, 1964, years before he would become president, at the Republican National Convention. It would go on to catapult him to political fame, paving the way for his path to the White House, and to lay the foundation for his eventual presidential platform. However, the Reagan Freedom Speech wasn’t political pandering or an attempt to seek party favor—the ideas and ideals he espoused were ever-present throughout his time in public office and after.</p><p>This is the crux of the Reagan Freedom Speech, also known as “A Time for Choosing”:</p><p><em>“Freedom is never more than one generation away from extinction. We didn’t pass it to our children in the bloodstream. It must be fought for, protected and handed on for them to do the same, or one day we will spend our sunset years telling our children and our children’s children what it was once like in the United States where men were free.”</em></p><p>Reagan delivered the address while the country was grappling with the threat of Communism and other foreign adversaries, all while civil rights and other domestic issues were taking center stage at home. With his Freedom Speech, Reagan sought to unify the American people around the shared common goal of pursuing freedom, which he emphasized wasn’t a guarantee. He aimed to motivate listeners out of complacency, to inspire them to keep fighting for the freedom that he knew could be at risk if they weren’t vigilant. That idea has survived for generations and serves as a clarion call to not lose sight of the value of freedom—and the risks of it dissipating from American society.</p> urn:store:1:blog:post:108 http://www.reagan.com/social-media-censorship-tech-industry-crackdown Social Media Censorship | Tech Industry Crackdown <p><img height="238" src="https://images.clickfunnels.com/4e/c1aa91ab9211e8821a7d4361a3687b/iStock-495691804_super.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>Tech Industry Crackdown After Charlottesville</strong></p><p>While the topic of social media censorship has been in the news lately, thanks to increased public attention on the privacy practices of Facebook, another aspect showing the complex issues involved with digital privacy started gaining momentum last year after an attack by far-right extremists. The rise of white nationalists in recent years has gone hand in hand with the nation’s increasing reliance on digital and social media, with troubling results that paint an unclear picture of the future of Internet privacy.</p><p>The issue came to a head last summer with a white nationalist rally in Charlottesville, Va., which resulted in the death of a counter-protestor. The rally was largely organized online, and, in light of the tragedy that ensued, many tech companies began reexamining their policies toward hate speech. Following the Charlottesville incident, <a href="http://www.businessinsider.com/tech-companies-crack-down-hate-speech-charlottesville-2017-8?r=UK&IR=T">nearly a dozen</a> big-name tech companies revamped their approaches to how they work with users who promote extreme hate speech. For instance, both Google and GoDaddy severed ties with a white nationalist group that sought their hosting services. Music-streaming company Spotify ejected bands promoting violence from their platform, while GoFundMe shut down a fundraiser for the man accused of killing the counter-protestor. Both PayPal and Apple Pay also cut off white nationalist groups from using their sites to support funding. Facebook banned accounts of individual users who participated in the rally, while Twitter took a broader approach by banning certain groups; they came under fire by those claiming they practiced social media censorship, but both stood by the policies.</p><p>The changes that were ushered in by the Charlottesville incident reflect a new phase of the digital privacy debate. In the past, tech companies were largely hesitant to take a hardline approach to hate speech, so as not to be accused of restricting free speech or social media censorship; however, in the wake of the deadly rally, being accused of supporting extremist groups seems to be the worse option.</p> urn:store:1:blog:post:106 http://www.reagan.com/does-googles-email-tracking-users-locations-email-privacy Does a Public Email Track User's Locations? | Email Privacy <p><img height="238" src="https://images.clickfunnels.com/01/a8b790a63211e88d0d2306026596d2/security-1202344_640.png" style="display: block; margin-left: auto; margin-right: auto;" width="357" /><img /></p> <p><strong>Privacy and User Tracking</strong></p> <p>Privacy has long been at the center of debate around search engine's user tracking, and new research sheds light on just how extensive—and intrusive—the practice is.</p> <p>A recent <a href="https://www.apnews.com/828aefab64d4411bac257a07c1af0ecb/AP-Exclusive:-Google-tracks-your-movements,-like-it-or-not">AP report</a> knocked down the common myth that turning off Location History while browsing the Internet will protect users’ location from being tracked. Even with that feature disabled, search engines continue to track locations through their map application or certain weather apps, as well as even simple searches that have nothing to do with location. The practice affects both iPhone and certain Android users and is estimated to be impacting a staggering 2 billion people.</p> <p>While there are ways to make your browsing more secure—such as through modifying your Web &amp; App Activity settings on your search engine account—that users should even have to jump through these added hoops is setting off lots of red flags for privacy experts. In an interview with <a href="https://www.wired.com/story/google-location-tracking-turn-off/">Wired</a>, Electronic Privacy Information Center senior counsel Alan Butler said a long-held assertion that disabling Location History will do the trick—when in fact, it won’t—“seems like textbook deception.”</p> <p>Internet users are guaranteed a level of protection against deceptive privacy practices through a series of consumer-protection statutes overseen by the Federal Trade Commission, which EPIC has since urged to investigate several search engines,  in light of the recent news. The idea that these company's tracking practices are deceptive gained even more steam after the AP report, when the company's edited the description on their website for how it treats Location History to note that some locations may still be saved and stored; previously, the description stated that “with Location History off, the places you go are no longer stored.” That this was not made clear to users before the recent negative press suggests active deception, a violation of the FTC statutes as well as a 2011 settlement with EPIC. In that agreement, one of the companies stipulated that it would not misrepresent how it collects user information, nor how users can control the collection of their data.</p> <p>The practice may also be in direct violation of basic constitutional rights. While case law is still developing around digital-privacy issues, the U.S. Supreme Court has interpreted the First, Third, Fourth and Fifth amendments to the U.S. Constitution to grant privacy protections, with arguments that many suggest can be interpreted as extending to modern issues like digital privacy. The right to privacy is even more explicit in many state constitutions and statutes; in light of the scandal, a California man is taking a stand with a federal lawsuit that contends the tracking practice violates his state constitutional rights.</p> <p>With social media tech giants increasingly coming under scrutiny for how they collect and store information about users, the revelation about these tracking practices shouldn’t come as a surprise. However, it should be cause for concern and action among those who value privacy, especially when it comes to email. Using a private, <a href="/best_email_alternative">conservative email provider</a> could make a difference when it comes to keeping your personal information safe.</p> urn:store:1:blog:post:105 http://www.reagan.com/ronald-reagan-on-big-government-most-terrifying-words Ronald Reagan on Big Government | Most Terrifying Words <p><img height="238" src="https://images.clickfunnels.com/11/46b1a1a24c11e89dff67367bce1ee4/uscapital.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>Ronald Reagan Thought These Were the Most Terrifying Words</strong></p><p>Anyone curious about the views of Ronald Reagan on big government can consider what he thought were the nine most terrifying words in the English language: “I’m from the government, and I’m here to help.” Reagan <a href="https://www.youtube.com/watch?v=xhYJS80MgYA">stated many times</a> the danger of this seemingly mundane claim, and it came to define many aspects of his presidency, as well as his legacy.</p><p>As the de facto representative of the federal government to the nation and around the world, it might seem at odds that the president would make such a claim about government intervention. However, Ronald Reagan on big government was much different than the president’s views on government in general. The president was a strong supporter of the idea that the federal government had too much power and influence. At the time, budgets for entitlement programs were ballooning and federal agencies had their hand in nearly every aspect of Americans’ daily lives. The state of the government was rendering it ineffective, and leading to over-regulated industries, with growth being stifled.</p><p>That led Ronald Reagan to take on big government with spending cuts, including a nearly 5-percent reduction in his very first year, with an overall reduction in discretionary domestic spending of about 14 percent during his inaugural year. One of Reagan’s cornerstone achievements was tax reform, which included reduction of tax rates and the elimination of a number of federal loopholes that had given the government unnecessary power over taxpayers’ finances. Reagan’s approaches to tax reform shifted the power from the federal government back to the American people, where it should have been.</p><p>The views of Ronald Reagan on big government have seen a resurgence in recent years, as the country has again grappled with unnecessary spending and influence by the government. Taking a cue from the past, reducing the size of government through de-regulation and funding cuts can help the public regain the control it deserves.</p> urn:store:1:blog:post:104 http://www.reagan.com/elderly-cybersecurity-4-tips-for-seniors-to-stay-safe-online Elderly Cybersecurity | 4 Tips for Seniors to Stay Safe Online <p><span style="font-family:'Times New Roman', Times, serif;"><span style="font-family:Arial, Helvetica, sans-serif;"><span style="font-family:'Courier New', Courier, monospace;"><span style="font-family:Georgia, serif;"><span style="font-family:Impact, Charcoal, sans-serif;"><span style="font-family:'Lucida Console', Monaco, monospace;"><span style="font-family:Tahoma, Geneva, sans-serif;"><img height="238" src="https://images.clickfunnels.com/26/9f90209fd211e8b1fc3924e4162372/iStock-124546663_medium.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></span></span></span></span></span></span></span></p><p><strong><span style="font-family:Tahoma, Geneva, sans-serif;">4 Tips for Seniors to Stay Safe Online</span></strong></p><p><span style="font-family:Tahoma, Geneva, sans-serif;">Staying safe online is important for everyone, but some of us haven’t been interacting with the internet as long as others. Elderly cybersecurity should be a crucial focus of your interaction with technology in today’s world. If your information gets into the wrong hands, there can be dire consequences. While it’s nearly impossible to achieve fool-proof cybersecurity, there are things you can do to more efficiently protect yourself online. Here are four tips to keep yourself safer when you’re online.</span></p><p><strong><span style="font-family:Tahoma, Geneva, sans-serif;">1.&nbsp; &nbsp; &nbsp;Password protection. </span></strong><span style="font-family:Tahoma, Geneva, sans-serif;">The first step in effective elderly cybersecurity is creating and using strong passwords for your accounts. From private email to accessing your banking accounts online, you must set up strong passwords to protect your information. A strong password is considered to be something that isn’t easily guessed and should be 12 characters long including a mix of letters, numbers, and symbols. Don’t include personal information, like the name of a child, but make it something that you’ll remember. You should not use the same password for multiple accounts as this makes you more susceptible to cyberattacks. Not only should you protect your accounts with strong passwords, you should password protect your devices, too. Make sure your phone, tablet, and computer all require passwords to gain access to them. This way, if you someone happens to pick up a device, they won’t be able to get access to personal information.</span></p><p><strong><span style="font-family:Tahoma, Geneva, sans-serif;">2.&nbsp; &nbsp; &nbsp;Spot a scam. </span></strong><span style="font-family:Tahoma, Geneva, sans-serif;">Another way to stay safe online as a senior is to train yourself to spot a scam. Cyber criminals can be quite crafty but knowing what to look for can give you the upper hand. If you receive an email that sounds urgent as if there is something wrong with a bank account or your taxes, it’s probably a scam. Institutions that deal with finances rarely send urgent emails that outline immediate actions needed to be taken to prevent a disaster – they’ll more than likely call first. If something feels off, it probably is! Don’t trust messages from people that you don’t know and never click links in emails from senders you don’t recognize. These links can contain dangerous viruses that can steal your information, take control of your devices, or worse.</span></p><p><strong><span style="font-family:Tahoma, Geneva, sans-serif;">3.&nbsp; &nbsp; &nbsp;Use your computer’s security features. </span></strong><span style="font-family:Tahoma, Geneva, sans-serif;">The computer and operating system that you’re using likely has built-in security features like firewalls and anti-virus protection. Make sure that these things are set up properly, so that they can run in the background to provide protection. These features can block websites that seem suspicious and prevent dangerous viruses from attacking your computer.</span></p><p><strong><span style="font-family:Tahoma, Geneva, sans-serif;">4.&nbsp; &nbsp; &nbsp;Ask for help. </span></strong><span style="font-family:Tahoma, Geneva, sans-serif;">If you’re unsure about how to set up your computer securely, or you have general questions about online safety, ask someone for help. Whether you reach out to a family member, or simply contact an IT support person through your internet provider, asking about things you’re unclear on can go along way in protecting yourself online.</span></p><p><span style="font-family:Tahoma, Geneva, sans-serif;">Elderly cybersecurity doesn’t have to be complicated. Following a few best practices can help you stay protected against cybercriminals and other dangers online.</span></p> urn:store:1:blog:post:103 http://www.reagan.com/internet-privacy-court-cases-the-supreme-court-and-internet-privacy Internet Privacy Court Cases | The Supreme Court and Internet Privacy <p><img height="238" src="https://images.clickfunnels.com/7f/c8c7b0787d11e8bd3f0b476582dc47/iStock-808769692_medium.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>The Supreme Court and Internet Privacy</strong></p><p>When it comes to Internet privacy, court cases have become the next realm where the issue will be evolving. In particular, a recent U.S. Supreme Court ruling has set a precedent for how the government and the public view Internet privacy.</p><p>The nation’s top court ruled in late June that the government can’t, in most cases, access individuals’ digital data without a search warrant. The 5-4 opinion is considered a precedent-setting finding for Internet privacy. The case stemmed from a robbery investigation in which prosecutors accessed the accused’s cell data to track locations connected to the incidents in question. The Supreme Court ruling found that the government must have a search warrant to access data stored in Americans’ phones, except in a few narrow emergencies.</p><p>The Supreme Court <a href="https://www.politico.com/story/2018/02/26/supreme-court-digital-privacy-case-359711">heard arguments</a> back in February on another of the Internet privacy court cases that has recently made headlines, this one in regards to Microsoft. In that case, Microsoft went head to head with the DOJ, contending the government’s intrusion into an email stored overseas on one of its servers—which the government said was part of an investigation into illegal drug activity—was unconstitutional. Both sides agreed to drop the case earlier this year after a new law, the CLOUD Act, was put into place. That measure spells out that U.S. warrants can apply internationally and provides guidance for tech companies to challenge government-issued warrants regarding data they store.</p><p>The current political climate has made it difficult for legislative fixes to issues affecting Internet privacy. Tech giants, many of which have liberal leanings and very deep pockets, are among the most frequent lobbyists on the Hill, meaning that it’s hard to expect genuine action from Congress. However, that’s just what Americans want: A recent survey found that nearly 60 percent of Americans think it’s unacceptable for the government to access private citizens’ digital communication. Yet with so many competing interests weighing in on the issue—with their own interests in mind—widespread reform to ensure Americans’ privacy is prioritized is proving difficult. That may be what has led to the rise in Internet privacy court cases, which anyone concerned about the future of privacy laws should keep an eye on.</p> urn:store:1:blog:post:102 http://www.reagan.com/do-boycotts-work-boycotts-shaping-political-narratives Do Boycotts Work? | Boycotts Shaping Political Narratives <p><img height="238" src="https://images.clickfunnels.com/e9/b53bf09a5011e89bd521489f73d649/iStock-485232236_high.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>Boycotts Shaping Political Narratives</strong></p><p>Do boycotts work? That’s the million-dollar question many on both sides of the aisle are asking, as the worlds of politics and business increasingly collide.</p><p>The National Rifle Association has been the central focus of this debate, as, in the wake of a rash of school shootings, gun-control advocates have set their sights on the agency’s business and political ties. Proponents of gun control have argued that boycotting companies that have supported the NRA, such as through donations, discounts and incentive programs for NRA members, could reduce the organization’s influence and reach. Gun-control supporters have also targeted companies that sell firearms, resulting in a number of retailers ending or cutting back on their gun sales. On the other side of the coin, advocates for gun owners’ rights have led boycotts of businesses that severed ties with the NRA or those that are pressing for gun reform, contending that businesses shouldn’t bow to pressure from special-interest groups.</p><p>The opposing boycotts have further divided the nation on an issue that doesn’t necessarily need to be as polarizing as it’s being made out to be. According to <a href="http://www.businessinsider.com/companies-boycott-nra-show-political-polarization-2018-2">Business Insider</a>, nearly two-thirds of voters support stricter gun control; while there is certainly a range of opinions among conservatives on the issue, many right-leaning Americans may be open to the tightening up of some gun laws. However, when boycotts emerge and cast the issue in an “us versus them” light, it promotes the idea that conservatives are stalwart in their opposition to any changes at all in the gun laws and that liberals want to completely abolish the Second Amendment. This sets up a false sense of reality, one that presumes Americans are on extreme ends of the debate when, in fact, most would be able to find common ground if given the option.</p><p>So, do boycotts work? While some have seen results—such as FedEx’s support for the NRA encouraging new support of the company by conservative customers and Dick’s discontinuing sales of certain firearms following pressure by gun-control advocates—boycotts seem to beget more boycotts. That trend then drives a wedge further into the American public, which is already sharply separated and in need of unification, not further division.</p> urn:store:1:blog:post:101 http://www.reagan.com/america-during-reagan-presidency-then-now America During Reagan Presidency | Then & Now <p><img height="238" src="https://images.clickfunnels.com/cd/548a90998511e8952b0f07663663dc/american-flag-flag-flower-1093645-_1_.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>Reagan’s America vs. 2018 America</strong></p><p>The more things change, the more they stay the same. That old adage has some relevance in today’s world, though with a few important caveats.</p><p>The current political climate has caused some pundits to compare it to America during Reagan. When the Great Communicator was in office, he worked hard to shift national attention onto the “America first” mantra, a guiding principle of both Reagan’s domestic and foreign policy. Reagan sought to center not just America, but also basic American freedoms, including the right to privacy and freedom of religion.</p><p>Many of these ideas have made a comeback in recent years. President Trump has proclaimed the same “America first” mission that Reagan popularized and a goal that has been seen both in how the country interacts with allies and opposition. The freedoms that the country promises have also become more top of mind for many, while in a slightly different context than they did in America during Reagan. Conversations about the role of government in ensuring online privacy, as well as how religious freedom fits in with modern business are both ongoing among Americans on both sides of the aisle.</p><p>What sets America during Reagan a bit apart from the current state of the country may lie in the attitudes that guide the political climate. During Reagan’s tenure, the Republican Party was somewhat unified; while there were natural differences among party members and leaders, most would agree upon the common elements that defined the party. In today’s world, however, both leading political parties are fractured, with political ideals threatening to drive those wedges even further. Similarly, the quality of the political discourse has devolved since the time of America during Reagan. Then, Reagan followed his own “11th Commandment,” which discouraged political infighting in the party, instead encouraging civility with the aim of unity. That mission has been lost in today’s world, which is rife with personal jabs among politicians.</p><p>As is often the case, looking to the past—such as America during Reagan—can provide a guidebook for the future.</p> urn:store:1:blog:post:100 http://www.reagan.com/ronald-reagan-famous-quotes Ronald Reagan Famous Quotes <p><img height="238" src="https://images.clickfunnels.com/49/d84530d9bf11e68d32f1b740e55ab4/Reagan-Presidential-Portrait.png" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>Get Inspired: Ronald Reagan's Most Inspirational Quotes</strong></p><p>Anyone looking to learn about best of the Ronald Reagan famous quotes will have many options to choose from: Known as the Great Communicator, his countless speeches, addresses, debates and interviews produced scores of quotes that were much more than just soundbites. Reagan had a natural ability to connect with Americans across a range of backgrounds, and to understand the challenges each was facing. Even though decades have passed, so many of the words he delivered continue to ring true, showing just how keenly the president understood the American way of life.</p><p>Here are a few of the most memorable Ronald Reagan famous quotes to inspire Americans to follow in the president’s footsteps:</p><p><em>“There is no limit to the amount of good you can do if you don’t care who gets the credit.”</em></p><p><em>“Man is not free unless government is limited.” </em></p><p><em>“A people free to choose will always choose peace.”</em></p><p><em>“America is too great for small dreams.”</em></p><p><em>“Freedom is never more than one generation away from extinction. We didn’t pass it to our children in our bloodstream. </em><em>It must be fought for, protected, and handed on for them to do the same, or one day we will spend our sunset years telling our children and our children’s children what it was once like in the United States where men were free.”</em></p><p>While Ronald Reagan’s famous quotes run the gamut from witty to serious, and from concise to complex, all follow the same common thread that also underlined his entire presidency. The president used his platform, as well as his policies, to communicate his beliefs about America, chief among them that the country was worth fighting for, largely because of the promise that its people held. Even though his statements are now many years old, each continues to be relevant and relatable and can inspire Americans to take the same positive, yet principled, approach to American freedom that Ronald Reagan did.</p> urn:store:1:blog:post:99 http://www.reagan.com/ronald-reagan-the-11th-commandment Ronald Reagan & the 11th Commandment <p><img height="238" src="https://images.clickfunnels.com/67/4d4eb0903b11e8a496edce9d40b8d7/image1-_3_.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>Reagan and the 11th Commandment</strong></p><p>The Ronald Reagan 11th commandment wasn’t necessarily set in stone like the rest of them—but perhaps it should have been. His famed <a href="https://www.politico.com/magazine/story/2017/04/11th-commandment-gop-republican-reagan-trump-214982">11th commandment</a> dictated that Republicans, who were struggling to repair party rifts, needed to keep their dialogue and discourse with and about one another above board. It’s an idea that many in the Republican Party have been yearning to get back to.</p><p>Reagan reportedly pledged to follow the 11th commandment during his run for governor of California in the mid-1960s and stayed true to its principle throughout his entire career in public office. Pundits have speculated that his support for diplomacy among Republicans stemmed from a number of areas, but all agree that it had an unparalleled impact on the country, especially the Republican Party.</p><p>When Reagan was rising to political prominence, he was doing so in a party that was greatly divided. The 1964 defeat of Barry Goldwater by Lyndon Johnson for the presidency had left the party at risk of fracture. Goldwater’s brand of Republicanism, involving more liberally social policies, a strong backing of the separation of church and state and fiscally conservative policies, didn’t sit well with some, and the election was followed by finger-pointing and disagreement over the future of the party.</p><p>Reagan’s 11th commandment was born in response to that conflict. Reagan knew that division and divisiveness wouldn’t help the party rebound from the presidential loss; rather, he saw the path forward as being reliant on unity. If the party was going to take back the White House, Reagan believed, it couldn’t get to that point if its leaders didn’t agree on what comprises the basic Republican ideals. Further, attacking or maligning other Republican figureheads would only keep the party further from its goals.</p><p>The Reagan 11th commandment was a mainstay during his time as governor and later as president, as he chose to keep debate with fellow Republicans civil and straightforward, instead of the accusatory attacks that have become common in 21st-century politics. In so doing, Reagan set a precedent for Republican ideals that the country is still striving for, one that promotes unity and sets an example for moral and civic leadership.</p> urn:store:1:blog:post:98 http://www.reagan.com/is-the-declaration-of-independence-hate-speech Is the Declaration of Independence Hate Speech? <p><img height="238" src="https://images.clickfunnels.com/3e/4f7ac08f7211e8a74b398575b2ee06/dec1776.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>Is the Declaration of Independence Hate Speech?</strong></p><p>The “Declaration of Independence” has been called a lot of things: iconic, revolutionary, groundbreaking. But recently, Facebook gave it another descriptor: hate speech.</p><p>How could such a fundamental document be labeled hate speech? It all comes back to Facebook’s policy regarding open communication on its site, which many have deemed is cloaked in censorship and bias.</p><p>This <a href="https://www.cnn.com/2018/07/05/politics/facebook-post-hate-speech-delete-declaration-of-independence-mistake/index.html">latest gaffe</a> centers on a series of posts by a local newspaper in Texas. In the days leading up to the Fourth of July, the publication shared excerpts of the “Declaration of Independence,” but ran into a roadblock when it posted paragraphs 27 through 31. Ultimately, the paper’s editor said he believed Facebook picked up on the terms “Indian savages,” which are contained within the document, and banned the entire post on the basis that it “goes against our standards on hate speech.” The social media giant later acknowledged that move as a mistake and restored the post.</p><p>However, importantly, we may never know just what the supposed violation was based on, as Facebook doesn’t share such details, raising even more questions about its transparency. The regulation of hate speech appears to be automated—as it is dubious that any actual human would consent to deeming the nation’s founding document as hate speech—but the codes that power that automation should be questioned, as they could be skewed against conservative views.</p><p>Facebook has long come under fire for its practice of limiting what users can post, particularly users with conservative views. Conversations about a number of topics have been targeted—religion, the military and foreign affairs, with right-leaning posts bearing the brunt of this approach.</p><p>Hate speech on its face shouldn’t be tolerated in social media circles; however, the practice of defining and regulating hate speech needs to be clearly defined and non-biased. Without that guarantee of objectivity, the potential for bias—not to mention, outright mistakes like we saw with the “Declaration of Independence” fiasco—is too great.</p> urn:store:1:blog:post:97 http://www.reagan.com/heritage-foundation-defends-facebooks-right-to-censor Heritage Foundation Defends Facebook’s Right to Censor <p><img height="238" src="https://images.clickfunnels.com/72/75c5d08e7c11e8ad039b9320483154/iStock-941926350_medium.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" /><img /></p> <p><strong>Heritage Foundation Defends Facebook’s Right to Censor</strong></p> <p>The topics of Facebook and censorship have gone hand in hand in news reports in recent months. The social media giant, long associated with liberal causes and candidates, has been accused of censoring conservative views, preventing individuals and organizations from freely sharing their ideas on the public platform. That accusation has caused concern among many conservatives; however, others have defended the tech company’s ability to invoke censorship.</p> <p>One such agency is the Heritage Foundation, a popular conservative thinktank. While many conservative organizations have been working to counter alleged censorship at Facebook, the Heritage Foundation has taken a much different approach. The foundation’s senior research fellow for technology, Klon Kitchen, told <a href="http://www.breitbart.com/tech/2018/05/03/heritage-foundation-defends-facebooks-right-to-censor-will-oppose-regulation/">Breitbart News</a> that he considers Facebook a “private company,” with an inherent right to “make decisions about what kind of speech it wants to have on its platform.” Critics of this viewpoint have argued that Facebook and other companies, which have had a demonstrated and unprecedented level of influence over American political discussion, should be kept to a higher level of scrutiny—and thus, government regulation. That’s a viewpoint that Kitchen and the Heritage Foundation found problematic: “I don’t think [Facebook’s influence] rises to the level of government regulating how they conduct their business or constraining them in other ways.”.</p> <p>While Kitchen asserted that Facebook and similarly situated companies have a right to censor, he did advise them to avoid such approaches. “I think it is better for consumers and the American people to have as free a space for open dialogue and diversity of viewpoints as possible,” he said.</p> <p>No matter your vantage point on Facebook and censorship, the benefit of open dialogue is a given—even on this very topic. The free exchange of diverse viewpoints can encourage conservation, education and, ultimately, action—whereas, censorship constricts such potential and can stifle our American guarantee of freedom.</p> urn:store:1:blog:post:96 http://www.reagan.com/google-apps-scan-your-email-google-privacy Search Engines Scan Your Email <p><img height="238" src="https://images.clickfunnels.com/9e/8e74e18a9011e8a018af9e15e6419d/iStock-518321696_super.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" /><img /></p> <p><strong>Search Engines are Still Scanning Your Email</strong></p> <p>Despite the revised practices that were adopted as a result of the scanning emails scandal that happened last year, search engines are still doing it – just through third parties. This month the <a href="https://www.wsj.com/articles/techs-dirty-secret-the-app-developers-sifting-through-your-gmail-1530544442">Wall Street Journal</a> released an article detailing how search engines are still sharing its users’ data through third-party apps that basically do exactly what they were doing for the past decade. The article shares that third-party applications have technically gained users’ permission to scan their email, which even includes actual employees putting eyes on their inboxes. This is the exact same type of behavior that search engines admitted to doing for years before it allegedly ceased the practice.</p> <p>The main difference between search engines scanning emails and third parties looking at your inbox is that allegedly you’ve consented to it. Somewhere along the way, whether when you signed up for the third-party app, or agreed to share data, you’ve consented to allowing apps to scan email in your inbox. Various search engines require these third-party providers to be transparent about what data they’re collecting and how they’ll use it, even though you’ve given consent. However, what the WSJ found is that there can be “fourth parties” that also have access to your inbox.</p> <p>For example, the permission you’ve granted to a third party that allows a search engine to scan email may work in conjunction with another third party that you’ve never heard of. The original consent is transferred to that third party, which may or may not have been mentioned in whatever you agreed to when you signed up for the service. The WSJ found that the consent people granted when signing up for these third-party apps was more straightforward than a typical terms of service agreement, however, they may not have known they would be allowing multiple third parties access to their information.</p> <p>While there’s no evidence to suggest that these third parties have abused any user data or that there has been a breach, it’s just another example of how a search engine scanning emails can be a slippery slope. Even though the company has done away with the practice of scanning email for ad targeting, search engines still scan email to filter spam, prevent malware, and clearly more. The only way to keep a search engine from scanning emails is to trust your information with a company that believes in privacy like Reagan.com. <a href="https://www.reagan.com/t/privateemail">Private email companies</a> won’t copy, scan, or sell a single word of your email content.</p> urn:store:1:blog:post:95 http://www.reagan.com/facts-about-ronald-reagan-5-things-you-didnt-know Facts about Ronald Reagan | 5 Things You Didn’t Know <p><img height="238" src="https://images.clickfunnels.com/1c/76c340244811e78edd5d0106fd4a37/Raegan-affinity_landing-page.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>5 Things You Didn’t Know about Ronald Reagan</strong></p><p>As one of the most iconic political leaders of our time, it’s only fitting that Americans of all generations learn all about the life and legacy of Ronald Reagan. History books are brimming with facts about Ronald Reagan—from his policies and positions to his major speeches and milestone achievements. However, with a life as full as the president’s, no book can really do justice to all of the facts about Ronald Reagan.</p><p>Even if you feel well-versed on the president’s record, there are doubtlessly some details that may have slipped through the cracks. Here are five facts about Ronald Reagan that may surprise you:</p><ol><li><strong>Ronald Reagan was the oldest American president at the time:</strong> He was 69 when he was inaugurated, one year older than William Henry Harrison was when he took office and held the title of oldest president for 140 years. When Donald Trump took the oath in 2017 at age 70, he took over the title.</li><li><strong>His nickname, “Dutch,” was given to him when he was a child: </strong>The name stems from a haircut that he got as a youth.</li><li><strong>He was the first divorced candidate to be elected president: </strong>Reagan married Jane Wyman in the 1940s before divorcing and later marrying Nancy Davis, with whom he spent the next 50-plus years.</li><li><strong>Ronald Reagan started his career as a sportscaster: </strong>He worked covering sports for five years in the Midwest in the 1930s before moving to California and starting his career in Hollywood.</li><li><strong>His memorial site includes a famous quote he delivered the day the Ronald Reagan Presidential Library opened: </strong>"I know in my heart that man is good, that what is right will always eventually triumph and that there is purpose and worth to each and every life."</li></ol><p>There are many facts about Ronald Reagan and discovering them today can be as interesting as living through his legacy.</p> urn:store:1:blog:post:94 http://www.reagan.com/conservative-views-in-hollywood Conservative Views in Hollywood <p><img src="https://images.clickfunnels.com/76/beae01845311e8b9e57f3230dbfc51/california-hill-hollywood-164183.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="238" /><img /></p> <p><strong>Conservative Views in Hollywood</strong></p> <p>While mainstream Hollywood awards shows, with their frequent political statements and stunts, may have many thinking the entertainment industry is solely comprised of liberals, that is certainly a misconception. Conservatives in Hollywood have always existed, although they are clearly in the minority, an idea that may be keeping even more conservative-leaning actors and others from going public with their viewpoints.</p> <p>One of the most well-known conservatives in Hollywood history was Ronald Reagan, who inspired our <a href="/privateemailservice">private email service</a> here at Reagan.com. Former President Ronald Reagan was open about his support for conservative candidates and right-leaning ideals while his acting career flourished. His time in Hollywood, including at the helm of agencies like the Screen Actors Guild, may very well have played a role in solidifying his organizational and leadership capabilities, as well as built a strong following that transitioned with him as he moved into political realms.</p> <p>Since that time, the industry has shifted far to the left, though some conservatives in Hollywood continue to let their voices be heard. Clint Eastwood, for example, has been a strong proponent of conservative values. He supported Reagan’s candidacy, spoke at the 2012 Republican National Convention and himself has held several elected and appointed public positions.</p> <p>One of the more recent conservatives in Hollywood to make headlines has been Roseanne Barr, whose return of her eponymous sitcom was recently cancelled after she made what critics deemed racist comments about a member of the former Obama administration. Barr has been open about her support for President Donald Trump, despite working in an industry that overwhelmingly opposes his presidency. From modern actors and producers like Jeff Foxworthy and Chuck Norris to icons like Clark Gable and Charlton Heston, conservatives in Hollywood have always been contributors to both the industry and the political world—though their influence hasn’t always been encouraged nor appreciated because of the lopsided makeup of their colleagues. </p> urn:store:1:blog:post:93 http://www.reagan.com/secure-private-email-ronald-reagan-privacy Secure Private Email | Ronald Reagan & Privacy <p><img height="238" src="https://images.clickfunnels.com/ac/8e67b0837b11e8acd5c18c1bce9803/iStock-471273976_high.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><h3>Reagan and 21st-Century Privacy </h3><p>When Ronald Reagan was in office, the concept of email was in its infancy; it would be several more decades before email came to power nearly every corner of personal and professional communication across the world. While times have changed, a lot can be predicted about what the late president’s views on modern topics would be from his past positions and policies.</p><p><a href="https://www.reagan.com/t/privateemailservice">Secure private email</a> would doubtlessly be an area about which Ronald Reagan would feel strongly, as Reagan and privacy went hand in hand. He was a champion of the concept that Americans had the intrinsic, constitutional right to freedom—and threats to privacy are often motivated by a desire to restrict one’s free expression or speech. Reagan continuously fought for Americans, and the American economy, to be free from excessive government involvement and overly regulated industries, and to have more control over how they operate their daily lives. In today’s world, those goals would certainly extend to our primary way of communicating, as secure private email moves away from models that leave users’ information exposed and potentially compromised by government or other sources, putting the control back in the hands of Americans, where it belongs.</p><p>Here are a few ways that you can embrace that idea in your own email usage:</p><h3>5 Steps to Keep Your Email Safe</h3><ol><li><strong>Use secure private email: </strong>With end-to-end encryption and safe storage, secure private email allows users to control exactly who sees their messages.</li><li><strong>Practice safe surfing: </strong>Get in the habit of adopting general safety precautions for all online usage, such as turning off Google tracking when you’re on the web.</li><li><strong>Protect your device: </strong>Use antivirus software to enhance your protection against hackers or other security threats.</li><li><strong>Avoid public WiFi:</strong> Only use the password-protected WiFi in your own home. Joining free public networks can heighten security risks.</li><li><strong>Stay educated:</strong> Keep on top of the latest tools and techniques to keep your secure private email protected, while also remaining aware of potential trends in security threats.</li></ol> urn:store:1:blog:post:92 http://www.reagan.com/from-the-silver-screen-to-the-white-house From the Silver Screen to the White House <p><img height="238" src="https://images.clickfunnels.com/78/35dc603cd011e899dfbd7e25558ac0/Reagan-Blog-2-Quotes.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>From the Silver Screen to the White House</strong></p><p>The road to the White House often starts with generations of political ancestors, Ivy League schools and deep entrenchment in elite circles. However, Ronald Reagan’s own path to the White House was a bit unconventional—which many credit for some of his success.</p><p>When Ronald Reagan was in Hollywood, his future as an actor was bright. He had a number of huge hits under his belt and had a lengthy contract with one of the nation’s leading production companies. However, Ronald Reagan as an actor just wasn’t feasible for someone with such deep commitments to fighting for justice and such exemplary leadership skills.</p><p>Reagan’s capacity to lead evinced itself during his time in Hollywood. He was elected to a series of terms on the board of directors of the Screen Actors Guild, eventually rising to become its vice president and later its president. During his tenure with the organization, he successfully navigated a number of labor disputes, perhaps a precursor to his later work fighting back against corrupt union practices.</p><p>His experience in Hollywood opened a number of doors to political opportunities. Reagan was a strong supporter of anti-Communist actions, particularly in Hollywood, and his involvement on that front earned him the respect of and affiliation with leading political pundits of the time. He became a sought-after endorsement by those seeking to build popularity within Hollywood circles. In 1948, he endorsed Harry S. Truman for president, later throwing his public support to Dwight D. Eisenhower and then Richard Nixon.</p><p>For more than a decade, Reagan hosted “General Electric Theatre,” a weekly television drama that had him touring and filming daily at GE plants around the nation. The experience enabled Reagan to perfect his comfort level with large public addresses and his passion for connecting with hard-working Americans. Reagan’s reputation as a voice for conservatives flourished during the series, helping to further catapult him to political platforms, including as a leading backer of presidential candidate Barry Goldwater. That support skyrocketed him to the national stage and jumpstarted his political career. And the rest, as they say, is history.</p> urn:store:1:blog:post:91 http://www.reagan.com/conservatives-and-freedom-what-it-means-to-be-free-in-2018 Conservatives and Freedom | What it Means to be Free in 2018 <p><img height="238" src="https://images.clickfunnels.com/c3/734f307da511e8ad713fd6c6433080/iStock-541869170_super.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>What it Means to be Free in 2018</strong></p><p>Conservatives and freedom have long gone hand in hand—and this idea is especially salient this year at Independence Day. Right-leaning Americans have traditionally been at the vanguard of American freedom: from a strong investment in and backing of the military and law enforcement to a belief in the constitutional guarantees guaranteed to all Americans, such as the right to bear arms and to exercise free speech. As American society has grown increasingly politicized in the last few years, these foundational freedoms have been thrust into the mainstream spotlight and been at the center of debate.</p><p>This trend has conservatives and freedom under fire on all fronts. Inherent issues such as the right for a licensed gun holder to carry a firearm shouldn’t be up for question, but in today’s cable news-dominated society, they are. The rise of social media and the spread of fake news have complicated the landscape even further. Memes and gifs are often the way some Americans are getting their news, which is highly politicized, biased and often littered with misstatements.</p><p>That environment makes this year’s Independence Day even more important. The basic ideals upon which this country was founded are all rooted in one thing: freedom. Conservatives are striving to hold onto that truth in all facets of life. From standing up for freedom of speech to lobbying lawmakers for stronger investments in veterans, conservatives are facing unparalleled pressure with their own unprecedented pushback. It is through this work that conservatives and freedom protectors are carrying out the foundations of Independence Day.</p><p>The holiday celebrates the vision and courage of those who stood up to tyranny to make a new world for themselves. It is this spirit that is guiding conservatives today, as they fend off those who aim to see their rights restricted and their potential thwarted. Independence Day is a time not just to celebrate but also to renew our resolve to keep fighting for freedom, which is needed now more than ever.</p> urn:store:1:blog:post:90 http://www.reagan.com/ronald-reagan-small-government-reducing-the-size Ronald Reagan & Small Government | Reducing the Size <p><img height="238" src="https://images.clickfunnels.com/7f/c8c7b0787d11e8bd3f0b476582dc47/iStock-808769692_medium.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>Reagan and Reducing the Size of Government</strong></p><p>Conservatives have long argued that government influence needed to be reduced in order to promote American progress, but it wasn’t until Ronald Reagan took the helm of the country that this goal became a reality.</p><p>Ronald Reagan and small government became synonymous during his time in office, as he worked on a number of fronts to limit excessive government spending, reduce stifling federal regulations and give power back to the people. In fact, the foundational phrase “we the people” was one that Reagan often championed in speeches, contending that government was designed to be a function of the American people—and that it was time for American citizens to have control over their future, instead of the federal government.</p><p>What are some of the ways that Reagan and small government came to be so linked in history? In his first year in office, 1981, Reagan signed legislation that significantly cut government spending. The approach was designed to put money back into the pockets of American citizens by cutting out excessive and wasteful spending by the government. Mass transit and social programs were among those areas where Reagan sought to reduce government influence, allowing citizens more control over shaping the course of their future. In his first year in office, domestic spending dropped by almost 14 percent. That was a marked difference in the direction in which the country had been heading; prior to Reagan taking office, federal spending was steadily increasing, a trend that the president summarily reversed.</p><p>In 1986, Reagan championed a successful tax reform measure. Apart from cutting taxes, the legislation also removed a number of tax breaks that many contended gave undue power to the federal government. Such loopholes granted special treatment to certain tax payers that complied with federal preferences, a practice that Reagan eliminated to put Americans on more equal footing.</p><p>Small government is the cornerstone of American freedom and prosperity, an ideal demonstrated by President Ronald Reagan.</p> urn:store:1:blog:post:89 http://www.reagan.com/top-conservative-values-ronald-reagan Top Conservative Values | Ronald Reagan <p><img src="https://images.clickfunnels.com/b3/38681073c511e8b32e1d75664be1aa/iStock-502892481_high.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="238" /><img /></p> <p><strong>Top 10 Conservative Values</strong></p> <p>While there is no guidebook to the qualities that comprise someone’s political party or ideology, there are a number of top conservative values that many who consider themselves conservative Americans share. This is not to say all conservatives should be painted with the same brush—nor should all liberals be considered exactly alike. However, when it comes to foundational beliefs and views, these top 10 conservative values are often underlining the works of political leaders, and the aspirations and motivations of their followers.</p> <ul style="list-style-type: circle;"> <li>The right to privacy: Conservative values often place emphasis on the need for Americans to be able to live freely, without influence from the government or media. Lately, this has been evidenced in conservative support for privacy on the Internet. For example, Reagan.com offers an <a href="https://www.reagan.com/private_email_service">email service for conservatives</a> that secures your right to privacy and allows you to communicate freely without being monitored by a massive tech company or the government.</li> <li>Self-defense: Many right-leaning Americans agree that the nation’s future is contingent upon protecting itself from domestic and foreign threats.</li> <li>Justice: All Americans deserve to live freely and equally.</li> <li>Limited government: Most top conservative values are driven by the idea that America functions best when its citizens can govern themselves, with limited influence from the federal government.</li> <li>Self-help: Conservatives recognize that Americans have the capacity to lift themselves out of negative situations and should invest in self-improvement instead of relying on government or other sources.</li> <li>Hard work: Each American has an obligation to invest in and contribute to society.</li> <li>The value of the free market: Competition drives growth and progress, according to top conservative values.</li> <li>Pride in country: Conservatives believe patriotism should be a natural part of each American’s life.</li> <li>Opposition to special interests: The government and its leaders should operate independently of pressure from special interest groups.</li> <li>Sanctity of the Constitution: Our nation’s founding fathers were guided by a core set of principles when they laid down the framework for the country, and those goals should continue to be upheld, according to conservatives.</li> </ul> <p></p> <p>Of course, the top conservative values vary from person to person, but the commitment that conservatives feel to their own beliefs does not.</p> urn:store:1:blog:post:88 http://www.reagan.com/ronald-reagan-and-gun-control Ronald Reagan and Gun Control <p><img height="238" src="https://images.clickfunnels.com/f6/67d90057b811e882c12923ec7bf41d/iStock-500780096.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>Reagan on Gun Control after Assassination Attempt</strong></p><p>President Ronald Reagan and gun control took center stage at the 1983 National Rifle Association convention. While the annual gathering often attracted politicians with pro-Second Amendment policies, Reagan’s involvement in this particular event was significant for a number of reasons.</p><p>About two years prior to the convention, Reagan was shot in an attempt on his life. Once the president recovered from the attack, pundits on both sides of the aisle began to wonder if the assassination attempt would push Ronald Reagan and gun control closer to one another. Reagan’s decision, then, to headline the NRA convention may have been in part an effort to make a firm statement that the president was still a firm believer in gun owners’ rights.</p><p>That idea was at the center of his <a href="https://www.youtube.com/watch?v=ZbRNNSNcFPw">speech</a> to the NRA. Reagan did not shy away from addressing the shooting; in fact, he used it to oppose arguments by those who pushed for broad gun control laws. While such advocates claimed that adding new regulations for gun purchases would deter criminals from obtaining or using guns, Reagan countered with: “Those who seek to inflict harm are not fazed by gun control laws. I happen to know this from personal experience.”</p><p>He went on to praise the mission of the NRA, again knocking down arguments by gun control advocates that gun laws should be updated over time. He invoked Abraham Lincoln on this point, quoting “Important principles may and must be inflexible.”</p><p>Reagan also connected the underlying principles of the NRA’s work with his own platform. He cited the shared belief in individual responsibility and penalties for those who don’t comply with the law, as well as the idea that freedom is contingent upon less strict oversight by the federal government. While the concept of Reagan and gun control may have come under the fire of speculation after his assassination attempt, the president used the 1983 NRA convention to reaffirm his support for gun owners and strengthen understanding of their shared missions.</p> urn:store:1:blog:post:87 http://www.reagan.com/ronald-reagan-record-break-up-mobile-internet-monopolies How Ronald Reagan’s Record Could Influence Modern Internet Monopolies <p><img src="https://images.clickfunnels.com/b9/eb3a706e7511e89c95bfb0e1d6f595/iStock-519735146_high.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="238" /><img /></p> <p>The mobile internet monopoly that has emerged in America is leading to a number of negative consequences for consumers and companies alike. With so few options for mobile internet, Americans are facing steeper prices. Since there is such little competition, mobile internet providers are able to fix prices at whatever levels would most benefit their businesses, without attention to its effect on customers. Prices aren’t the only thing being affected: Google and Apple have a 98-percent market share in mobile operating systems, giving the monopoly unprecedented power to <a href="https://nypost.com/2017/08/21/how-apple-and-google-are-censoring-the-mobile-web/">censor conservative views.</a> Yet with mobile Internet powering nearly every type of personal and professional communication today, Americans need to continue relying on such providers—despite high prices and unregulated policies.</p> <h2>Reagan’s Record of Breaking Up Monopolies</h2> <p>The mobile internet monopoly also discourages other businesses from entering the fray, which runs counter to the notion of a free economy, in which competition fuels growth. The lack of competing businesses means fewer jobs, which not only affects Americans’ bottom lines but also trickles down into a lack of investment in the economy.</p> <p>So how can the mobile internet monopoly best be addressed? Looking to the past is one way to find solutions. For Ronald Reagan, breaking monopolies up was a cornerstone of his economic policies. Shortly after he took office, in January 1982, the nation saw the dissolution of one of its most long-time monopolies. The federal government had sued Bell Systems for antitrust violations, resulting in a settlement that broke up the AT&amp;T telephone monopoly, at the time the largest private company in the world.</p> <p>Reagan instituted a new method for federal review of proposed corporate mergers, which could be one area revisited to address today’s mobile Internet monopoly. Reagan saw the need for getting ahead of potential monopolies by circumventing potential problem areas at the start. Reviewing and updating merger guidelines to specifically address the realities of today’s Internet-powered age can put the nation one step closer to reducing monopolies and giving economic freedom back to the American people.</p> <p>Reagan.com fosters the ideals of former President Ronald Reagan and desires to uphold his conservative values. Just as Reagan pushed against the formation of monopolies, <a href="https://www.reagan.com/">Reagan.com</a> is doing similar work with our <a href="https://www.reagan.com/best_email_alternative">conservative email service.</a> Unlike big-name free email providers, we created an email service that is private, safe, and readily accessible. <a href="https://www.reagan.com/reagancom-personal-email">Create your own Reagan.com email</a> today!</p> urn:store:1:blog:post:86 http://www.reagan.com/life-of-ronald-reagan-timeline Life of Ronald Reagan | Timeline <p><img height="238" src="https://images.clickfunnels.com/ab/355cb0680911e893c0bb665c86523f/reagan-bust.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>Timeline of the Life of Ronald Reagan</strong></p><p>The life of Ronald Reagan has been examined from a range of angles, from the personal to the political, and everything in between. Perhaps one of the best ways to really understand the depth and breadth of the legacy the president left us with is to look at the life of Ronald Reagan from end to end. By considering his impact from this vantage point, it is easier to see the factors that led to his success, how he used those early life lessons to overcome obstacles and just how much one man was able to accomplish in the course of his lifetime.</p><ul><li>1911: On Feb. 6, Ronald Reagan was born in a small town in Illinois. His father was a salesman and his mother was very active in her church.</li><li>1922: Reagan is baptized into the Disciples of Christ faith, following in his mother’s footsteps. He would later say that his upbringing in this Protestant religion had a strong influence on his world outlook, including his emphasis on equality and belief in the individual goodness each person possesses.</li><li>1927: He gets his first job, as a lifeguard, where he would go on to perform dozens of rescues. The position is among the factors that would spark his interest in sports.</li><li>1932: Reagan graduated Eureka College with a degree in economics and sociology. Those two areas of study would lay the groundwork for the focus of his future presidency.</li><li>1937: Pursuing his passion for acting, he earns his first starring role in “Love is on the Air.” Reagan would go to a seven-year contract with Warner Brothers. His acting career is largely credited with instilling the exemplary communication skills for which the president was known.</li><li>1942: Five years after joining the Army Reserve, Reagan is ordered to active duty for the first time.</li><li>1952: Reagan marries Nancy Davis. They have two children, in addition to his two older children from a previous marriage. He and Nancy would remain married until his death.</li><li>1962: He switches political parties from Democrat to Republican.</li><li>1964: Reagan rises to national prominence during his campaigning for conservative presidential candidate Barry Goldwater. He delivers one of his most famous speeches, “A Time for Choosing,” while on the campaign trail for Goldwater.</li><li>1966: He defeats a two-term incumbent to become the next governor of California. He was re-elected four years later.</li><li>1980: After losing the Republican nomination for president to incumbent Gerald Ford in 1976, Reagan successfully secures his party’s nomination and later wins the general election to become the 40<sup>th</sup> president of the United States.</li><li>1981: Reagan signs into law the Economic Recovery Tax Act, considered a major win for the middle class.</li><li>1983: On March 23, the president announces the Strategic Defense Initiative, a program aimed at revolutionizing how the military protects the nation.</li><li>1984: The president wins a second term.</li><li>1987: Reagan and Soviet leader Mikhail Gorbachev sign the Intermediate-Range Nuclear Forces Treaty to reduce nuclear missiles.</li><li>1989: Reagan officially turns over the White House to his successor, George H.W. Bush, on Jan. 20.</li><li>1994: Reagan announces that he has been diagnosed with Alzheimer’s Disease. He delivers his final public speech on Feb. 3 of that year.</li><li>2001: He turns 90, becoming only the third former president to reach that age.</li><li>2004: Reagan dies at home of complications from pneumonia on June 5.</li></ul> urn:store:1:blog:post:85 http://www.reagan.com/censorship-of-conservatives-reagan Censorship of Conservatives | Reagan <p><img src="https://images.clickfunnels.com/7f/33b9a0699511e8b6cf49c5b8f65a71/iStock-178485797_small.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="238" /><img /></p> <p><strong>Are Conservative Voices Being Censored?</strong></p> <p>Censorship of conservatives is not a new issue—but it’s one that is gaining new traction with the rise of digital and social media.</p> <p>A new <a href="https://www.usatoday.com/story/news/politics/onpolitics/2018/07/25/report-some-gopers-shadow-banned-twitter/836734002/" target="_blank">report</a> uncovered evidence of Twitter employees using a “shadow ban” on users with conservative-leaning viewpoints. Such a method effectively prevents Twitter users from seeing the content posted by the right-leaning profile, without the individual or organization operating it knowing such a ban is in place. This approach not only prevents the individual’s followers from accessing information they would find relevant and interesting but deceives the user into thinking posts are not resonating with supporters, which could shape their future social media activity.</p> <p>“I would say the majority of it are for Republicans,” Twitter employee Pranay Singh told James O’Keefe’s Project Veritas about the shadow ban practice. Other employees interviewed said the approach was part of a set of “unwritten rules” that center on the censorship of conservatives.</p> <p>This news represents a wider trend of media platforms silencing views that are contrary to leading liberal talking points. The mainstream media has been known to practice censorship of conservatives, from lopsided coverage on cable news shows to newsrooms at print publications that are overwhelmingly populated by employees with left-leaning views. Now, the censorship of conservatives has moved to social media, from which an increasing number of Americans are getting their news and are using such forums to explore and establish their own views on current events.</p> <p>Twitter is likely not alone in its efforts to restrict conservative voices. Other popular social media platforms, such as Facebook, as well as the many tech firms that support such sites, are run by individuals with records of hefty donations to Democratic and liberal-leaning politicians. While such outlets are designed to be free exchanges of information and ideas, it does not appear that that mission extends to all users.</p> <p>As digital and social media become even more central to American society, and politics in particular, the need for regulations to ensure the right to free speech for all becomes even more important. A way to begin showing disapproval towards censorship is to engage in services that respect conservative values including the right to privacy and free speech. For example, the <a href="https://www.reagan.com/best_email_alternative">conservative email alternative</a> offered by Reagan.com allows you to communicate freely by email without being monitored by big tech companies or worrying that your personal data will be scraped and sold for ads. Keep your email private and safe—<a href="https://www.reagan.com/reagancom-personal-email">Join today!</a></p> urn:store:1:blog:post:84 http://www.reagan.com/ronald-reagan-and-the-royal-family Ronald Reagan and the Royal Family <p><img height="238" src="https://images.clickfunnels.com/21/410b81680b11e8bf47a3b3ee5093a6/reagan-flagbust.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>Reagan and the Royal Family</strong></p><p>The recent royal wedding fueled a wave of intrigue and interest on our side of the pond, as our country witnessed the welcoming of an American into the royal family. The nuptials were far from the first time American and British traditions collided, as the monarch and U.S. presidents have frequently weighed in on international politics and culture—and have even established close relationships with one another.</p><p>President Ronald Reagan and the royal family, particularly Queen Elizabeth II, developed a unique bond during and after his tenure as president. Just one year into his term, Ronald Reagan spent time with the queen at Windsor Castle during an official visit to Great Britain. The trip, in June 1982, included the pair of world leaders horseback riding, and intimate and personal moment that the president later <a href="https://people.com/royals/the-reagans-friendship-with-the-royals/">said</a> was one of the highlights of his time in office.</p><p>While Ronald Reagan and the royal family came from very different cultures, and doubtlessly differed somewhat in their interpretations of current events of the day, by all accounts, the president and the queen formed a friendship over their commonalities.&nbsp; The Reagans played host to Queen Elizabeth and Prince Philip on numerous occasions during their trips overseas. They stayed at the Reagans’ California ranch and on another occasion dined together near San Francisco, with onlookers recalling the laidback laughter coming from their table.</p><p>Even after Ronald Reagan left office, he kept in touch with the royal family. In 1989, Queen Elizabeth invited him to London to bestow an honorary knighthood upon him, a distinction she has only imparted to two other U.S. presidents.</p><p>The Reagans got to know other members of the royal family as well, with documents tracing hand-written correspondence between the first lady and Prince Charles over the years, the latter of whom attended the president’s funeral in 2004.</p><p>Ronald Reagan and the royal family each made their own unique mark on history—and together, their relationship illustrated the power and potential of world leaders coming together.</p> urn:store:1:blog:post:83 http://www.reagan.com/is-your-computer-being-monitored-online-activity-privacy Is Your Computer Being Monitored? Online Activity & Privacy <p><img height="238" src="https://images.clickfunnels.com/7c/527780634611e88464e903493dccf2/iStock-188077407_super.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><h3>10 Ways to Avoid Being Monitored Online</h3><p>If you’re concerned about the government tracking online activity, you’re not alone. As big tech and government become more entwined, the risk for your online privacy heightens. It’s important to consider how to protect your privacy online for a number of reasons. All Americans have a <a href="https://www.reagan.com/t/government_and_internet_security">right to Internet privacy</a> the ability to conduct personal or professional conversations and transactions online—and any threat to that freedom could not only put your communications and sensitive information at risk of exposure, but also infringes upon your guarantee to freedom.</p><p>Though how to tell if your computer is being monitored is difficult, there are a number of steps you can take to protect against those who want to track online activity. Here are 10 ways to do so:</p><p>-&nbsp; &nbsp; &nbsp;Use private email: Free public services often put your online privacy at risk.</p><p>-&nbsp; &nbsp; &nbsp;Only use <a href="https://www.reagan.com/t/best_email_alternative">encrypted email services</a>: Private email services typically offer end-to-end encryption, which guards against messages being viewed or intercepted.</p><p>-&nbsp; &nbsp; &nbsp;Opt for two-factor authentication: This method enables Internet users to have to verify their identity through another device, such as a mobile phone, in order to log in to any password-protected site.</p><p>-&nbsp; &nbsp; &nbsp;Use an ad blocker: Though you must thoroughly research such applications, ad blockers can be effective at preventing outside partiers from tracking your online activity.</p><p>-&nbsp; &nbsp; &nbsp;Opt out of ad tracking on social media: There are options on sites like Facebook for users to opt out of advertisers browsing their usage.</p><p>-&nbsp; &nbsp; &nbsp;Turn off Google tracking: Access the Activity Control page on Google and toggle the settings to block tracking of things like your browsing history and your locations.</p><p>-&nbsp; &nbsp; &nbsp;Use effective passwords: Do not include any identifiable information or easily guessed numbers or letters in any passwords.</p><p>-&nbsp; &nbsp; &nbsp;Be smart with security questions: Even if you think added security questions provide more security, you have to treat them like passwords and not use easily identifiable answers.</p><p>-&nbsp; &nbsp; &nbsp;Unlink digital accounts: It may be tempting to have all of your social media, both personal and professional, connected, along with services like email, but the more centralized all of the information is, the easier it is to access and track your online activity.</p><p>-&nbsp; &nbsp; &nbsp;Avoid popular cloud systems: Though cloud-storage companies may promise to protect your online privacy, submitting sensitive information to the cloud can put your online privacy at risk, if it’s not handled securely. &nbsp;</p> urn:store:1:blog:post:82 http://www.reagan.com/memorial-day-quotes-speech-ronald-reagan Memorial Day Quotes & Speech | Ronald Reagan <p><img height="238" src="https://images.clickfunnels.com/b2/5cb4605e9811e8aec75b378b72893f/iStock-518730855_high.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>Memorial Day: In His Words</strong></p><p>Memorial Day has come to stand for family barbecues, a day off of work and the unofficial kickoff to the summer season. However, if you look back on the Ronald Reagan Memorial Day speech of 1982, you can see what the real spirit behind the holiday is—and what we need to do to get back to it.</p><p>The Memorial Day quotes of Ronald Reagan were delivered May 31 that year at Arlington National Cemetery, after he placed a wreath at the Tomb of the Unknown Soldiers. His address sought to pay somber tribute to the reason we mark Memorial Day—for the men and women who sacrificed their lives for our country—while also framing that loss in the greater context of what they fought for: peace.</p><p>Reagan, fittingly known as the Great Communicator, poignantly memorialized those who have been lost in the fight for American freedom in one of the most effective ways possible: by noting how little words themselves can truly heal the pain of loss. “I have no illusions about what little I can add now to the silent testimony of those who gave their lives willingly for their country,” Reagan said. Instead, the president urged listeners to take action to honor that sacrifice. The freedom that those men and women died for, he said, does not come cheap and requires another measure of sacrifice from those who have gone on to live and fight for American prosperity.</p><p>With that, Ronald Reagan connected the mission of Memorial Day to the issues facing the country at that time, including ongoing tensions with the Soviet Union. The president used the occasion to announce the launch of the strategic-arms reduction with the country, which he said was an effort to pursue peace, a goal that he noted the fallen military members also shared.</p><p>“As we honor their memory today, let us pledge that their lives, their sacrifices, their valor shall be justified and remembered for as long as God gives life to this nation. And let us also pledge to do our utmost to carry out what must have been their wish: that no other generation of young men will every have to share their experiences and repeat their sacrifice.”</p><p>The Ronald Reagan Memorial Day Speech perfectly illustrates what the occasion should actually be about: a time to remember those whose bravery took them to the front lines of our defense, and inspiration to help us carry out the ideas and ideals for which they fought.</p> urn:store:1:blog:post:81 http://www.reagan.com/major-accomplishments-of-ronald-reagan Top 10 Achievements by Ronald Reagan <p><img src="https://images.clickfunnels.com/56/cc25005dc511e8a8daf30e10358d8b/iStock-458696739_medium.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="238" /><img /></p> <p>Ronald Reagan has long been considered a model for decades of conservative political leaders who came after him. This is primarily due to all that he was able to achieve while in office, but also how because of how deeply those policies and practices became ingrained in the foundation of America. When examining the accomplishments of Ronald Reagan, it's important to note that many of the changes he ushered in during his presidency may not have been fully realized and appreciated until after he was out of office. That makes this lengthy list of Ronald Reagan’s accomplishments even more impressive, and is largely why he is the face of Reagan.com, the <a href="https://www.reagan.com/best_email_alternative">email alternative for conservatives</a> that represents the safety and security America needs.</p> <h2>What Did Ronald Reagan Accomplish?</h2> <ul> <li><a href="https://www.reagan.com/tax-day-ronald-reagan-tax-cutting-legacy-reagancom"><strong>Tax Cuts:</strong></a> One of the most well-known Ronald Reagan major accomplishments was his tax cuts, which were designed to benefit the middle class.</li> <li><a href="https://www.reagan.com/ronald-reagan-reaganomics"><strong>Reaganomics:</strong></a> Tax cuts were just one part of Ronald Reagan's overall economic approach known as Reaganomics, which decreased unemployment and inflation and, over time, revolutionized the country's economic structure.</li> <li><strong>Republican Revolution:</strong> Ronald Reagan energized new generations of Republicans, who continued to lead and develop the party in coming decades.</li> <li><a href="https://www.reagan.com/the-great-communicator-ronald-reagan"><strong>Communication Style:</strong></a> One of the accomplishments of Ronald Reagan that clearly influenced later leaders was his charismatic, yet casual, speaking style, which ushered in a new era for political communication.</li> <li><strong>America First:</strong> Ronald Reagan spearheaded a campaign to re-focus the country's attention back on its own people, an idea that has again taken hold in recent years.</li> <li><strong>Military Might:</strong> Funding and development of the armed forces are a cornerstone of the list of Ronald Reagan major accomplishments, specifically the creation of the Strategic Defense Initiative to combat nuclear pressure.</li> <li><a href="https://www.reagan.com/ronald-reagan-cold-war-policies-reagan-and-russia"><strong>Cold War:</strong></a> Ronald Reagan took a hard stance against communism and is credited with bringing about major turning points in the Cold War.</li> <li><strong>Technology:</strong> The development of new technology, to be used for everything from the military to education, was a key part of Ronald Reagan's platform.</li> <li><a href="https://www.reagan.com/how-reagans-role-in-hollywood-politics-prepared-him-for-the-white-house"><strong>Unusual Path:</strong></a> Ronald Reagan's unique journey from Hollywood actor to governor to president set a new precedent that world leaders do not need to come from insider circles in order to be successful.</li> <li><a href="https://www.reagan.com/ronald-reagans-approach-to-unions-organized-labor"><strong>Labor Unions:</strong></a> A Ronald Reagan accomplishment that has gone on to shape policy was his approach to labor unions that were operating outside of the law. He took a hardline against air-traffic controllers who were unjustly striking, setting a precedent that has been pointed to for decades.</li> </ul> <p>The legacy of former President Ronald Reagan continues today. At <a href="https://www.reagan.com/">Reagan.com</a>, we desire to promote Ronald Reagan's values and resemble his accomplishments by offering the best <a href="https://www.reagan.com/private_email_service">private email service for people with conservative values.</a> <a href="https://www.reagan.com/reagancom-personal-email">Join Reagan.com</a> today!</p> urn:store:1:blog:post:79 http://www.reagan.com/carter-mondale-debates-ronald-reagans-best-moments-in-debates Carter & Mondale Debates | Ronald Reagan's Best Moments in Debates <p><img height="238" src="https://images.clickfunnels.com/2e/26890152d111e8b150f1a929ae3741/iStock-626638342_high.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>Ronald Reagan’s Best Moments in Debates</strong></p><p>President Ronald Reagan was known as the “Great Communicator,” a title that reflected his commanding, yet congenial, speaking style. With a background in acting, Ronald Reagan was a natural public orator, and cleverly harnessed the nation’s exploding reliance on television to his advantage when it came to going head to head with political opponents.</p><p>The Ronald Reagan debates, held in years leading up to his presidential administration, as well as during and even after, captivated supporters, who were energized by getting to see their leader in action. He was known to use wit and even his mannerisms to communicate points in these debates, but he also addressed the issues seriously and defended his positions aggressively.</p><p>In the fall of 2015, the Ronald Reagan Library debate brought together a handful of the leading GOP presidential contenders, many of whom likely sought to model their performances after those of the Great Communicator.</p><p>Here are a few of the best moments from the famous Ronald Reagan debates:</p><p><strong>“There you go again”: </strong>At the 1980 Jimmy Carter-Ronald Reagan debate, Reagan was just days out from unseating the incumbent president, and many say the debate played a significant role in his eventual victory. Among the most famous moments of the event, Ronald Reagan sighed and said, “There you go again,” when Jimmy Carter started criticizing his record. The interaction illustrated Ronald Reagan’s confidence and ability to minimize opposition, not to mention that it elicited lots of laughs from the public. Reagan was trailing Carter by about eight points in polls going into the debate and, after the event, which was one of the highest-rated television programs in years, surged ahead.</p><p><strong>“Are you better off than you were four years ago?”: </strong>In that same debate, Reagan famously asked Americans, “Are you better off than you were four years ago?” The question was succinct and straightforward and, clearly, resonated with voters.</p><p><strong>“Youth and inexperience”: </strong>In his debate with Walter Mondale, who sought to prevent Reagan from a second presidential term, the president was asked if his own advancing age could be problematic for his tenure. Reagan turned the question on its head, pledging not to make “age an issue of this campaign.” He went on, however, to jokingly commit to avoid exploiting his opponent’s “youth and inexperience.”</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;</p> urn:store:1:blog:post:78 http://www.reagan.com/the-great-communicator-ronald-reagan The Great Communicator | Ronald Reagan <p><img src="https://images.clickfunnels.com/88/71a5914d4d11e89994bd5883ef774c/communicator.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="238" /><img /></p> <p>Why is Ronald Reagan called "The Great Communicator"?</p> <p>Ronald Reagan, who was known as The Great Communicator, has been deemed one of the best public speakers in American history, and for good reason. The impact of his nickname as The Great Communicator not only was central to his presidency, and all that he was able to accomplish during it, but his unparalleled communication skills and approaches—perhaps developed during his time as a Hollywood actor—went on to shape decades of future political leaders.</p> <p>So, just how did the phrase “Ronald Reagan, The Great Communicator” come to be? He had already solidified the title by 1976, when it was referenced in a column in the</p> <p><em>New York Times. </em></p> <p>By that point, Reagan had spent eight years as governor of California, a role he was in part propelled forward into after a famous speech he gave in support of then-presidential candidate Barry Goldwater in 1964. Known as “A Time for Choosing,” that speech, in which he emphasized the effect of small government, raised $1 million for the candidate and was a major boost to Reagan’s own political aspirations.</p> <p>During his terms as governor, Ronald Reagan solidified his reputation as a strong speaker, skills he used to set his sights on the White House. He delivered a number of speeches during his campaign that were both fiery but also familiar. For instance, in his last debate with President Jimmy Carter before the 1980 election, Ronald Reagan directly addressed American voters watching the television event, a tactic Carter failed to do. Just who was The Great Communicator trying to reach with that speech? Not only Republicans, but also all American voters who were eager for a president who spoke directly to—and, by extension, worked directly for—them.</p> <p>Once he secured the presidency, that tendency to passionately address the American people continued, from State of the Union addresses to times of crisis and everything in between. Ronald Reagan’s capacity to connect with countless Americans at once inspired future leaders to tap into the power of television and other means of instant communication to spread their message—and to use the momentum encouraged by those mediums to build their policies and platforms.</p> <p>             </p> urn:store:1:blog:post:77 http://www.reagan.com/best-private-email-providers-that-dont-track-you Best Private Email Providers that Don’t Track You <p><img height="238" src="https://images.clickfunnels.com/e9/6edc5047cb11e8a4e70d7e52cd3e8f/iStock-537708180.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img /></p><p><strong>Finding an Email Provider That Doesn’t Track You</strong></p><p>Email is now ingrained in our way of life: We use it to work, we use it communicate with family and friends, we use it to pay bills and shop—all of our most personal, as well as professional, messages usually find their way into our email. So, why would we want our email provider to be seeing, and even more especially, <em>using </em>our email and online activity?</p><p>Good email providers prioritize users’ privacy, giving them control over their messages, and putting in place strong filters to limit spam mail and targeted advertising. However, many public providers instead track their users’ activity, seeing what messages come in and out of their accounts as well as monitoring other online activity in order to tailor advertising. Large providers have been known to sell users’ information to third parties and are also frequently targeted by hackers, who can easily access their wide databases of information, which are stored externally.</p><p>The most effective way to avoid those risks is to opt for a <a href="/t/privateemailservice">private email provider</a>. The best private email providers do not track users’ activity, with most founded on the idea that they will not keep a log of users’ IP address because such an approach is a privacy violation. They also offer a number of additional tools that public providers neglect. For instance, most will offer encryption, which provides an added layer of protection for users. The best email provider will utilize end-to-end encryption, guaranteeing well-rounded password security. Many of the best private email providers also steer away from taking advertising dollars, meaning both unbiased and secure services.</p><p>With email so central to our everyday communication, privacy should also be a primary goal. Just as we wouldn’t want the U.S. Postal Service monitoring our daily activities and filtering us snail mail based on that, we shouldn’t allow email providers to violate our privacy.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;</p> urn:store:1:blog:post:75 http://www.reagan.com/president-ronald-reagan-political-views-political-beliefs President Ronald Reagan Political Views & Political Beliefs <p><img height="238" src="https://images.clickfunnels.com/78/35dc603cd011e899dfbd7e25558ac0/Reagan-Blog-2-Quotes.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /><img <="" p="" /></p><p><strong>What Provided the Biggest Influence for Ronald Reagan’s Political Views?</strong></p><p>Ronald Reagan is perhaps one of the most iconic conservative political leaders in American history. He is known as a champion of freedom and individual success, ideas that formed the basis of his views on everything from economics to religion to trade. Ronald Reagan beliefs have become a model for conservative leadership, one that many aspiring politicians aim to follow.</p><p>But what helped the Ronald Reagan political views become so firm, and because of that, so enduring? Many political pundits point to his working-class upbringing.</p><p>While it may seem contrary to his future political path, Ronald Reagan was raised by parents who were registered Democrats. While Ronald Reagan went on to make a name for himself as a Republican leader, the foundational values that drove his parents likely instilled the ideals that guided his later political activity.</p><p>His father, Jack, struggled with alcoholism yet also was a hard worker, one who had to move his family several times when his children were young as they struggled to make ends meet. Ronald Reagan’s parents not only instilled in him the idea that each American has a responsibility to work hard to provide for his or her family, but they also modeled community citizenship. Both of his parents were actively involved in the church and political organizations and gave back to volunteer initiatives. They showed him that taking care of one’s family and one’s community go hand in hand. His parents were also strong believers in equality; even though when Ronald Reagan was young, many Americans faced inequalities, his parents fought back against such treatment, with his father even barring him and his brother from watching films that sanctioned discrimination.</p><p>Those ideas can be easily glimpsed in Ronald Reagan’s later work and views. He became a strong voice for the working class, understanding that hardworking Americans were the backbone of the country, just as they were in his community growing up. Ronald Reagan came from humble beginnings but, because of the leadership of his parents, he was able to grow into his potential, an idea he sought to communicate to the rest of the country.</p> urn:store:1:blog:post:74 http://www.reagan.com/ronald-reagan-politics-reagans-view-coming-back-into-popularity Ronald Reagan Politics | Reagan’s View Coming back into Popularity? <p><img height="238" src="https://images.clickfunnels.com/7f/da2b90373c11e8b936ad31e2e2f24d/Reagan-Politics-coming-back-to-popularity_.png" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p><strong>Are Reagan's Views Coming Back to Popularity?</strong></p><p>For decades, supporters of Ronald Reagan have been eager for the country to embrace the values and views that the late president so embodied. Perhaps more than any other modern president, Ronald Reagan’s outlook was ingrained in his politics, making for a platform and policies that were well-rounded and comprehensive—and giving conservatives hope for their own future and that of the country.</p><p>In recent years, the country’s political leaders and parties seem to have fallen out of touch with the ideas and ideals that were key to Reagan politics. Political pandering has taken center stage, pushing serious debate and real issues to the side. Unlike with Ronald Reagan, whose convictions were evident in all of his policymaking, many modern leaders are too focused on elections and not enough on bringing about real change. Add to that, technology is making our world ever more global and ever more connected, and the America-first, commitment to hard work and personal pride that Ronald Reagan embraced has fallen to the wayside.</p><p>But in the last two years, the country seems to have woken up a bit. Perhaps energized by the highly contentious 2016 presidential election, American voters have taken a much more proactive approach to politics, bringing the issues affecting their communities to the national stage. Everyone from small-town factory workers to suburban schoolteachers have started organizing around issues such as education, religious freedom and respect for the military and law enforcement—all issues that were central to Ronald Reagan. Even the technology that often threatens to divide and distract Americans has become a political tool, as conservatives are increasingly going online to share news, learn, organize and build stronger foundations for the future.</p><p>Ronald Reagan was a strong proponent of putting American interests, especially those of the working class, before all else—and that is a goal that appears to be making a comeback.</p> urn:store:1:blog:post:73 http://www.reagan.com/technology-politics-how-do-politics-impact-the-tech-sector Technology & Politics | How do Politics Impact the Tech Sector? <p><img src="https://images.clickfunnels.com/b5/6e7c9031c711e8abc6bbbaff4643b6/Technology-and-Politics---4.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="238" /></p> <p><strong>How Politics Impact the Tech Sector</strong></p> <p>        The technology industry is, by leaps and bounds, the fastest-growing sector in America, with its output powering just about every aspect of American life. It’s no wonder then, that in today’s highly politicized society, technology and politics have collided.</p> <p>        The rapid pace at which the tech sector is flourishing, combined with its unparalleled role in American life, have given the industry unprecedented value. With value comes power, and we’ve seen that in action in recent years.</p> <p>        For instance, some of the biggest tech giants—Amazon, Microsoft, Facebook, Apple and Google—spent a combined nearly $50 million lobbying lawmakers in Washington, D.C., last year, according to <a href="https://www.theguardian.com/technology/2017/sep/03/silicon-valley-politics-lobbying-washington">The Guardian</a>. These five tech firms have together surpassed Wall Street lobbyists—by a whopping two-to-one ratio.</p> <p>        Why all the political pressure? As technology has grown, so too have regulations on the industry. From anti-competition to taxes to net neutrality, tech leaders are looking to cozy up to D.C. policymakers to have a say in issues that could affect their bottom line and shape the continued evolution of the technology world. Just as oil and environmental agencies have invested heavily in D.C. lobbying to protect their interests when it comes to legislative regulations, so too are tech companies seeking to advocate for policies that make sense to the industry and to their respective organizations.</p> <p>However, when it comes to technology and politics, a lot of the politics might seem to lean liberal.</p> <p>        A 2017 Stanford University <a href="https://www.nytimes.com/2017/09/06/technology/silicon-valley-politics.html">study</a> found that leaders in the tech industry overwhelmingly vote Democratic, and largely support labor unions, liberal social issues and wealth-distribution plans.</p> <p>For conservatives, this statistic can be a call to action: The tech industry may have a majority of left-leaning representatives, but that doesn’t mean there aren’t conservatives working in the industry. The growing political involvement and power of the tech sector can serve to motivate such individuals to organize and speak out, in order to demonstrate that no industry should support just one political party. In addition, it is important to remember conservative values such as the right to privacy and freedom of speech as the tech industry continues to lean towards the left. Remember these rights and values as you engage with more tech companies, including <a href="https://www.reagan.com/">email service providers.</a></p> <p>        The technology field is broad and diverse and, as such, its leadership and political might should be as well.</p> urn:store:1:blog:post:72 http://www.reagan.com/remove-personal-information-from-internet-stay-safe-with-personal-email Remove personal information from internet | Stay Safe with Personal Email <p><img height="238" src="https://images.clickfunnels.com/0e/002eb02c5711e8a8fc1746f9d7f11a/Personal-email---3.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p><strong>How Your Data Affects What You See—And How Private Email Helps You Stay Safe</strong></p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Online advertising is a rapidly evolving industry, one that is increasingly becoming a personalized and targeted experience.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; For instance, you may have noticed that, shortly after you conduct a search for a particular product on Google, something related to that item shows up on advertising spots in your email. Or, after visiting news sites focused on a particular political leaning, your email starts getting bombarded by messages carrying political subjects. The phenomenon even extends to the grocery store: When you download mobile coupons through your store’s app, you may be surprised to find pop-up advertising for what you just bought the next time you log online.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; In today’s digital age, our online—and even offline—habits aren’t private. Google and other sites may be tracking your digital footprint in order to create a profile that will help companies that want to target you for advertising or other purposes.&nbsp; On top of that seeming privacy intrusion, this practice also can leave Internet users’ personal and potentially sensitive information unprotected.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; There are a number of options for how to get personal information off of Google. First, log into Google’s My Activity tab and delete your history. Then click the Activity Controls tab and toggle the button to off for each of the tools you use, such as web activity, YouTube and location services.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; If you’re exploring how to remove personal information from the Internet, you can also consider modifying your browser settings to the Incognito mode, which allows you to surf the web without your activity being tracked.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; One of the best options for people who want to know how to get your personal information off the Internet is to get a private email account. Free public email services are prone to working with advertisers to target users based on their online practices, meaning increased spam mail, clogged inboxes and deceptive pop-up ads. Private email, however, with its encryption and other security measures, prioritizes users’ privacy as opposed to exploiting it.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Our personal data should be just that: personal. Taking proper online precautions like modifying privacy settings and signing up for private email can help Internet users protect themselves and their information.</p> urn:store:1:blog:post:71 http://www.reagan.com/myths-truths-about-our-actions-online Myths & Truths about our Actions Online <p><img height="238" src="https://images.clickfunnels.com/be/7f9c4026cf11e88c5a23969345955d/Truth-and-Myths-Online--2.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>Myths and Truths About Our Actions Online</p><p>Most Americans use the Internet every single day, particularly through email, which powers all aspects of our personal and professional lives. But, even though it's something that we all use frequently, it's often misunderstood, especially when it comes to how we should best protect our privacy and freedom.&nbsp;</p><p>Here are a few misconceptions about online use, and facts that can keep you secure when using the internet.</p><p>Myth: No one can access your email without your consent.&nbsp;</p><p>Truth: There are a number of instances in which your email can be subject to privacy violations. Apart from malicious hacking, public email services often store messages on large public servers, which could open them to prying eyes. Without a secure private email address, someone may also be able to gain access to your communication through a freedom of information and privacy-related request. Encrypted, private email is the best way to ensure your messages are secure.</p><p>Myth: Changing your email password is the most effective way to secure your email.</p><p>Truth: The most secure online email address isn't made so by a password. What matters more is the type of email server that is used, as private email is more safely processed and stored. Password changing is smart, but that alone cannot protect your email. Adding extra layers of security, such as through private email, encryption and other means, is the best approach.</p><p>Myth: Phishing scams are obvious to spot.</p><p>Truth: Phishing emails, or those that are disguised to trick users into divulging sensitive information, are getting more and more sophisticated. Emails may be modeled after real messages down to the most minute detail, making it near impossible to spot the scam. Even the most astute Internet user can be persuaded by the convincing tactics that phishing scammers have adopted. Having stringent email security in place is the best kind of defense against what could be dangerous email scams.&nbsp;</p> urn:store:1:blog:post:70 http://www.reagan.com/ronald-reagan-vs-donald-trump-similarities-and-differences Ronald Reagan vs. Donald Trump: Similarities and Differences <p><img src="https://images.clickfunnels.com/cf/7d5d70217511e89024b7f9f344ac90/Donald-Trump-1.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="238" /></p> <p>When Donald Trump took office, almost immediately, people began drawing comparisons to President Ronald Reagan. However, another subset of conservatives argued that the two were stark contrasts to one another. Which camp is right? The answer may lie somewhere in the middle.</p> <h2>Similarities</h2> <p>Shortly after Trump’s tenure began, he went to work on an issue that also resonated with Ronald Reagan: <a href="https://www.reagan.com/ronald-reagan-on-big-government-most-terrifying-words">government deregulation.</a> Headlines touting that Trump undertakes most ambitious regulatory rollback since Reagan rankled liberals but energized conservatives who had been anxious for a president with the same passion that Ronald Reagan had for removing big government from Americans’ daily lives. Trump and Reagan both understood that bureaucratic red tape that regulates so many industries deprives Americans of job opportunities and stagnates the economy.</p> <p>The Trump and Reagan similarities encompass many other policy issues: Both have backed <a href="https://www.reagan.com/ronald-reagan-and-religious-freedom-reagancom-1">religious freedom</a>, invested heavily in building a strong military, <a href="https://www.reagan.com/tax-day-ronald-reagan-tax-cutting-legacy-reagancom">pioneered tax cuts to invigorate job growth</a> and put money back in the pockets of working-class Americans and have supported limiting entitlement programs in favor of back-to-work and job-readiness initiatives. Underlying nearly all of their domestic and international positions has been a shared belief in the “America first” approach—that, first and foremost, the government should be investing in ways to keep the country safe, prosperous and growing.</p> <h2>Differences</h2> <p>However, the two aren’t completely cut from the same cloth. When it comes to Trump vs. Reagan, some differences do stand out. For instance, Trump opponents have long argued that the president does not treat all people equally—particularly, that he marginalizes women and minorities. While that claim is up for debate, what’s not is Reagan’s position on equality: He was a firm believer in personal freedom, and that extended to all people, regardless of sex, race, religion or other characteristics. That commitment to full equality was a cornerstone of his presidency yet is something many say is missing from Trump’s.</p> <p>Another issue that has been raised in the Ronald Reagan vs. Donald Trump discussion is both presidents’ communication styles. Trump has come under fire for what some say is an overuse of social media, which opponents say is too informal and unsophisticated of a means of presidential communication. Reagan, however, was known as the “Great Communicator,” someone who chose his words carefully and delivered them with both poise and empathy.</p> <p>As Trump’s presidency continues, the debate over his similarities and differences with Ronald Reagan surely will as well.</p> urn:store:1:blog:post:69 http://www.reagan.com/the-lasting-effects-of-reaganomics The Lasting Effects of Reaganomics <p><img src="https://images.clickfunnels.com/7b/ff9e011bf411e88f70d1daddfdd72c/Reaganomics-Blog-4.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="238" /></p> <p>One of the cornerstones of President Reagan's tenure was his economic policy, dubbed Reaganomics. Under this plan, Reagan aimed to reduce federal spending, put more money back into the pockets of working-class Americans and slow the rate of inflation—all promises on which he delivered.</p> <p>Decades after the Reagan presidency ended, we're still feeling the effects of Reaganomics, both practically and culturally.</p> <h2>Reagan’s Economic Plan</h2> <p>President Reagan's economic approach was designed to invigorate a sluggish economy and create jobs and opportunity, goals that quickly came to fruition. Reaganomics’ tax cuts lessened the financial burden on hard-working Americans and encouraged corporations to invest in job growth.</p> <h2>Impact of Reaganomics Today</h2> <p>Those are impacts that spurred long-lasting changes. Because the economic downturn that preceded Reagan was halted and corporations received a shot in the arm, many were able to stabilize themselves and form the building blocks for long-term success. When Reagan left office, 20-million more Americans were employed than when he first became president. His job-growth rate set a high bar for future leaders to strive towards.</p> <p>Inflation dramatically slowed, and the flourishing workforce increased the median annual household income nearly 10-fold. More working-class Americans were able to purchase homes, invest in their children's education and contribute to the booming economy. At the same time, wasteful spending was controlled, with more money being allocated to defense instead of entitlement programs. That shift in priorities helped strengthen the American military to the leading global power it is today and promoted its use of and investment in technology.</p> <p>President Reagan's economic policies have long been looked to as a blueprint for growth, and most recently have been invoked as a model for the tax-reform legislation, which already has led to windfalls for countless Americans. Reaganomics ushered in one of the most prosperous times in American history and laid the foundation for continued economic progress.</p> urn:store:1:blog:post:68 http://www.reagan.com/net-neutrality-will-it-impact-you Net Neutrality: Will it Impact You? <p><img height="238" src="https://images.clickfunnels.com/45/ce4f80173e11e8839cf935112e9953/Net-Neutrality---Blog-3.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>When you're surfing the Internet or checking your email, net neutrality is one of the many catchphrases that is guiding your activities. It's also been a guiding principle in heated political debates recently.&nbsp;</p><p>So what exactly is this topic that's causing so much conflict?</p><p><strong>Net Neutrality: A Definition</strong></p><p>The basic concept of net neutrality is that the Internet should be a place for the free exchange of ideas and information. The phrase was incorporated into American lingo a few years ago when President Obama's administration charged the Federal Communications Commission with regulating Internet-service providers. According to the Obama administration, ISPs had too much authority to block or promote certain content, threatening net neutrality and restricting free, public access.</p><p>However, the net neutrality rules effectively treated ISPs as public utilities, subject to oversight by the government in a move many conservatives blasted as an extreme over-reach. Last year, the FCC moved to roll back the Obama-era rules and return control of the Internet experience to the American public.</p><p><strong>Net Neutrality and You</strong></p><p>So how does this ongoing debate affect everyday Americans? Most experts say it's unlikely that Internet users will feel much of an impact at all. Rather, the discussion is more about the overarching concepts at play.</p><p>Pundits on both sides of the political aisle will likely agree that the concept of net neutrality is one that should be looked at, as the Internet should remain free from discrimination, yet also be a realm that encourages competition. However, net neutrality in its most modern sense—with the FCC taking control over Internet regulations—is not what the authors of the original telecommunications legislation that net neutrality amended had in mind.&nbsp;</p><p>While the Internet was an emerging tool in the days of President Ronald Reagan, the principles on which he built many of his platforms give us a clue into what his feelings on the topic would be. Reagan often spoke about the dangers of federal overreach, and that an over-regulated American economy could have a significant and damaging effect on American prosperity.</p><p>Likewise, the FCC mandating net neutrality could threaten competition and deprive Americans of their rights to freedom, neither of which would be outcomes that President Reagan would support.</p> urn:store:1:blog:post:67 http://www.reagan.com/the-politics-behind-cybersecurity-where-we-are-and-where-we-need-to-be The Politics Behind Cybersecurity: Where We Are, and Where We Need to Be <p><img height="238" src="https://images.clickfunnels.com/50/46226110ec11e89c0cd9fbe17f3967/Current-Cyber-Secuirty-Issues.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" /></p> <p>Politics is everywhere in American society today: Rarely can you watch a television show, read a magazine, attend a community event or even help your child with homework without politics, in some way, coming up.</p> <p>        As the internet powers nearly every facet of American life, it’s only fitting that its operation is also touched by politics.</p> <p>        The term cybersecurity—as its relates to secure private email and other online areas—has taken center stage in recent political debates, as the leading parties come to loggerheads about how Americans should be protected when using the Internet. Some of that immobility may stem from the fact that political leaders themselves are directly affected by the topic of cybersecurity.</p> <p>        For instance, <a href="https://www.reagan.com/blog/48/the-differences-between-kushners-and-clintons-private-email-issues">Hillary Clinton’s use of a secure private email service</a> to handle official business became a hot topic during the 2016 presidential election. Then-candidate Donald Trump blasted Clinton for potentially exposing sensitive information and later attempting to cover it up. However, once Trump took office, his own administration came under fire for members of the staff also using private email to conduct government communication.</p> <p>        There’s no question that secure private email services provide <a href="/privateemailservice">unparalleled benefits</a> for American email users; however, because the waters are a bit murky surrounding how private email use by high-level political officials is regulated, the conversation takes a distinct political turn.</p> <p>        Trump, who has been dubbed America’s first “Twitter President,” also adds several other political dimensions to the topic of cybersecurity. With just the touch of a button, the leader of the free world can communicate with millions of people, a method of communication Trump has fully embraced. While Twitter and other social media platforms boost global connectivity, their <a href="/white_house_private_email">use by political leaders</a> makes their security all the more important. For instance, if Trump’s social media accounts were to be hacked, the messages that could be disseminated could have significant and immediate global consequences.</p> <p>                Countless discussions and debates happening in American society right now are distinctly political and, because of the increasingly universal reliance on the Internet, cybersecurity is among them.</p> urn:store:1:blog:post:66 http://www.reagan.com/what-you-can-do-to-maintain-your-privacy-on-the-cloud What You Can Do to Maintain Your Privacy on the Cloud <p><img height="238" src="https://images.clickfunnels.com/ba/264e500b7211e896d23153268565dd/Cloud-Storage-Blog-1.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>In today's digital age, phrases like "safe deposit box" are being phased out, replaced with new storage systems like "the cloud." While email security has long been a focus for those looking to maintain their digital privacy, increasing reliance on the cloud is also prompting discussions about <a href="https://www.reagan.com/t/private_email_service/">how users can protect themselves</a> and their sensitive information.</p><p><strong>What is the Cloud?</strong></p><p>The broad nature of the cloud has often made it the target of misunderstanding, and even jokes about its ambiguous-sounding name. In reality, the cloud is a type of online storage offered by a wide range of providers to help internet users store professional or personal data.</p><p>In professional realms, most large corporations rely on it to store or process significant amounts of customer and client data, and employees may tap into a cloud system to facilitate working both in the office and on the go in today's ever-mobile workforce. On the personal side, cloud storage can be utilized for storing and sharing everything from photos to banking documents and other sensitive information.&nbsp;</p><p><strong>How to Stay Safe in the Cloud</strong><strong><br /> </strong></p><p>Just as now-outdated flash drives were prone to security issues, so too is the cloud.</p><p>There are a number of steps users can take to protect their privacy. When it comes to security, email can be an entry point to the cloud for hackers. Most cloud providers will verify login and password information through an automated email, so ensuring email security by using an encrypted, private email service is an important line of defense.</p><p>You can also opt for added encryption for your cloud data. Services like <a href="https://b1.org/">B1 Free Archiver</a> allow cloud users to password-protect files that they upload to the cloud to provide an extra layer of security. Some cloud providers like <a href="https://spideroak.com/">SpiderOak</a> or <a href="https://tresorit.com/">Tresorit</a> also have built-in encryption tools.</p><p>Finally, one of the best ways to protect yourself on the cloud comes down to common sense: Just like you wouldn't leave a key to your house in your mailbox, or you wouldn't save a list of credit card numbers in your email, don't put highly sensitive information on the cloud. While there are ways to reduce your risk of a privacy issue, avoid it altogether by not storing such data on the cloud.</p> urn:store:1:blog:post:65 http://www.reagan.com/what-are-the-potential-implications-of-not-using-a-private-and-secure-email-service What are the Potential Implications of Not Using a Private and Secure Email Service? <p><img height="238" src="https://images.clickfunnels.com/f0/f75db0060011e892961d269085fd9b/Most-Secure-Email-Address---Blog-1.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" /></p> <p><strong>Cyber security is a hot-button issue these days, and for good reason.</strong></p> <p>        As hacking becomes more sophisticated and organized, the role that a secure email address can play in protecting one’s personal and professional information is becoming more defined. However, despite the <a href="/privateemailservice">benefits of a private email account</a>, many people are still using public, non-protected email, putting themselves and others at serious risk.</p> <p>        <strong>Just what are the ramifications of not using a secure email address?</strong></p> <p>        Public email providers store all messages on external servers, which could make that information more vulnerable to hacking. That risk has become a reality in recent years, with widespread security breaches at public providers like Yahoo.</p> <p>        Such intrusions could have serious implications for users. Personal information like financial data, passwords, contact information and more could be at risk in the event of an email breach. That data in the wrong hands could lead to identity theft or credit card fraud, which could take months and even years to rebound from.</p> <p>        Using a non-private email account for business purposes could have extremely far-reaching impacts. If sensitive company data is stolen, the organization’s financial future could be at risk. If information about the company’s customers is exposed, that not only puts each customer at risk, but threatens the business’ reputation and its relationship with current or future clients.</p> <p>        Public providers are also subject to more extensive surveillance by federal agencies because of regulations the servers abide by; that could put users’ information under unnecessary surveillance. Such email providers are also more easily compelled to turn over message through legal requests like those filed under the Freedom of Information Act than private email accounts.</p> <p>        All of these risks can be remedied by using a secure email address, an easy and efficient way to protect yourself online.</p> urn:store:1:blog:post:64 http://www.reagan.com/reaganomics-how-it-worked-why-it-was-successful Reaganomics - How it worked, why it was successful <p><img height="238" src="https://images.clickfunnels.com/0d/306b80007911e8a9bfa9f73e820583/What-is-Reaganomics-Blog-3.png" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>One of the cornerstones of President Ronald Reagan’s presidency, like your Reagan email, bears the name of the leader: Reaganomics.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The president came into office when the country was stagnating economically and, at the end of his two terms, he was able to set the country on a financially forward path that has continued to impact Americans three decades later.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; So what exactly is Reaganomics? The plan was founded on two primary principles:</p><p><strong>Supply-side:</strong> Reagan knew that the country could get on the right economic path by decreasing the role that the federal government played in the domestic market and lowering taxes. This economic approach puts more money in the pocket of consumers, as well as helps create jobs.</p><p><strong>Trickle-down economics:</strong> Going hand-in-hand with supply-side is the idea that reducing tax rates for corporations and the wealthiest will encourage more business investment, which ultimately “trickles down” into the working class.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Those theories led Reagan to institute a number of economic changes, including:</p><p><strong>Tax cuts:</strong> Reagan slashed tax rates for the wealthiest citizens from 70% to 28%, and from 48% to 38% for corporations.</p><p><strong>More military spending:</strong> Throughout his tenure, Reagan increased military spending by 43%. Reagan also invested heavily in innovative technologies, many of which were designed to revamp and revolutionize the military.</p><p><strong>Less social spending:</strong> Dissatisfaction with the heavy investment in social-welfare programs was a major issue during Reagan’s campaign, and he made good on his pledges to reduce such spending once he was elected. Within his first year in office, Reagan cut out $25 million in spending on social programs and, throughout his time in office, reduced expenditures on welfare, food stamps and state-funded health care.</p><p><strong>Less government involvement:</strong> Reagan made strides to deregulate spending on industries like oil, natural gas and telecommunications.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Reagan’s plan revolutionized American spending — and to great effect. By the time he left office, tax revenue had nearly doubled, from about $500 billion to more than $900 billion; his tax cuts are largely credited with ending the recession the country had been in when Reagan took the presidency. Inflation was tamed, unemployment rates reduced and the gross national product rose.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; After Reagan left office, the country saw one of its most economically prosperous times ever, and it is Reaganomics that is credited with building a strong foundation to make that growth possible.</p> urn:store:1:blog:post:63 http://www.reagan.com/should-american-citizens-be-concerned-about-the-privacy-of-their-email Should American citizens be concerned about the privacy of their email? <p><img height="238" src="https://images.clickfunnels.com/49/1e93a0fafd11e79470835f1ff2010a/Conservative-Email-Information-Blog-1.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>Americans are rapidly relying on email for just about all facets of their daily lives. However, with cyber security also rapidly evolving, and hacking becoming more sophisticated, concerns are growing about how the two worlds will collide — and for good reason.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; While email breaches have been front and center in international politics in the last year, concerns about email privacy have also trickled down to everyday Americans. For instance, from 2013-14, an estimated 1.5-billion Yahoo users had their emails hacked, according to the <a href="https://www.nytimes.com/2016/12/14/technology/yahoo-hack.html">New York Times</a>. In a separate case, <a href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/gmail-yahoo-email-accounts-hacked-25-million-sold-dark-web-suntzu583-a7641196.html">The Independent</a> reported than 25-million Yahoo and Gmail accounts were compromised, and users’ information was being sold online. Unlike a private email address, a public account like this is more susceptible to hackers, who are increasingly tapping into advancing technology to their advantage, continuously upping the threat of using a public email service.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Email security may seem like a vague, intangible concept to some, but for those who have been directly affected, it can be extremely impactful. A security breach can expose a user’s sensitive financial information, opening him or her up to identity theft, fraud and a host of other complications. Private communications can also fall into the wrong hands, potentially leading to significant personal or professional challenges.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; However, Americans appear to be taking the issue seriously. In a recent survey, the <a href="http://www.pewresearch.org/fact-tank/2016/09/21/the-state-of-privacy-in-america/">Pew Research Center</a> found that 86 percent of those polled had taken steps to increase their online security and were eager for tools to further protect themselves. In the same poll, only 3 percent of respondents said they were “very confident” that their email providers would keep their information private and secure; more than 55 percent expressed doubt.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; From masking an IP address to installing trusted antivirus software, Americans can take a number of simple steps to protect themselves online. Registering for a private email address is also an effective security tool. Such services prioritize safety and security, and, unlike large public providers, don’t share users’ data or store it externally.</p><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; With so many other issues to grapple with in American society today, email security shouldn’t have to be front and center; however, those who haven’t taken the step of using a private email address do need to be conscious of the security threats they face.</p> urn:store:1:blog:post:62 http://www.reagan.com/why-are-conservatives-concerned-about-keeping-their-email-information-private-and-secure Why are conservatives concerned about keeping their email information private and secure? <p><img src="https://images.clickfunnels.com/bf/498be0f60f11e7ad6aa56dd51981d3/Should-Americans-be-Concerned-about-Cyber-Security.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="238" /></p> <p>Conservative email providers like <a href="https://www.reagan.com/">Reagan.com</a> have never been more important.</p> <p>      The free exchange of conservative ideas is coming under fire in just about every realm; from mainstream news to religious circles to workplaces, the pushback against the conservative political majority is impacting nearly every element of American society. Email is no exception.</p> <p>      <a href="https://thehornnews.com/email-providers-biased-conservatives/">Research</a> has shown that public email providers are suppressing conservative emails, filtering such content to junk folders at a higher rate than liberally bent emails. That means that information that an email user is actively trying to access may be restricted, which not only threatens one’s personal freedom but also infringes on his or her ability to be informed and educated. A <a href="https://www.reagan.com/best_email_alternative">conservative email service</a>, on the other hand, ensures users’ rights are protected, along with their privacy.</p> <p>      Privacy is a key issue when it comes to email. Public email services store all of their data on external servers, which increases the risk of a security breach. Many providers also share users’ information with other companies; the more sources that have your email, the more clogged your system may become with unwanted, and often liberally motivated, messages.</p> <p>      On top of that, conservative email users have to contend with the highly politicized environment in which we’re living, which may urge them to value their privacy even more than liberals. Despite a conservative majority leading our nation, political correctness continues to spread, and many whose values or views run counter to that status quo risk being maligned. For instance, conservative business owners across the nation have been targeted for exercising their freedoms, and their livelihoods threatened when their stories go viral on social media.</p> <p>      Those who hold conservative views have had their voices silenced, both literally and figuratively, in recent years, prompting many to keep their political leanings private, making email security all the more important. <a href="https://www.reagan.com/private_email_service">Conservative email providers like Reagan.com</a> recognize how important their users’ privacy is. All email users deserve the peace of mind that comes with having a secure email service, but conservatives especially need to know that their private communications are indeed private.</p> urn:store:1:blog:post:61 http://www.reagan.com/ronald-reagans-approach-to-unions-organized-labor Ronald Reagan’s Approach to Unions & Organized Labor <p><img src="https://images.clickfunnels.com/09/098cc0ec0211e78b5b4fac02164bc2/Ronald-Reagan_s-Approach-to-Unions-.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="238" /></p> <p>Former President Ronald Reagan's time in office was motivated by two principles or ideals—freedom and the right to privacy. These two principles inspired Reagan's approach to organized labor and unions. As unions and the Republican Party have often come to loggerheads, Reagan took a very hard stance against unregulated unions. He ultimately believed that employers deserved the right to define their own business practices. Thus, regulation by the government or by unions could threaten that basic ideal, restricting companies' productivity and contribution to the American dollar.</p> <h2>Background on Reagan's Union and Organized Labor Stance</h2> <p> </p> <p>During Reagan's presidency, organized labor was on the rise as workers mobilized to pursue more active roles in the management of their companies. In some cases, those efforts led to work stoppages and put companies' security at risk as well as workers' livelihoods. As a result, one of the nation's most well-known union crises began during Reagan's presidency.</p> <p>Shortly after Reagan took the helm of the country, more than 13,000 air-traffic controllers went on strike after the collapse of contract talks between their union and the Federal Aviation Administration. The workers sought higher wages and reduced working hours in a package that totaled more than $770 million. The strike grounded thousands of flights, stranding travelers across the country just as the summer travel season was at its height.</p> <h2>Reagan's Response to Unions and Organized Labor</h2> <p> </p> <p>Reagan ordered the federal workers back to their posts, but they ignored his mandate. In an unprecedented decision, the president fired more than 11,000 of the workers on strike. Non-striking workers were joined by military personnel to man the vacant posts, and air travel was quickly restored.</p> <p>Reagan's bold pronouncement sent an unparalleled message to the private sector. Businesses gleaned that threats from unionized workers do not need to go unanswered. They can take a hard line on their organizational principles and still be successful. The move also illustrated to unions that their employers have the right to maintain productivity and cohesion, <strong><i>with or without their buy-in</i></strong>.</p> <p>The president continued to reinforce that message throughout his tenure, demonstrating that while the rights of individual workers are important, the overall bottom line of a company also must be respected. This is a concept that encouraged both competition and workforce development for decades to come.</p> <p>President Ronald Reagan's tenacity in responding to the crisis is still honored today. During this time, Reagan held firm to his principles of freedom and privacy, the two underlying values that inspired Reagan.com. At <a href="https://www.reagan.com/">Reagan.com</a>, we also believe in personal privacy and security. <a href="https://www.reagan.com/reagancom-personal-email">Join Reagan.com today</a> and sign up for our <a href="https://www.reagan.com/private_email_service">private email service</a> to communicate in a way that honors Ronald Reagan's conservative principles.</p> urn:store:1:blog:post:60 http://www.reagan.com/how-to-choose-conservative-alternatives-to-some-of-the-most-popular-websites How to Choose Conservative Alternatives to Some of the Most Popular Websites <p><img src="https://images.clickfunnels.com/7a/c41960e59111e7a5f7092d01b2e84b/Sites-that-Limit-Conservative-News----Blog-3.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="238" /></p> <p>As more and more Americans rely on the Internet for both education and entertainment, the implicit liberal bias of mass media is emerging as a significant point of concern for conservatives.</p> <p>Political bias seems to abound online: Nearly all of the nation’s largest news outlets are left-leaning, and even social sites like Facebook may be limiting access to conservative news and websites. Many people get their political news through their email, and recent studies have shown that even large public email providers are prone to be left-leaning; setting up a private email account is a good way to ensure you’re getting fair and balanced news. Companies like Reagan.com focus on keeping your information safe and secure through our <a href="/best_email_alternative">alternative private email service for conservatives</a>—without any unnecessary political bias or limits on free speech.</p> <p>When looking for alternative sites to subscribe to or follow, keep a few things in mind:</p> <p style="margin-left: 30px;"><span style="text-decoration: underline;">Dig beneath the headlines:</span> In this age of “fake news,” make sure to spend some time delving into the sites. Even though it may have headlines that grab your attention, that doesn’t necessarily mean a site’s content is reputable or in line with conservative viewpoints.</p> <p style="margin-left: 30px;"><span style="text-decoration: underline;">Political ties:</span> Conduct some research on the site’s backers to ensure the information is free of bias. Are they connected to any political candidates or organizations?</p> <p style="margin-left: 30px;"><span style="text-decoration: underline;">Don’t rely on </span><span style="text-decoration: underline;"><g class="gr_ gr_36 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Grammar only-ins replaceWithoutSep" data-gr-id="36" id="36">social following</g></span><span style="text-decoration: underline;">: </span>Social-media following doesn’t necessarily speak to an outlet’s legitimacy, as many of the most liberal mainstream organizations have significant social presences. Rely more on reviews from sources, both personally and in the wider political world, you trust rather than social-media numbers.</p> <p>There are a number of really smart sites that check all of these boxes:</p> <p style="margin-left: 30px;"><strong><a href="https://www.redstate.com/" rel="noopener" target="_blank">Red State:</a></strong> The equivalent to Politico, this politically focused blog features conservative takes on <g class="gr_ gr_45 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Grammar only-ins replaceWithoutSep" data-gr-id="45" id="45">national news</g>. A good blend of straightforward news, analysis <g class="gr_ gr_41 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Punctuation only-ins replaceWithoutSep" data-gr-id="41" id="41">and</g> commentary, Red State provides quick and concise summaries of all the news conservatives care about. It’ “Local” section also includes roundups of localized stories, state by state.</p> <p style="margin-left: 30px;"><strong><a href="https://www.codias.com/" rel="noopener" target="_blank">Codias:</a></strong> If you’re looking for a place to connect and share information with fellow conservatives, Codias is a good option. Popular <g class="gr_ gr_30 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del" data-gr-id="30" id="30">social-media</g> sites are often flooded with liberal viewpoints and even targeted advertising, and Codias seeks to counter that narrative.</p> <p style="margin-left: 30px;"><strong><a href="http://www.conservapedia.com/Main_Page" rel="noopener" target="_blank">Conservapedia:</a></strong> Wikipedia for the conservative crowd. Topics include religion, modern and historical political movements and popular culture.</p> <p style="margin-left: 30px;"><strong><a href="https://www.reagan.com/" rel="noopener" target="_blank">Reagan.com:</a></strong> The private email service that protects your right to privacy and freedom of speech.</p> <p>Liberal media bias is an unfortunate reality of today’s political climate. With a bit of research, however, you can access online circles that keep you connected and in the know about all of the issues important to conservative-leaning Americans.</p> urn:store:1:blog:post:59 http://www.reagan.com/can-junk-mail-be-dangerous-to-your-security Can Junk Mail be Dangerous to your Security? <p><img height="238" src="https://images.clickfunnels.com/29/0b2110e0e411e78aa3511c5203f1d9/Junk-Email-Danger---Blog-2.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>Everyone can agree that junk emails are a nuisance; however, on top of being bothersome, could such messages actually be dangerous?</p><p>The short answer is yes — though there are a number of steps email users can take to protect themselves.</p><p>Choosing a secure email provider should be the first step in that plan. Such services operate very stringent regulations for filtering out junk email messages; though some may still make their way into your inbox, that number is likely much higher for those who use non-private accounts, which usually have less-strict filters.</p><p>Junk mail can take many forms but is largely categorized as unsolicited messages. Some may be commercial in nature, such as advertisements from stores and retailers eager for your business. Others, often referred to as spam, are more sinister in nature.</p><p>Spam messages can include attachments that carry malware that, when activated, allows the sender to spy on the user; such tactics have been used to great success in identity-theft and fraud cases. According to a report by <a href="http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/" rel="noopener" target="_blank">Verizon</a>, about two-thirds of malware was installed through email attachments. More than half appeared as JavaScript attachments, while about a quarter surfaced within Microsoft Office documents.</p><p>Spam emails can also be part of a “phishing” scam, which is an effort to extract sensitive information from a user, such as credit card and bank account numbers. Senders mask their emails to appear that they’re coming from legitimate sources — they may change a letter in the name of popular company and model the format of the email after actual messages the company typically sends — to encourage the receiver to open it and follow prompts. A user may be asked to input contact information, passwords or financial data and, because this may appear to be from a trusted source, he or she may not even think twice.</p><p>As email scams become more sophisticated, email users need to also evolve in how they use online communications. Private and secure email providers are the front line of defense against dangerous junk mail. Choose the strongest level of filtering for sending questionable messages to a “Junk” folder. Empty such folders en masse, without clicking on the messages. If an email does pop up in your inbox from an unknown sender, do not open it and, if you accidentally click on it, do not open any attachments. If you’re unsure of whether something is junk or not, err on the side of caution and delete — if it’s legitimate, the sender can always follow up.</p><p>When it comes to online safety, you can never be too careful.</p> urn:store:1:blog:post:58 http://www.reagan.com/what-were-some-of-ronald-reagans-most-famous-speeches What were some of Ronald Reagan’s most famous speeches? <p><img height="230" src="https://images.clickfunnels.com/b6/66fb90dace11e7ac868960f6c1946b/Ronald-Reagan-Speeches-_-quotes.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" /></p> <p>Through his eight years in office, President Ronald Reagan created and implemented policies and programs that have gone on to shape the country for decades. While his legislative impact is undeniable, Reagan's words are almost as emblematic of his presidency as his actions. Known as the Great Communicator, Reagan earned that title in his speeches and famous orations.</p> <p>Reagan's speeches have inspired generations, in a variety of ways — from jumpstarting future leaders' political careers to motivating the creation of Reagan.com's <a href="https://www.reagan.com/private_email_service">private email service</a> to protect your privacy in the name of the former president and his values. Ronald Reagan's distinctive rhetoric and ability to adapt his tone and message to suit the country's evolving needs made him an unparalleled communicator as well as an effective leader.</p> <h2>Ronald Reagan's Most Notable Addresses</h2> <p> </p> <h3>"A time for choosing" - 1964</h3> <p>In 1964, Ronald Reagan took to the television airwaves for a speech in support of Barry Goldwater's presidential run. "<a href="https://www.youtube.com/watch?v=qXBswFfh6AY" target="_blank">A time for choosing</a>" emphasized Reagan's focus on the choice Americans had to make with that and other elections — not between parties, but between the paths for the county's economic success or failure. That address catapulted Reagan to national prominence and helped him launch his own political career. Watch below:</p> <p><iframe width="560" height="315" src="https://www.youtube.com/embed/qXBswFfh6AY" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="allowfullscreen"></iframe></p> <h3>"There you go again" - 1980</h3> <p>Ronald Reagan pushed back against then-incumbent President Jimmy Carter in the final debate for the 1980 presidential election. After Carter blasted Reagan's stance on healthcare, Reagan issued a fiery rebuttal that not only articulated his actual positions, but the "<a href="https://www.youtube.com/watch?v=Wi9y5-Vo61w" target="_blank">there you go again</a>" speech also demonstrated his no-nonsense approach to confrontation. Watch below:</p> <p><iframe width="560" height="315" src="https://www.youtube.com/embed/Wi9y5-Vo61w" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="allowfullscreen"></iframe></p> <h3>"Government is not a solution to our problem" - 1981</h3> <p>With the famous line "<a href="https://www.youtube.com/watch?v=3IlcDvXaUCw" target="_blank">Government is not a solution to our problem; government is the problem</a>" in his first inaugural address in 1981, Reagan set the stage for his pending presidency. In this and many speeches to come, Reagan emphasized the power and responsibility Americans have for self-rule.</p> <p><iframe width="560" height="315" src="https://www.youtube.com/embed/3IlcDvXaUCw" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="allowfullscreen"></iframe></p> <h3>"High Flight" - 1986</h3> <p>Reagan invoked poet John Gillespie Magee to immortalize the victims of the Challenger Seven tragedy. He quoted from Magee's sonnet "<a href="https://www.youtube.com/watch?v=Qa7icmqgsow" target="_blank">High Flight</a>" to comfort a nation in mourning after the 1986 tragedy.</p> <p><iframe width="560" height="315" src="https://www.youtube.com/embed/Qa7icmqgsow" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="allowfullscreen"></iframe></p> <h3>"Mr. Gorbachev, tear down this wall!" - 1987</h3> <p>Reagan's 1987 speech at Brandenburg Gate in Berlin included a direct challenge to then-Soviet leader Mikhail Gorbachev to dissolve the controversial barrier between East and West Berlin in which he announced "<a href="https://www.youtube.com/watch?v=5MDFX-dNtsM" target="_blank">Mr. Gobachev, tear down this wall</a>". Two years later, Gorbachev followed suit and began demolition.</p> <p><iframe width="560" height="315" src="https://www.youtube.com/embed/5MDFX-dNtsM" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="allowfullscreen"></iframe></p> <p>Join the thousands of other Americans who continue Ronald Reagan's legacy of inspiration and common sense. <a href="https://www.reagan.com/reagancom-personal-email">Sign up for a Reagan.com email address today</a>!</p> urn:store:1:blog:post:57 http://www.reagan.com/do-popular-email-providers-suppress-conservative-news Do Popular Email Providers Suppress Conservative News? <p><img src="https://images.clickfunnels.com/f6/b69fa0cedc11e7837e118ae0ddfe24/Email-Supress-Conservative-News.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="238" /></p> <p>The best private email service can not only keep you safe from privacy intrusion, it may even protect you from political bias. <br /><br />From cable-news shows to newspapers and websites, the left-leaning nature of American media has come under scrutiny in recent months. Limited conservative representation in mainstream media, complicated also by the rise in fake news, has left many on the right feeling they <a href="/how-to-choose-conservative-alternatives-to-some-of-the-most-popular-websites">lack an outlet for accurate and fair news</a>.<br /><br />That concern is worsened with the news that public email servers may be filtering out conservative news. <a href="https://thehornnews.com/email-providers-biased-conservatives/" rel="noopener" target="_blank">The Horn News</a> conducted an experiment to explore whether popular free email providers treat right-leaning political emails equally to more liberal content — and were disappointed by what they found.<br /><br />The organization signed up for five free email accounts: Gmail, Yahoo, AOL, Outlook and Mail.com and subscribed to 10 politically themed email newsletters for each — equal numbers for conservative and liberal content. The results of their experiment were staggering: In just a two-week span, emails from the conservative sites were flagged as junk 57 times, compared to just 19 times for the left-leaning content.<br /><br />Email giant Gmail — operated by Google, whose founder has been vocal about his support for Democratic candidates — had the strictest settings: Most conservative emails went to junk and the few that didn’t were labeled as “promotions,” meaning they still didn’t get to their intended recipient.<br /><br />The Horn News experiment highlights the need for <a href="https://www.reagan.com/private_email_service">private email services</a> that are safe and secure on both technical and ethical levels. Email users have a right to receive the messages they want both accurately and safely, but public email providers don’t seem to be living up to that standard. Without a private email service, email users eager for conservative news may face yet another obstacle to the free exchange of information. Reagan.com is one <a href="https://www.reagan.com/best_email_alternative">email provider with conservative values</a> including a passionate focus on your right to privacy. <a href="https://www.reagan.com/reagancom-personal-email">Join today!</a></p> urn:store:1:blog:post:56 http://www.reagan.com/why-a-free-email-service-could-put-you-at-risk Why a Free Email Service Could Put You at Risk <p><img height="241" src="https://images.clickfunnels.com/6d/26dca0ca4f11e7a6988dd54074b66b/Cyber-Security.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" /></p> <p>As many Americans have multiple email addresses — perhaps one for work, another for personal correspondence and another for promotions — few want to pay to register an email address. Free email dominates the nation’s online-communications sector, but is the cost-saving worth the potential risk?</p> <h3>What are the Risks of Free Email?</h3> <p>While the lack of a price tag for services like Gmail and Yahoo attracts big followings, mass services like these could lead to security breaches. Just last year, Yahoo revealed that more than half a billion of its accounts were compromised in what was considered one of the largest cyber attacks in history. To make matters worse, it took the company more than two years to discover — meaning users’ potentially sensitive information like credit card numbers, addresses and more were exposed to hackers for a significant amount of time.</p> <p>Unlike secure private email, free email giants store all of their users’ messages on an external database, opening up even more avenues for security issues. Once your messages are cataloged externally, they move outside the realm of your control. While users’ personal messages could be at risk, corporations also face significant threats, as free public email offers few protections and safeguards for the significant volumes of sensitive information that companies often manage through email.</p> <h3>What Can I Do to Protect Myself?</h3> <p>Secure free email handled through a private server is a much safer method if you’re looking to protect both your privacy and your wallet. Private providers store your content internally, which allows for more oversight and regulations, and fewer security threats.</p> <p>It’s important to remember privacy concerns when you’re selecting an email provider. Free email dominates the nations’s online-communications sector, but is the cost-saving worth the potential <a href="/email_privacy_risks">risks of having free email?</a></p> urn:store:1:blog:post:55 http://www.reagan.com/what-made-ronald-reagans-presidency-so-special What Made Ronald Reagan's Presidency So Special? <p><img src="https://images.clickfunnels.com/9c/2c3430c4ca11e78cfe17b7feeab7b0/Ronald-Reagans-Presidency.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="238" /></p> <p>Email is such a universal practice that individuality can often be lost amid the countless accounts and servers that exist. At <a href="https://www.reagan.com/">Reagan.com</a> we considered how to make <a href="https://www.reagan.com/private_email_service">private email addresses</a> more personal and decided to model ours after one of the most distinctive leaders in American history.</p> <p>An account that prioritizes security and individual rights seemed to be a fitting tribute to President Ronald Reagan, whose tenure upheld all of those principles. His presidency was so special because of where he passionately stood on a number of issues and never wavered.</p> <h2>Reagan on Security Issues</h2> <p>On security, Reagan stood out from all modern American presidents. Restored national security was one of the cornerstones of his presidential campaign, and he delivered on that promise. Reagan’s Strategic Defense Initiative significantly enhanced the United States’ ability to defend itself against potential threats. With this program, the country was able to jumpstart its production of advanced missile defense technology, harnessing Reagan’s support for a strong military with his embrace of innovation. He also was an expert negotiator, skills that helped the country to navigate security threats and to contribute to global peace talks.</p> <h2>Reagan on Individual Rights</h2> <p>On individual rights, Reagan was also a leader. He worked for the middle class, <a href="https://www.reagan.com/tax-day-ronald-reagan-tax-cutting-legacy-reagancom">pioneering tax programs</a> that put money back into the pockets of the nation’s hardest workers, and supporting social programs that <a href="https://www.reagan.com/ronald-reagan-and-personal-responsibility">incentivized personal responsibility.</a> He worked to reduce the role of the federal government in the daily lives of Americans, relaxing strict regulations on agencies like the Department of Justice and Department of Transportation.</p> <p>With a legacy of leadership that is unparalleled, Reagan continues to impact modern American society, <a href="https://www.reagan.com/reagans-legacy-30-years-later">even decades after leaving the White House.</a> Honoring his legacy is easy through using a private email address from Reagan.com. Contact us today to learn more about our services and how you can uphold the Great Communicator’s values and vision.</p> urn:store:1:blog:post:54 http://www.reagan.com/why-are-government-agencies-collecting-your-data-through-email Why are government agencies collecting your data through email? <p><img height="268" src="https://images.clickfunnels.com/e0/c875c0bf1d11e792dd830d6f503fa9/Government-agencies-collecting-your-data-through-email.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>We’ve all heard warnings that what we write in our emails may not truly be private, no matter how many precautions we take. <a href="https://www.reagan.com/t/private_email_service/ ">Using a private email service</a> can certainly add an important barrier for hackers and identity thieves, but what about our own federal government?</p><p>Information about the government’s mass-data collection has become more readily available in recent years, and has painted a picture that some Americans have found troublesome. For many years, the National Security Agency conducted widespread email surveillance on private citizens. Federal protocols enabled the agency to store and sift through emails to explore potential threats, with a particular focus on international communications.</p><p>In recent years, the government has imposed tighter restrictions on the NSA’s warrantless-surveillance programs. In April, the agency halted its longstanding practice of flagging emails among private citizens — those who are not under NSA surveillance — but that mention identifying information about a person or organization that is under NSA surveillance.</p><p>However, the NSA also recently adopted new protocols that enable it to share raw intelligence it collects through email surveillance with other federal agencies. Previously, shared data had to have some sensitive personal information redacted, but the new regulations allow the intercepted communications to be shared word for word.</p><p>The feds also still operate the Prism system, in which they work with large-scale providers like Yahoo and Gmail to collect American emails that originated from foreign targets of surveillance.</p><p>Even though the federal government’s surveillance program is focused on national security, having your emails land in the hands of anyone but their intended recipients is a daunting reality for many. An encrypted email service is the best line of defense against unwanted intrusions.</p> urn:store:1:blog:post:53 http://www.reagan.com/security-concerns-for-echo-and-google-home-and-ways-to-stay-secure Security Concerns for Echo and Google Home, and Ways to Stay Secure <p><img height="238" src="https://images.clickfunnels.com/7b/320fd0ba8311e78bdeff5ef8d21674/Security-Concerns-for-Echo-and-Google-Home_-and-Ways-to-Stay-Secure.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>Voice-activated assistants, once thought a luxury of the future, <g class="gr_ gr_28 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar multiReplace" data-gr-id="28" id="28">have</g> arrived. Devices like the Amazon Echo and Google Home are being mass-marketed as the latest technological trend to make <g class="gr_ gr_29 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar only-ins doubleReplace replaceWithoutSep" data-gr-id="29" id="29">daily</g> living just a bit easier.</p><p>With every breakthrough in technology, however, comes risks for security issues. To combat hackers from accessing our browsing history, we may mask our IP addresses, and to protect our messages, we may opt for encrypted email providers and a <a href="https://reagan.com/">private email address</a>. But how do we manage threats from a voice-activated assistant?</p><p>First, let’s look at what those threats may be. Echo and Google Home are activated by certain commands; for instance, when you say “Alexa” to Echo, it comes alive. The user can inquire about the weather, sports scores, directions, music and much more — and the device gets right to work finding and announcing answers. They can be used to alert users of appointments, store important reminders and to tap into the owner’s contacts to make calls and send messages. Overall, it’s a lot of power wrapped up in a small package.</p><p>Each task the device performs is stored — not within the assistant, but rather on a cloud-based server operated by the manufacturer. That means each user’s commands, search <g class="gr_ gr_32 gr-alert gr_gramm gr_inline_cards gr_run_anim Punctuation only-ins replaceWithoutSep" data-gr-id="32" id="32">history</g> and <g class="gr_ gr_31 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar only-ins replaceWithoutSep" data-gr-id="31" id="31">potentially</g> sensitive information is amassed externally, which could pose a security threat.</p><p>Such devices may even have the power to record data when the owner isn’t actively using it. Homicide investigators in Arkansas are currently working to extract information from an Echo that was in the home of a man who was murdered; though it wasn’t actually being used at the time of the incident, some devices have been shown to activate and begin recording with rises in radio or television noise.</p><p>So how we do protect ourselves when using these popular, yet potentially problematic, devices? Much of the advice for voice-activated assistants is the same for standard Internet protection. Echo and Google Home are connected to a user’s Amazon and Google accounts, respectively, so make sure to tighten the built-in security settings. When you’re not using the device, place it in mute mode, so it doesn’t capture and store anything unintended. If you own an Echo, you can manage what the device has stored by visiting your Amazon account and either deleting certain recordings or the entire history.</p><p>Voice-activated assistants can be handy helpers, but it’s best to use them safely and securely.</p> urn:store:1:blog:post:52 http://www.reagan.com/top-ten-achievements-of-ronald-reagans-presidency Top Ten Achievements of Ronald Reagan's Presidency <p><img src="https://images.clickfunnels.com/8a/9777e1a7ae11e78a8b6f168d1ffa4c/Top-Ten-Achievements-of-Ronald-Reagan_s-Presidency.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="238" /></p> <p>Though he only spent eight years in the White House, President Ronald Reagan’s mark on the office and the country have persisted for decades. Reagan led the nation through a period of international turbulence and rapid changes in American infrastructure and ideals. He navigated those challenges successfully, bringing the country out on the other side — and solidifying his legacy as a great American leader.</p> <p>Using the <a href="/bestprivateemailservice">best private email service</a> in Reagan’s name is one way to pay tribute to that legacy, as is learning from his <a href="/major-accomplishments-of-ronald-reagan">lengthy list of accomplishments</a>. Here’s a rundown of the high points of Reagan’s tenure.</p> <h4>1. Reaganomics:</h4> <p style="padding-left: 30px;">The president’s “trickle-down economics” system is credited with revolutionizing the nation’s economic outlook.</p> <h4>2. Conquering the Cold War:</h4> <p style="padding-left: 30px;">Reagan faced down international threats of communism with a fortitude that many say ultimately led to the collapse of the Soviet Union.Strategic Defense Initiative: The president revolutionized the idea of national defense with a program that united military tactics and technology to counteract nuclear war threats.</p> <h4>3. Strategic Defense Initiative:</h4> <p style="padding-left: 30px;">The president revolutionized the idea of national defense with a program that united military tactics and technology to counteract nuclear war threats.A New Vision of the GOP: Reagan, known as the Great Communicator, used his charismatic appeal to put a new face</p> <h4>4. A New Vision of the GOP:</h4> <p style="padding-left: 30px;">Reagan, known as the Great Communicator, used his charismatic appeal to put a new face <g class="gr_ gr_42 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar multiReplace" data-gr-id="42" id="42">to</g> the Republican Party, one that united all segments of the party.</p> <h4>5. American Values:</h4> <p style="padding-left: 30px;">The president championed the ideals ingrained in the founding of America, such as patriotism and family values, igniting unprecedented pride in the country.A New Optimism: Reagan took the helm of the country after years of American strife, including high-profile assassinations, civil-rights</p> <h4>6. A New Optimism:</h4> <p style="padding-left: 30px;">Reagan took the helm of the country after years of American strife, including high-profile assassinations, civil-rights <g class="gr_ gr_47 gr-alert gr_gramm gr_inline_cards gr_run_anim Punctuation only-ins replaceWithoutSep" data-gr-id="47" id="47">struggles</g> and Watergate. His successful leadership re-established faith in the office of the presidency and in the country’s future.</p> <h4>7. Tax Reform:</h4> <p style="padding-left: 30px;">The president’s tax policies incentivized Americans to work hard and invest in their future, improving quality of life for countless Americans.</p> <h4>8. Inflation:</h4> <p style="padding-left: 30px;">Reagan’s economic policies were responsible for a drastic decrease in the inflation rate, from about 4 percent to 2.5 percent.</p> <h4>9. Job Growth:</h4> <p style="padding-left: 30px;">Throughout Reagan’s eight years in office, the nation saw more than 16-million new jobs created.</p> <h4>10. Judicial Appointments:</h4> <p style="padding-left: 30px;">Reagan appointed numerous federal judges to the bench who went on to issue landmark decisions regarding constitutional law, including late Supreme Court Justice Antonin Scalia, regarded as a champion of conservative ideals.</p> urn:store:1:blog:post:51 http://www.reagan.com/could-your-smart-tv-be-hacked Could Your Smart TV Be Hacked? <p><img height="238" src="https://images.clickfunnels.com/8a/d80350a7ae11e794d549989f464cd4/Could-Your-Smart-TV-Be-Hacked_.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>As the world becomes more connected, so do our devices. Cell phones, music players, book readers and now even televisions have the power to connect you to the net in seconds. But how safe is that connection?</p><p>You'd be hard-pressed nowadays to find a television in a big-box store that is not considered a Smart TV or, in other words, one that is Internet-enabled. Such electronics can stream movies and shows from the Internet, let users tap into apps like Skype or even check email, do online shopping or read the news on a big screen, right from the comfort of their couch. But that convenience may come at a cost, according to <a href="https://arstechnica.com/information-technology/2017/03/smart-tv-hack-embeds-attack-code-into-broadcast-signal-no-access-required/?comments=1&post=33085687">Ars Technica</a>.</p><p>To test the security of Smart TVs, a group of tech whizzes used a transmitter to tap into a TV signal; the breach was made possible by two known bugs associated with the browser that run in the background of the televisions. Once the entry was made, the hackers uploaded commands, demonstrating the ease with which someone can gain access to a Smart TV.</p><p>Though the Ars Tehnica hack was an experiment, had the signal been intercepted by someone with a malicious intent, the results could have been severe. If hackers gain access to your Smart TV, they could use the microphone or video-camera functions to spy on you or could obtain sensitive information like credit card numbers or financial documents from your Internet history. To protect yourself on your desktop or laptop computers, or even on your smart phone, you may use the <a href="https://reagan.com/">best private email</a>, along with firewalls and anti-virus software — but how many of us consider those precautions for our televisions?</p><p>The hacker need not be in physical contact with a Smart TV to hack into it — all he or she needs is to be within range of the signal — which can lead to more opportunities for hackers, with fewer consequences. And the impact could be wide-ranging; for instance, if someone successfully hacks into a signal used by a television station, it could potentially broadcast malicious commands to countless viewers tuning into a particular channel.</p><p>Smart TVs are certainly here to stay — and as such, we should take the proper steps to protect ourselves.</p> urn:store:1:blog:post:50 http://www.reagan.com/ronald-reagan-life-before-his-presidency Life Before Ronald Reagan’s Presidency | Reagan.com <p><img src="https://images.clickfunnels.com/8a/8353a0a7ae11e7ad6ef7cc2c09d957/Ronald-Reagan-Life-Before-His-Presidency.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" height="237" /></p> <p>Ronald Reagan is one of the most known figures in American history. <a href="https://www.reagan.com/looking-back-a-reagans-veterans-day-speech">His speeches have come to embody Republican ideals</a> and his vision for the country is an aim that people today still strive to meet. Though his imprint stretched well beyond the boundaries of the nation’s capital and has continued long past his passing, how much do Americans really know about Ronald Reagan? Even those who hold a secure email address in Reagan’s name may be surprised to learn just who the former president was before he took the Oval Office.</p> <h2>THE EARLY YEARS</h2> <p>Reagan was born in Illinois in 1911, to working-class Democratic parents, Jack and Nelle. Jack supported his family as a salesman yet struggled with alcoholism. Reagan’s mother was his primary caregiver, balancing raising him and his older brother with community service and volunteer work.</p> <p>Reagan followed his parents’ involvement in community activities, joining his high school’s football and basketball teams, theater group and helming the student body, while also being an active swimmer and lifeguard. He went on to study at Eureka College, with his hard-working nature shining as he paid his own way by washing dishes and working as a swimming coach.</p> <h2>HOLLYWOOD-BOUND</h2> <p>Reagan’s charismatic personality and distinctive voice earned him a job as a radio sportscaster after college. That position flourished into a successful career covering football and baseball, which paved the way back into acting, which Reagan found a love of in his youth. During a trip to Chicago, Reagan met with a Hollywood casting director from Warner Brothers, who offered him an immediate contract.</p> <p>From the late 1930s to the 1950s, Reagan appeared in more than 50 films. The diversity of his film career demonstrated his range as an actor; he was cast in comedies, dramas, action flicks and everything in between. He even used his acting chops during his time in the military in World War II, narrating training films. Hollywood also introduced him to actress Jane Wyman, whom he married in 1940; the two went on to have two children together before ultimately divorcing eight years after their wedding.</p> <p>Reagan later married another actress, Nancy Davis, in 1952 and had two children. After his second marriage, Reagan transitioned his film career into corporate work, as he narrated and acted for General Electric.</p> <h2>MOVING INTO POLITICS</h2> <p><a href="https://www.reagan.com/how-reagans-role-in-hollywood-politics-prepared-him-for-the-white-house">During his acting days, Reagan was also politically active.</a> He helmed the Screen Actors Guild for many years, helping lead and shape policy for the national actors’ association. Once a champion of Democratic officials, Reagan was swayed against the party by John F. Kennedy and began supporting Republican presidential nominee Richard Nixon. He stumped for Nixon on his first presidential run, delivering more than 200 speeches on his behalf. Reagan officially changed his party affiliation in 1962. He threw his own hat</p> <p>He threw his own hat in the political ring with a successful bid as governor of California, a role he held for two terms, until 1975. As governor, Reagan solidified himself as a formidable politician, one with the drive to see results and the passion to generate support — a combination that had him next set his sights on the White House.</p> <p>And the rest, as they say, is history.</p> urn:store:1:blog:post:49 http://www.reagan.com/yahoo-just-confirmed-all-3-billions-accounts-were-hacked-in-2013-msn Yahoo Just Confirmed All 3 Billions Accounts Were Hacked in 2013 (MSN) <h1><img src="\images\2021-10-20_11-06-25.jpg" style="display: block; margin-left: auto; margin-right: auto;" /></h1> <p>Yahoo just confirmed that all 3 billion of its accounts were hacked in 2013, more than tripling the original estimate. This is a stunning display of ineptitude from a company whom so many trusted. If you had a Yahoo account in 2013 you should take the following steps immediately to ensure your privacy.</p> <p style="margin-left: 30px;"><strong>1. Change your Yahoo password. </strong>Make sure they no longer have access to your account. If you can go without your Yahoo account we suggest delete it completely. </p> <p style="margin-left: 30px;"><strong>2. Change your passwords on all other accounts.</strong> If you are like most people then you use a couple passwords for all your accounts. This means that if someone received your Yahoo password they could access other sites like banking and social media, causing real damage.</p> <p style="margin-left: 30px;"><strong>3. Keep an eye out on your account.</strong> Check your Yahoo account and make sure it is how you left it, checking sent and deleted folders for email that you did not send or create.</p> <p style="margin-left: 30px;"><strong>4. Get a Private Email Address.</strong> <a href="https://www.reagan.com/p/1/reagancom-personel-email" rel="noopener" target="_blank">Reagan.com</a> offers you a private email alternative to secure you from these hacks.</p> <p><a href="http://www.msn.com/en-us/money/companies/yahoo-says-all-3-billion-accounts-affected-in-2013-hack/ar-AAsS3Br" rel="noopener" target="_blank">Read more on this from MSN</a></p> urn:store:1:blog:post:48 http://www.reagan.com/the-differences-between-kushners-and-clintons-private-email-issues The Differences Between Kushner’s and Clinton’s Private Email Issues <p><img alt="Private email issues" height="212" src="https://images.clickfunnels.com/62/08fb00a48911e7a0eda975ab1af10a/Clinton-Kushner.png" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>Many Democrats cried foul recently when it was revealed that Jared Kushner, White House adviser and son-in-law of the president, used a private email service for work business. The topic brought many back to the 2016 presidential campaign, when Hillary Clinton came under intense scrutiny for a similar issue.</p><p>So, the question is, just how alike (or different) are Kushner’s and Clinton’s email problems? And how will the issue impact the current administration?</p><p>Using a personal email account for official White House business is not against the law — with a few caveats, which is where the differences between the two may lie.</p><p>Key to the federal communications policy is the stipulation that classified information cannot be handled through a private email server; it must be addressed solely through the secure servers used by government accounts. Disseminating classified information through a non-official email could heighten the risk for hacking, with the potential for wide-ranging international impacts.</p><p>Among the thousands of work emails Clinton handled through her private account, there was evidence that several, at least in part, contained classified information. That Clinton transmitted potentially sensitive material through a private email server, and not her official account as Secretary of State, was chief among the complaints of critics.</p><p>The inclusion of classified information is not yet an accusation that has surfaced in Kushner’s case. <br />Another significant difference is how both leaders handled the situations. Clinton drew the ire of many when she deleted tens of thousands of emails from her private server, leading some to question if she was attempting to cover impropriety. That course of action seemed to catapult the issue to national attention, which cast a shadow over the entirety of her presidential campaign.</p><p>So far, Kushner appears to have cooperated with investigators looking into the issue. He has reportedly forwarded all work-related messages from his private email to his White House account; government accounts store all messages, so doing so ensures there is an official record of Kushner’s work-related communications.</p><p>The implications of the Kushner email situation remain to be seen, but much may hinge on the content of the correspondence, and his level of transparency. Regardless of the outcomes, the issue spotlights the need for education about private and encrypted email services, and regulations regarding their use.</p> urn:store:1:blog:post:47 http://www.reagan.com/safest-computers-for-internet-security Safest Computers for Internet Security <p><img height="238" src="https://images.clickfunnels.com/cf/c80fa0a3c111e786e6a3f72dead6a2/Internet-Security---Blog-4-Image.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>There are many techniques and tools for increasing your privacy on the Internet, from using the most secure email to cloaking your IP address. But what about a bigger and broader, yet ultimately more basic, question: What type of computer should you use?</p><p>Hundreds of computer brands abound, as well as styles: from desktop PCs to laptop Macs to smartphones of every variety. With such technology at our fingertips, many of us use a number of these devices daily, yet few have likely given thought to which is safest for Internet security.</p><p>Debate has waged for years over whether Apple’s Mac or PCs are better on the safety front, with the general consensus favoring Apple. According to <a href="https://www.allbusiness.com/why-apple-computers-are-safer-than-pcs-8958060-1.html" rel="noopener" target="_blank">All Business</a>, Apple’s low market share has helped it ward off hackers. Macs also inherently block users from making any changes to the operating system, which can also close some doors to those looking to breach the system. Furthermore, unlike the Microsoft OS, Apple produces all of its own software and hardware, meaning more streamlined and in-house regulations.</p><p>Even if you go with an Apple computer, you’re left to question whether there are any real differences between desktop and laptop devices. <a href="https://www.pcmech.com/article/desktop-vs-laptop-security-features/" rel="noopener" target="_blank">PC Mech</a> offered a helpful rundown of the pros and cons and found laptops were largely better for security purposes. Laptops were found to be more easily disconnected from a network and have more accessible hard drive passwords than desktops. With laptops taking the lead in the market over desktops, newer security features are often available that can protect your privacy more efficiently.</p><p>Nowadays, we often carry our computers in our hands, in the form of smartphones. Most computer whizzes will advise that smartphones are generally high risk for security breaches, as they largely function like a GPS right in your pocket. However, since almost no one leaves home without one, which kind is the most secure?</p><p><a href="https://smartphones.gadgethacks.com/how-to/4-best-phones-for-privacy-security-0176106/" rel="noopener" target="_blank">Gadget Hacks</a> found the Blackphone 2, BlackBerry PRIV, iPhone 7 and Google Pixel to top the list of smartphones when it comes to safety. All have varying levels of encryption capabilities, ad blockers and login protocol, but of the scores of smartphones on the market, these are the ones that can give you the most protection.</p> urn:store:1:blog:post:46 http://www.reagan.com/10-ways-to-stay-anonymous-and-protect-your-online-privacy 10 Ways to Stay Anonymous and Protect your Online Privacy <p><img height="238" src="https://images.clickfunnels.com/2a/855e719ecc11e78d984392e3b6cca0/Secure-Email-Service---Blog-2-Image.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>With Americans increasingly becoming reliant on the Internet, the web is a prime target for those with ill intentions. There are many ways to cut down on your security risks, from using a secure email service to cloaking your browser activity. Here are 10 tips and tech advancements that can protect your Internet identity:</p><p><span style="text-decoration:underline;">Use Several Email Addresses:</span> Create multiple email addresses to use when you sign up for online accounts; redirect each account’s <g class="gr_ gr_41 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del" data-gr-id="41" id="41">mail</g> to a single source to reduce confusion.</p><p><span style="text-decoration:underline;">Understand Your Browser Configuration:</span> Tools like <a href="https://panopticlick.eff.org/" rel="noopener" target="_blank">Panopticlick</a> will analyze your browser configuration to identify ways to enhance security.</p><p><span style="text-decoration:underline;"><g class="gr_ gr_36 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del multiReplace" data-gr-id="36" id="36">GnuGP</g></span><span style="text-decoration:underline;">:</span> Even if you’re using a secure email service, you can up your protection with <a href="https://gnupg.org/" rel="noopener" target="_blank"><g class="gr_ gr_37 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del multiReplace" data-gr-id="37" id="37">GnuGP</g></a>, which encrypts email messages.</p><p><span style="text-decoration:underline;">Blocking Third-Party Cookies:</span> Most advertisers gather baseline data about customers’ online habits by tracking their cookies. So, turn them off! Nearly all browsers offer the option to shut down third-party cookies; even though it may not be a catch-all, it’s a quick and easy step to add another layer of protection.</p><p><span style="text-decoration:underline;">BetterPrivacy:</span> Flash cookies can still be tracked, even if you’ve blocked traditional cookies, which is where Firefox plug-in <a href="https://betterprivacy.en.softonic.com/" rel="noopener" target="_blank">BetterPrivacy</a> comes in.</p><p><span style="text-decoration:underline;">VPN:</span> VPN services like <a href="http://www.torguard.net/" rel="noopener" target="_blank">TorGuard</a> shield your IP address from everyone from hackers to government entities.</p><p><span style="text-decoration:underline;">Look Out for DNS Leaks:</span> A VPN service is effective at hiding your IP address but you could still be tracked through your DNS traffic. Services like <a href="https://dnsleaktest.com/" rel="noopener" target="_blank">DNS Leak Test</a> can tell you if any information is being leaked through your DNS.</p><p><span style="text-decoration:underline;">Remote Operating System:</span> Switch to a remote operating system powered by CD or USB. <a href="https://tails.boum.org/" rel="noopener" target="_blank">Tails</a> is a leading OS that offers email encryption.</p><p><span style="text-decoration:underline;">Restrict Location Data:</span> Many sites and apps request access to your location data, which can open you to vulnerabilities. If you don’t want to completely turn off this function, at least use it selectively.</p><p><span style="text-decoration:underline;">Manage Your Plug-Ins:</span> Plug-ins can serve as a gateway for hackers and should be avoided where possible. If you have to enable plug-ins, make sure your settings require your approval first for each plug-in request.</p><p>Whether you’re opting to use a secure email service or not, there are still some ways to protect yourself on the world wide web.</p> urn:store:1:blog:post:45 http://www.reagan.com/emmanuel-macron-is-he-frances-ronald-reagan Emmanuel Macron - Is He France's Ronald Reagan? <p><img height="238" src="https://images.clickfunnels.com/28/075d00996411e7a2f67b8453a783b3/France_s-Eiffel-Tower---Blog-3-Image.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>Among the rising stars on the global political stage is Emmanuel Macron, the newly minted French president who is quickly making a name for himself in Europe and abroad. Macron’s charismatic persona and catapult to power are leading some to draw comparisons to a figure those with this private email service will be familiar with: President Ronald Reagan.</p><p>With a moniker as the “<a href="http://usatoday30.usatoday.com/news/opinion/editorials/2004-06-06-cannon_x.htm">Great Communicator</a>,” Reagan was known for his superb speaking skills, his effectiveness at engaging audiences and his success at using the public stage to the benefit of his platform. Macron’s communication style is equally effective, especially in the context of the French political climate. The country has seen a string of presidents who haven’t necessarily inspired a host of excitement in their constituents, from the unpredictable Nicolas Sarkozy to the often-cold Francois Hollande. In contrast, Macron is young and energetic and is using both to inspire passion in his country — which appears to be working, as his newly founded party is set to make big gains in the coming election.</p><p>When Reagan took the Oval Office, he succeeded President Jimmy Carter, whose persona was largely accepted to be far from charismatic. On the campaign trail, Reagan was a stark contrast to the country’s then-leader, with an energetic style that was also clearly informed and forward-thinking. Once he took the helm of the country, Reagan continued to use his ability to engage with others, regardless of their party affiliation or political position, to get things done.</p><p>Reagan was also seen as a no-nonsense leader, unafraid to speak frankly and take on obstacles head-on. That’s also an element emerging in Macron’s presidency. The French leader drew international headlines for his seeming challenge to American President Donald Trump, with their now-infamous white-knuckled handshake. Macron also publicly called out Russian propaganda efforts while standing with Russian President Vladimir Putin at a joint press conference.</p><p>Macron is still new to the international stage, so it may be premature to make too strong of a comparison to Ronald Reagan — and the two would doubtlessly have differing views on many issues — but the persona and passion surrounding both certainly seem to be similar. </p> urn:store:1:blog:post:44 http://www.reagan.com/5-reasons-why-internet-security-is-important-now-more-than-ever 5 Reasons Why Internet Security is Important Now More than Ever <p><img height="238" src="https://images.clickfunnels.com/4c/ecfd10933c11e787a2e336e2b782a7/Private-Email-Secuirty-Blog-3-of-4.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>The concept of internet security is increasingly gaining prominence. The topic has become a campaign issue for political candidates, lawmakers debate how to strengthen security laws, and most private email services center their work on protecting citizens' privacy. So, why is this such a hot topic?</p><h4>Personal data breaches:</h4><p style="padding-left:30px;">The more we rely on technology for banking, bill pay, tax filing and other services involving sensitive information, the higher the risk for that information to be compromised. Social Security numbers, bank account information and personal addresses and phone numbers are all potential targets for hackers. While most <a href="https://reagan.com/">secure email services</a> use advanced security measures, public email companies may rely on less-stringent protocol, meaning your information and the content of your emails could be at risk.</p><h4>Identity theft:</h4><p style="padding-left:30px;">Hackers who successfully obtain an Internet user's personal information can use the data for identity theft. That could mean maxed-out credit cards and other criminal activity that can leave the victim with quite a mess to clean up.</p><h4>Cloud-based organizations:</h4><p style="padding-left:30px;">Companies are increasingly relying on cloud-based technology to archive their data, meaning enhanced security protocols are needed to guard that pool of information. A breach into a cloud-based system could open up a company's extremely sensitive financial and other information, as well as customer and consumer data.</p><h4>National security:</h4><p style="padding-left:30px;">While the nation continues to debate the role of Russian hacking in the 2016 election, people on both sides of the aisle tend to agree that international cyber-attacks are a serious threat.</p><h4>New communications concerns:</h4><p style="padding-left:30px;">Phone calls used to be the primary means of communication for sales pitches and telemarketing but many companies now are bombarding consumers with direct mail, email and even text advertisements. The tighter internet security is, the less likely companies are to obtain and use personal contact information for sales purposes.</p> urn:store:1:blog:post:43 http://www.reagan.com/should-the-president-have-an-email-on-a-secure-server Should the president have an email on a secure server? <p><img alt="Secure server email" height="190" src="https://images.clickfunnels.com/c7/7e83d18d8a11e7a02637cd2c6d0b9f/Presidential-Email---Blog-1-Image.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>Among all the issues raised during the 2016 presidential election, the topic of private and secure server email may have been the most unexpected. Front and center in countless debates <g class="gr_ gr_18 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar multiReplace" data-gr-id="18" id="18"><g class="gr_ gr_18 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar multiReplace" data-gr-id="18" id="18">was</g></g> Hillary Clinton’s use of <a href="https://wikileaks.org/clinton-emails/" target="_blank">private email</a> as Secretary of State, and her subsequent response to such criticism. Americans continue to be divided about how elected officials, including the president, can most safely and sensibly use email.</p><p>While President Donald Trump made Clinton’s email usage a cornerstone of his campaign, Trump himself continued to use private email once he moved into the White House. While Trump supporters were vocal about Clinton’s email controversy, most of his backers didn’t take issue with Trump’s private email practices once he took office; so is it an issue?</p><p>Beyond political parameters, there are several <a href="https://www.reagan.com/t/white_house_private_email">pros and cons of private email in the White House.</a> Arguments have been made that presidents and other public officials should be able to use private email in order to keep personal correspondence or campaign information separate from official government business. However, only a secure server email system could provide the most protection against potential privacy breaches; even the president’s personal correspondence could be fodder for hackers.</p><p>Having a private email could also open up the possibility to the blending of the professional with the personal, as was at issue in the Clinton scandal. If potentially sensitive or classified documents happened to find their way into the private email of the president, whether by error or lack of caution, that could set up the president, and by extension the country, for some significant risks.</p><p>As technology continues to evolve, new practices and protocols will as well. The recent attention to secure server email will doubtlessly continue to inform the debate and decisions regarding presidential email use for years to come.</p> urn:store:1:blog:post:42 http://www.reagan.com/keeping-your-home-security-secure Keeping Your Home Security Secure <p><img height="238" src="https://images.clickfunnels.com/ba/5b3200884111e7960835866e2f3bc8/home-security.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>Home-security systems have harnessed the power of technology to provide users the most efficient and effective ways of protecting their homes and families. Systems that once involved complex webs of wires, <g class="gr_ gr_28 gr-alert gr_gramm gr_inline_cards gr_run_anim Punctuation only-del replaceWithoutSep" data-gr-id="28" id="28">buttons,</g> and cameras now can be accessed right from the palm of your hand.</p><p>Most security systems now give users the power to tap into surveillance and monitor their settings and more from their personal computers, tablets or smartphones. The added convenience can mean added risk for hacking. Here are a few tips to keep your security system as secure as possible.</p><p><span style="text-decoration:underline;"><strong>Choose a private email server.</strong></span> Security systems that can be monitored remotely often involve email notifications. Most private email servers use SSL and other security measures, which add an extra layer of protection.</p><p><strong><span style="text-decoration:underline;">Limit where you log in to your system.</span></strong> Many modern systems let you check on your home remotely through video surveillance and other functions. While reassuring, that can open you up to hacking. Only tap into your system through personal devices you control, such as a smartphone; never access the system at a work computer shared by others or in a public space like a library.</p><p><strong><span style="text-decoration:underline;">Be smart with your passwords.</span></strong> Just like with email security, follow the basics when it comes to setting passwords governing your security system and other aspects involved in the system, like your wireless Internet. Don't use common and easily identifiable numbers like your address, birthday or anniversary, and change your passwords every few months. Even though you may be inclined to trust your next-door neighbor with the code to shut off your alarm system, don't share that information with anyone outside your house; you can't be sure under whose eye a neighbor may jot the numbers down.</p><p><strong><span style="text-decoration:underline;">Invest in a higher-grade system</span></strong><strong><span style="text-decoration:underline;">.</span></strong> Many home-security systems do not encrypt the signals that pass between door and window sensors, which means that information can be intercepted by burglars who have the know-how to pick up a signal detector. Commercial-grade systems, however, are usually more secure and may have been equipped with the ability to encrypt the sensor info. Even though such systems will cost more, they can also provide added peace of mind.</p> urn:store:1:blog:post:41 http://www.reagan.com/a-reagan-presidency-in-todays-world A Reagan Presidency in Today's World <p><img alt="" height="201" src="https://images.clickfunnels.com/a2/0b37d0829d11e7a70247c29493f328/Reagan-Today-Blog-4-of-4.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>While the country and the world have changed drastically in the almost-30 years since Ronald Reagan left office, some of the fundamental issues still impacting our society persist. From national security to the role of the federal government in American society, the country continues to grapple with challenges Reagan also addressed in his presidency. Though with the dawn of the Internet and other technological advances, these topics are now being reframed and refocused.</p><p>As owners of a Reagan private email address, you may already look to the former president's legacy to interpret the current state of affairs, but what can the rest of society learn about our future from looking to the past?</p><p>One of the cornerstones of Reagan's presidency was the investment in and strengthening of national security. A strong military force, backed by the might of the federal government, was key to America preserving its position as the world's leading power, Reagan contended. In order for America to triumph over national-security threats, it needed to build its defense capabilities and face head-on international threats to U.S. interests.</p><p>In Reagan's day, one of the primary international threats to democracy was Communism, while today the strongest threat to democracy is largely considered terrorist groups like ISIS. Though vastly different entities, both are considered vehicles for violence with international implications. Reagan approached the threat with a commitment to American defense and an unwavering commitment to eradicating threats to our democracy. That same methodology could become key in today's struggles.</p><p>Today, America continues to face international threats from increasingly sophisticated terrorist cells. While strengthening our military is key, as Reagan demonstrated, the modern world also requires investment in building up our technological capabilities and ability to defend from cyberattacks and hacking. Though such concepts weren't relevant during Reagan's tenure, we can use his example of defense-focused sensibilities to approach modern threats to democracy and freedom.&nbsp;</p> urn:store:1:blog:post:40 http://www.reagan.com/maintaining-privacy-in-solicitations Maintaining Privacy in Solicitations <p><img alt="" height="281" src="https://images.clickfunnels.com/6a/124b607a4711e7b97df11c8fd44cd9/privacy-in-solicitations-blog-1.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>We’ve all been there. Just as you set your plate down on the dining room table, the phone starts ringing. You abandon your dinner and head to the phone, thinking it might be one of your kids or a family friend — only to hear a telemarketer on the other end, trying to sell you a new product or service.</p><p>Such solicitations are often not just irritating but can be a significant invasion of privacy. With the advent of technology, solicitors have found new ways to contact consumers.</p><p>Here are a few opportunities you can take advantage to protect your privacy.</p><p><strong>Private Email:</strong> We heard a lot of talk about “private email service” in the 2016 presidential election. For regular citizens, such methods can be a frontline of defense against unwanted intrusion. When consumers rely on a cloud provider, such as is used by big-name companies like Gmail, they lose the autonomy to decide who can access their emails, which could get information into the hands of solicitors. Using a personal email service puts the power back in the hands of the consumer.</p><p><strong>Do Not Call:</strong> Register your home or mobile phone with the National Do Not Call Registry, a database maintained by the federal government. The service can cut down on unwanted calls but often doesn’t completely eliminate them. Several loopholes exist that allow telemarketing calls on business lines and from political organizations, market-research companies and nonprofit organizations.</p><p><strong>Credit Screening Opt-Out:</strong> The nation’s leading credit agencies have collaborated on an opt-out service that can decrease the number of credit-card solicitations consumers receive in the mail. Call 1-888-5-OPT-OUT or visit here to begin the opt-out process.</p><p><strong>Incognito Browsing:</strong> Your Internet browsing history is another area that can be compromised. To contend with this issue, many browsers allow their users to literally go “incognito.” The private mode clears any sites you visit from your computer’s history, though your IP address is still tracked. See this guide to learn how to set your browser to Incognito on most leading browsers.</p><p><strong>Direct Marketing Association:</strong> The DMA offers several solutions for reducing solicitations by mail and email. Signing up for the association’s opt-out</p> urn:store:1:blog:post:39 http://www.reagan.com/why-email-is-not-private Why Email is Not Private <p><img alt="" height="238" src="https://images.clickfunnels.com/a1/158ce077cb11e7a92d1dae7885bf70/Email-Private.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>With evolving technology, email has taken the place of many other increasingly-outdated spaces. A heartfelt letter to a friend that used to go through the U.S. Postal System now can be transmitted through email. A check to cover your utilities can now be sent, bank info and all, with the click of a button. The job application with your address and work history that used to be dropped off in person now travels to a potential employer through email. Do you have a <a href="https://www.reagan.com/">private email service</a>?</p><p>While we may presume those very private communications will remain private, that’s definitely not the case. When you use a public email service such as Gmail, your messages don’t just shoot off into cyberspace; email and Internet service providers often save a copy of every digital communication you send and receive. No matter how many times you hit delete or empty your digital trashcan, the imprint left by your messages can stay.</p><p>That imprint can be intercepted by others. While you certainly may not want your private messages insulting your boss or your sweet back and forth with your spouse to be read by anyone but the recipient, you definitely don’t want your financial documents and other sensitive information to be accessible by outside sources.</p><p>In addition to your messages being saved by a server, many large email service providers make it a practice to sell users’ information. That could scatter your personal details among countless databases, bringing your information before many more pairs of eyes.</p><p>So <a href="https://www.reagan.com/t/anonymity_through_private_email">how can you protect your privacy?</a> Email is an essential way of life now, so avoiding it altogether is just impractical. Practical options do exist, however, like registering for a private email address. Using a private server significantly reduces the avenues that hackers can use to access your information; the fewer hands your messages are in, the more secure your information remains.</p><p>A private email service means your messages stay between you and the intended sender. Your information won’t be archived in a vast and often-accessible database, and your data won’t be passed on to those who could have ill intentions. Learning how to use email smartly is the best way to ensure your privacy is protected.</p> urn:store:1:blog:post:38 http://www.reagan.com/socialist-ideas-are-making-a-resurgence Socialist Ideas are Making a Resurgence <p><img alt="" height="238" src="https://images.clickfunnels.com/b8/ad2091720b11e799b91b0ad47a331c/June-Blog-4.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>A lot of themes arose in the 2016 election, and among the strongest and most concerning to Americans was socialism.</p><p>According to The Nation, a recent poll found that more than 40 percent of Americans under 30 have a positive view of socialism. Tenets of socialism particularly took hold in the campaign of Democratic presidential hopeful Bernie Sanders, whose crowd of largely millennial followers rejoiced in his plans for free college tuition, universal health care and other proposals aimed at government support of the public. While such ideas may have mobilized Democratic supporters, the reality of a socialist society wasn’t addressed in such plans.</p><p>Socialism and communism were deemed among the strongest threats to American economic success by President Ronald Reagan, and for good reason. Reagan’s approach to socialism can be summed up in this straightforward statement he once delivered: “Socialism only works in two places: heaven, where they don’t need it, and hell, where they already have it.”</p><p>According to Reagan, socialism could only work in a perfect world, and ours is anything but. And, he advised that the societies that have implemented socialist practices have suffered damaging consequences.</p><p>That advice seems to hold true in the modern world.Socialism in the 21st century has also proven to be a failure. For instance, a wave of Latin American countries</p><p>Socialism in the 21st century has also proven to be a failure. For instance, a wave of Latin American countries <g class="gr_ gr_45 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar multiReplace" data-gr-id="45" id="45">have</g> incorporated socialist principles into their governance, to the detriment of their people. One of the main criticisms of modern socialism in Latin America, in particular, is that it has led to the rise of authoritarianism. From there, it is not a far leap to dictatorship, which scores of Latin American countries have fallen prey to.</p><p>One of the main criticisms of modern socialism in Latin America, in particular, is that it has led to the rise of authoritarianism. From there, it is not a far leap to dictatorship, which scores of Latin American countries have fallen prey to.Countries’ economies have also suffered under socialist policies. The cost of socialist programs in these regions has been linked to rapid inflation, stalled economic</p><p>Countries’ economies have also suffered under socialist policies. The cost of socialist programs in these regions has been linked to rapid inflation, stalled economic growth, and an overall downward economy. Venezuela, for instance, was recently determined to have the world’s worst economy, a telling sign of the price of socialism.</p><p>President Reagan saw the threat that socialism posed to our country, and that danger hasn’t faded over time. Through a private email address, you can take a step toward getting big tech and the government out of your life. Less government is the first step in fighting socialism in your own life.</p> urn:store:1:blog:post:37 http://www.reagan.com/summer-travel-internet-security-in-hotels-airports-and-public-places Summer Travel: Internet Security in Hotels, Airports, and Public Places <p><img alt="" height="233" src="https://images.clickfunnels.com/5f/a26c616c9011e7b0514fe4052434f4/Travel-_-Secure-Email-Service-Blog-1-of-4.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>The sun is shining, schools are out, and temps are soaring. For many, summer means one thing: vacation.</p><p>Whether you’re setting off with the youngsters, taking a getaway with your spouse or heading out for some personal recharging time, chances are most of us are going to take a trip before the summer wraps up. While we may get some time out of the office, thanks to smart phones and tablets, work often follows us on vacation. Answering emails and accessing private files while in flight or poolside at your hotel may be convenient, but it could also set you up for some security risks.</p><p>Here are a few tips for keeping your privacy a priority while you’re on the road:</p><ul><li>Don’t hop onto just any Wi-Fi. Only use a Wi-Fi hotspot that you have verified belongs to the hotel, airport or public space where you are. Signing onto an unsecured hotspot could open your devices to hacking, especially if you’re not using a secure email service.</li><li>Turn off your Wi-Fi when it’s not in use. Leaving your devices Wi-Fi-enabled when they’re sitting unused in your hotel room or elsewhere on your trip could increase the risk of them being accessed by outsiders.</li><li>Use a secure email service. Private email does just what it says: it lets you keep your private email private, without your messages being stored in vast and often-accessible databases, like most public services.</li><li>Don’t use public computers for any password-protected services. Since you don’t know what type of security measures are in place at public computers at hotels, libraries or other spots you might encounter on your trip, you don’t want to input any personal information onto those devices. Use public computers for general tasks like checking the weather or looking for local attractions.</li></ul><p>There’s plenty of time for fun in the sun this summer, but make sure to take some extra time to safeguard your Internet security so you can enjoy your vacation stress-free.&nbsp;</p> urn:store:1:blog:post:36 http://www.reagan.com/avoid-these-common-email-mistakes Avoid These Common Email Mistakes <p><img alt="" height="238" src="https://images.clickfunnels.com/c1/15f6b0673111e7afbc0703159b96bc/June-Blog-3.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="357" /></p> <p>The rise of email has brought about an entirely new way to communicate. It’s not quite equal to now-dated letter writing, but it’s also not the same as a phone call.</p> <p>Email is everywhere, but rules governing how we use it are not. Even with the most private email, the way you say things can be misinterpreted. For instance, do you use an exclamation point in a professional email? Or, do you sign it with the traditional “Sincerely Yours”?</p> <p>There is no easy answer, since there are no written policies dictating email etiquette. Even though we use email for everything from the professional to the personal, it is still a relatively new tool, and navigating its ins and outs can be tricky.</p> <p>Here are a few common email errors to avoid:</p> <h3>Mixing the formal and the informal</h3> <p>An email to your boss and one to your spouse should be approached very differently. Sprinkling exclamation points or emojis throughout a workplace message may seem out of place, just as signing an email to your family with your full name seems unnatural.</p> <p>But, many people get used to composing an email the same way and don’t vary their tone depending on the context — whether it’s a professional or personal message. Give professional emails a close read before you hit “send” to catch any misspelling, grammatical errors or too-formal tones; we may get used to conversing with family and friends over email like that, but workplace messages should be a step up the formality ladder.</p> <h3>Copy and reply all with caution</h3> <p>The “copy” function is a great way to loop someone into an email thread quickly. But, not everyone wants their information shared with others.</p> <p>Only use the feature if you’re certain everyone on the message is comfortable with their email address, and what they may have written in a previous thread, being shared.</p> <p>Similarly, the “reply all” can get some email users into trouble. Make sure before you hit that button that you want your message to be directed to everyone. Occasionally, hopping off a public email thread and communicating with someone else in a <a href="/privateemailservice">private email may be more appropriate.</a></p> <h3>Don’t use email for everything</h3> <p>It’s getting more common to rely on email for nearly all of our communication. But, the tool shouldn’t be a substitute for conversations that are better had face to face.</p> <p>Don’t fall back on email to avoid tough or awkward encounters, such as firing someone or discussing salary. Sensitive information, such as Social Security numbers or passwords, also should never be put into an email – even the most private email; no matter how secure we make our systems, that information is better addressed aloud.</p> urn:store:1:blog:post:35 http://www.reagan.com/10-best-reagan-quotes 10 Best Reagan Quotes <p><img alt="" height="451" src="https://images.clickfunnels.com/fa/17ad405cd311e7a3251d0cc9b402a6/Reagan-Blog-2-Quotes.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>President Ronald Reagan is known to history as the “Great Communicator.” His respect for this country and its foundation were clear throughout his presidency. As we observe our independence this July, we wanted to highlight some of President Reagan’s most profound quotes that truly represent the legacy of his presidency and our America.</p><p>The former actor harnessed his natural talents to deliver countless speeches and statements through his eight years in office that both mobilized and motivated many Americans. Reagan was known for evoking vivid imagery that touched the hearts and minds of listeners, providing solace in times of distress, inspiration when it was lacking and humor when it was needed.</p><p>If you have a Reagan email, you likely know how important the president’s words were to American history. Here is a refresher on the Great Communicator’s most impactful statements:</p><blockquote><p>— “I know in my heart that man is good, that what is right will always eventually triumph. And there's purpose and worth to each and every life.”</p><p>— “The future doesn't belong to the light-hearted; it belongs to the brave.”</p><p>— “If more government is the answer, then it really was a stupid question.”</p><p>— “Freedom is never more than one generation away from extinction. We didn't pass it to our children in the bloodstream. It must be fought for, protected and handed on for them to do the same.”</p><p>— “We must reject the idea that every time a law's broken, society is guilty rather than the lawbreaker. It's time to restore the American precept that each individual is accountable for his actions.”</p><p>— “The most terrifying words in the English language are, ‘I'm from the government and I'm here to help.’”</p><p>— “It's true hard work never killed anybody but I figured, why take the chance?”</p><p>— “The greatest leader is not necessarily the one who does the greatest things. He is the one that gets the people to do the greatest things.”</p><p>— “There is no limit to the amount of good you can do if you don't care who gets the credit.”</p><p>— “Surround yourself with great people, delegate authority and get out of the way.”</p></blockquote> urn:store:1:blog:post:33 http://www.reagan.com/google-says-it-wont-read-emails-for-targeting-but-you-should-still-be-concerned Google Says It Won’t Read Emails for Targeting But You Should Still Be Concerned <p><img alt="" height="267" src="https://images.clickfunnels.com/f8/d0b6005b6d11e78752f946028defc8/gettyimages-486234008-759c477ff7dc992ebe97ff85ef5564edfd3b90ce-s800-c85.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>Google recently announced that it will no longer scan emails in Gmail-based accounts in order to sell targeted advertising. But ad personalization is only the tip of the iceberg when it comes to maintaining a secure email.</p><p>The company’s decision will align Gmail ad curation with other Google products that have already stopped scanning emails, such as G Suite for business users, according to Diane Greene, senior vice president of Google Cloud.</p><p>"Ads shown are based on users' settings. Users can change those settings at any time, including disabling ads personalization,” Greene wrote in a blog post regarding the announcement. "Consumer Gmail content will not be used or scanned for any ads personalization after this change."</p><p>The specificity of the language leaves a large opening for the company to continue reading a user’s private email address for priority settings or suggesting replies that person might send. Just not for targeting advertisements anymore.</p><p>Frederic Lardinois, a writer for Techcrunch, responded to the company’s announcement by saying that Google has already garnered so much information about its users that the email scans are most likely not even contributing to ad performance in a substantial way.</p><p>“As much as I’d like to believe that Google is doing this out of the goodness of its heart, chances are the only reason the company would make any changes to its advertising products is because it has data that shows it doesn’t need this additional information about its users,” Lardinois wrote.</p><p>If you want to make sure that you preserve the best secure email, look deeper into Google’s actual privacy policies and practices after exploring all options of email protection, such as the <a href="https://www.reagan.com/p/1/reagancom-personel-email">Private Email Service provided by Reagan.com</a>. Let us keep your personal information out of the hands of big corporations, including those that may seem to have your best interest at heart.</p> urn:store:1:blog:post:32 http://www.reagan.com/leveraging-tech-to-build-your-small-biz Leveraging Tech to Build Your Small Biz <p><img alt="" height="236" src="https://images.clickfunnels.com/e7/dd09605b5511e7bb5ebd38d7abdcba/June-Blog-2.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><blockquote><p>“Entrepreneurs and their small enterprises are responsible for almost all the economic growth in the United States.” — President Ronald Reagan</p></blockquote><p>President Reagan recognized the vital role of small business in American economics, a truth that still remains relevant today. It is the men and women who launch their own enterprises, create jobs and invest in their local communities who fuel the most sustainable growth in our society.</p><p>How do such entities remain sustainable in the ever-evolving American economic and business landscape? As is with most questions nowadays, the answer may lie in one word: technology.There are a number of ways</p><p>There are a number of ways a small business can tap into tech to stay competitive in a changing world. From having a secure email service, like <a href="https://mail.xyz">Mail.xyz</a>, to having the right digital marketing strategy, technology can do wonders for marketing.</p><p>Websites are a must in today’s digital age, and fortunately there a number of resources to help business owners build and maintain their own sites — without much cost or tech know-how. Systems like <a href="https://www.joomla.org/">Joomla</a>&nbsp;and <a href="https://www.drupal.org/">Droopla</a>&nbsp;let users built sites at little to no cost; the affordability doesn’t compromise user accessibility or aesthetic.</p><p>Social media is also a big player in business marketing. Facebook, Twitter and Instagram are all free to use and give businesses a direct line to their customers. Business owners can create a “fan” page on which they can post information about the company, photos and more, and use the site to interact with the public.</p><p>The typical business environment is also changing because of technology. Many small businesses are moving toward home-office work when feasible; by investing in home laptops and other traditional office equipment for at-home work, owners can cut down on employees’ commuting costs, office utility expenses and more.</p><p>Organization and productivity are also enhanced by technology. The information contained in rows of filing cabinets of the past can now all be stored in one simple folder on a cloud-based app or other services. Condensing and streamlining company data into digital systems can help business owners stay on top of payroll, billing, and orders — ultimately boosting the company’s bottom line.</p><p>In some ways, the increasing digitization of the world can threaten small business, but the more business owners adapt to a changing world, the more they’ll be able to not only weather the changes but thrive because of them.</p> urn:store:1:blog:post:31 http://www.reagan.com/how-to-keep-your-passwords-safe-and-secure How to Keep Your Passwords Safe and Secure <p><img alt="" height="238" src="https://images.clickfunnels.com/0b/36bfa1575a11e79866735139bc090e/June-Blog-4---Keep-Passwords-Safe.jpg" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>With our increasing reliance on technology comes an increasing risk for security breaches. We’ve all seen the news about large corporations and banks whose systems have been compromised and, while our personal information can be accessed through such hacks, cyber spies are also attacking personal accounts. Even if you have a private email service, password safety is crucial.</p><p>According to <a href="http://money.cnn.com/2014/05/28/technology/security/hack-data-breach/" title="CNN Money Hackers">CNNMoney</a>, nearly half of all Americans had their personal information exposed by hackers in 2014. And, in a study by <a href="https://www.entrepreneur.com/article/246902" title="Entrepreneur Article">Entrepreneur</a>, about 40 percent of all people surveyed reported a “security incident” involving their personal accounts.</p><p>So, how do we protect ourselves? Passwords are meant to be the first line of defense against such intrusions; from email to online-shopping accounts and bank portals, our passwords are meant to protect our vital information and safeguard us against serious crimes like identity theft.</p><p>Here are a few tips to beef up your password potential.</p><h4>DON’T</h4><ul><li>Use the same password for all of your accounts. You may be tempted to keep a standard password so it’s easy to remember, but the more common it is, the more risk there is for it being compromised.</li><li>Use information that could be easily guessed. Leave out your name, address, birthday, family info and other easily identifiable details. If you could find that information on yourself through a simple Google search or a flip through the phone book, don’t incorporate it into your password, as hackers can also find it.</li><li>Keep a list of passwords. You may want to store your passwords on your computer desktop, <g class="gr_ gr_39 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar multiReplace" data-gr-id="39" id="39">in</g> your phone or even on a sticky note by your computer; if anyone else can access that data, either in person or virtually, don’t. Opt instead for a secure location like a safety deposit box.</li></ul><h4>DO</h4><ul><li>Change your password frequently. Most security experts recommend changing your password at least once every six months. The longer a password stays stale, the more susceptible it can be to compromise.</li><li>Be creative. Use a combination of upper-case and lower-case letters, numbers, and special characters. The more unique, the more secure.</li><li>Protect yourself in other ways. Install anti-virus software, which adds an added wall of protection.</li></ul> urn:store:1:blog:post:30 http://www.reagan.com/why-was-ronald-reagans-legacy-so-important-to-the-2016-election Why was Ronald Reagan’s legacy so important to the 2016 election? <p><img alt="" height="404" src="https://images.clickfunnels.com/5f/4bd10051ee11e781e665e85e133b92/Ronald-Reagan-official.png" style="display:block;margin-left:auto;margin-right:auto;" width="357" /></p><p>The 2016 presidential election was certainly historic for a number of reasons. As such, it caused some people to look to the past as they envisioned the future, and who they hoped would lead the country in the right direction.</p><p>Both conservatives and liberals can agree that President Ronald Reagan was unlike any president who came before him, as well as any who have followed. That may suggest why his name was invoked so frequently during the 2016 election season. Reagan sought to break the political mold, and bring a breath of fresh air to Washington, D.C. Unlike career politicians of the time, Reagan didn't have a deep political background; he built connections with American voters instead of D.C. elites. Reagan relied on his background as a labor leader from humble beginnings to make inroads with America's middle class, an effort that carried him all the way to the Oval Office.</p><p>Many have drawn comparisons between Reagan’s rise to presidential power and that of President Donald Trump. Trump, too, ran a campaign focused on the middle class, particularly the segments, like in Reagan’s time, who felt voiceless in an increasingly political correct atmosphere. Respect for religious freedom, investment in labor and a reduction of government overreach were all cornerstones of Reagan’s campaign and later presidency, and they too are issues Trump centered on. Trump's unconventional background as a reality-television star has even prompted some to recall Reagan’s work as an actor.</p><p>Conservatives aren't the only ones who raised Reagan’s legacy during election season. Some on the left also sought to use his tough stance on crime, foreign threats and government spending as a comparison to Trump to encourage non-conservative voting. And, like Reagan, Trump has come under intense scrutiny by the left-leaning media.</p><p>The references from both sides of the aisle illustrate the power of Ronald Reagan's legacy. Nearly 30 years after his term ended, his positions, policies and even personality are still being looked to as examples of conservative leadership. But, as historian Gil Troy has noted, Reagan sought to transcend party politics — “He acted as president of the United States, not president of the Republican Party,” Gil said — a lesson that politicos of all backgrounds can learn from today.&nbsp; When you use the Reagan.com private email service you help share the legacy of Ronald Reagan with each email you send.</p> urn:store:1:blog:post:29 http://www.reagan.com/follow-these-tips-to-organize-your-emails Follow these tips to organize your emails <p>&nbsp;<img alt="BW Computer" height="230" src="https://images.clickfunnels.com/bc/3607c14ad011e7aa44d323bf0fe419/bw-computer.jpg" width="357" /></p><p>While spring cleaning may have some people rifling through their closets, amassing boxes of donations or hand-me-downs, today’s digital age provides a new opportunity when you have the itch to organize. Even the most private email can get just as clogged and crowded as our clothes drawers. Nearly everything is done via email now — work, personal communication, shopping receipts, bill pay — so the sheer volume of emails we get on a daily basis can be easily overwhelming.</p><p>You can use some of your spring-cleaning strategies to also keep your email organized.</p><p>Just about any email program offers a folders function, so take advantage of it! First, think about some of the main categories your emails fall into, such as Work, Family, and Promotions, and use those as your primary folders. Each can then be broken down into subcategories; for your Work folder, you could further divide it into deadline-based subfolders, like Upcoming, In Progress and Completed.</p><p>Having a system in place is only beneficial if you use it. Once you have your folder structure set up, spend some time sorting and archiving messages that you want to save. Then, try to hold yourself to a routine for filing new messages. You may want to sort a message into its respective subfolder as soon as you read it, or if that’s too immediate, commit to a timeframe for going through your emails, such as every Friday or once a month.</p><p>And, just like with spring cleaning, be realistic about hitting that delete button. Set down some basic criteria, such as accounts payable messages should be saved for one year, work-related emails for six months and personal for one month. Think creatively about the messages you’re hesitant to part with. If you think you’ll need the person’s contact info, make sure it’s stored in your email system’s address book and then send it to the trashcan. Or if you’re feeling sentimental about personal emails with friends and family, save them all to a flashdrive or disk to clear out your system.</p><p>Email is a now a natural and necessary part of our everyday lives, which is why we need to not only know how to use it, but also how to manage it.</p> urn:store:1:blog:post:27 http://www.reagan.com/president-reagan-on-big-government-and-the-little-guy President Reagan on Big Government and the Little Guy <blockquote><p style="text-align:center;"><img alt="" height="411" src="https://images.clickfunnels.com/10/6fd3a1456f11e7b4f87512cd33ee2d/nm_ron_reagan_haircut_ss_110110_ssh.jpg" width="531" /></p><h3 style="text-align:left;"><em>“You can’t be for big government, big taxes, and big bureaucracy and still be for the little guy.” </em><br />- Ronald Reagan</h3></blockquote><p>Taxes have been in the news recently. Republicans want to cut corporate and individual tax rates to spur growth in the economy. Ronald Reagan would applaud this effort. He knew that the American people were far better at determining how to spend money than the government.</p><p>Since Reagan was president, all types of hidden taxes have also made their way into our lives. Gas taxes have increased in many areas. Taxes on tobacco and alcohol have gone up. Now some cities want to tax sugary drinks.</p><p>Who do these types of taxes impact most? Low and middle-income earners. These taxes are a much larger percentage of their income than it is for higher-earning Americans.</p><p>Liberals preach they are looking out for the little guy, all while taking his money and wasting it on ineffective programs, or using it to pay off debt accumulated from past wasteful spending.</p><p>Big government, big taxes, and big bureaucracy don’t benefit the little guy. Big benefits big – which creates more big – in a big way.</p><p>President Reagan was a champion of the little guy and of small businesses. Regarding this, he said, “<em>Entrepreneurs and their small enterprises are responsible for almost all the economic growth in the United States.</em>”</p><p>Let’s hope lawmakers in Washington remember this and unleash the power of the little guy.</p><p>What do you think?&nbsp;</p> urn:store:1:blog:post:26 http://www.reagan.com/tech-companies-big-donors-to-non-conservative-politics Tech companies big donors to non-conservative politics <p>&nbsp;<img alt="Money Briefcase" height="238" src="https://images.clickfunnels.com/8c/1225013f3711e785e4d1bb0184bd99/money.jpg" width="357" /></p><p>The 2016 election cycle generated a lot more than headlines.</p><p>Countless donations to candidates on both sides of the aisle poured in from across the nation, buoyed by the highly publicized presidential election. In the presidential race alone, candidates brought in a whopping $1.5 billion.</p><p>So where did the money come from?</p><p>In today’s digital age, tech companies are among the biggest money-makers in the nation, so it stands to reason that tech leaders would be among the largest political donors. According to nonpartisan watchdog group Crowdpac, American tech employees overwhelmingly donated to Hillary Clinton’s presidential campaign — 95 percent of the total tech dollar, which the organization set at $8.1 million, went to Clinton.</p><p>Some familiar names were also big donors. For instance, Eric Schmidt, CEO of Alphabet, the parent company of Google, was a vocal supporter of the former secretary of state. According to OpenSecrets, Alphabet itself donated nearly $1.6 million to Clinton’s campaign, making it her second-largest corporate donor.</p><p>Microsoft followed right behind with a donation of $814,000, while Apple kicked in $653,000 and Facebook donated nearly a half-million.</p><p>After Donald Trump’s inauguration, he met with a small group of tech leaders, whose companies gave a total of $4 million to Clinton’s campaign — and just $131,000 to his own.</p><p>The presidential race drew big Democratic dollars from tech PACs, but overall election spending was a bit more equitable. Google contributed about $1.5 million to federal candidates, with Republican politicos getting about 56 percent of the money. Over at Yahoo, Democratic spending slightly outstripped Republican, 51-49 percent. AOL was the most lopsided on its overall contributions, with 92 percent of its $64,000 donations going to Democratic candidates.</p><p>The 2016 election proved that tech companies continue to be significant political players. While many are left-leaning, that’s not a universal truth, meaning that there could be some leeway on which conservative candidates can capitalize.</p> urn:store:1:blog:post:25 http://www.reagan.com/congress-allows-isps-to-access-user-information Congress allows ISPs to Access User Information <p>&nbsp;<img alt="Capital Hill Dark" height="238" src="https://tctechcrunch2011.files.wordpress.com/2017/03/14028728419_2feece5bff_k.jpg?w=738" width="357" /></p><p>The U.S. Congress recently delivered a win for Internet-service providers who have been challenging Obama-era Internet restrictions.</p><p>The Republican-led body voted in late March to approve a resolution that would lift a Federal Communications Commission rule that required ISPs to obtain permission from consumers before using their browsing history; that measure was adopted in 2015 and was poised to go into effect. The repeal measure, adopted in a 215-205 vote March 28, was sent to the desk of President Donald Trump, who is expected to sign it.</p><p>Opponents of the move have argued that loosening the restrictions could violate consumers’ privacy rights and open them up to hacking. However, supporters contend the original rule was unnecessary, and an example of government overreaching.</p><p>According to many Congressional Republicans, giving the FCC oversight over consumer privacy itself was problematic; they argued that broadband regulation shouldn’t be a responsibility given exclusively to the FCC but, rather, shared with or managed by the Federal Trade Commission.</p><p>“It is worth remembering that the FCC’s own overreach created the problem we are facing today,” FCC Chairman Ajit Pai said in a statement about the recent vote. “Until 2015, the Federal Trade Commission was protecting consumers very effectively, policing every online company’s privacy practices consistently and initiating numerous enforcement actions. However, two years ago, the FCC stripped the FTC of its authority over Internet service providers.”</p><p>Another main point of contention for ISPs was that the privacy rules wouldn’t have applied across the board. For instance, huge players like Google and Facebook are not ISPs, so they wouldn’t have been subjected to the regulations, leading opponents of the FCC regulation to raise arguments about fairness. For one, companies like these giants would still have the ability to use or share users’ info for advertising purposes, which would seem to defeat the purpose of the regulation to begin with. And, the rule seemed to give some companies a distinct advantage over others.</p><p>Regardless of the regulation, experts say users will likely feel no real effect, especially because ISPs have long been permitted to use consumers’ data. Users with concerns about the process are encouraged to contact their ISPs about opportunities to opt out.</p> urn:store:1:blog:post:24 http://www.reagan.com/ronald-reagan-and-personal-responsibility Ronald Reagan and Personal Responsibility <p><img alt="Law and Order" src="https://images.clickfunnels.com/a5/4c697031a611e79209c389324f576f/Depositphotos_38781965_original.jpg" width="357" height="237" /></p> <p>“We must reject the idea that every time a law's broken, society is guilty rather than the lawbreaker. It is time to restore the American precept that each individual is accountable for his actions.”</p> <p>- Ronald Reagan</p> <p>Personal responsibility is what created the United States. Literally.</p> <p>When our forefathers’ declared independence from England, they sent a signal to the world that freedom and liberty are only possible when each person is allowed to determine how to live their life.</p> <p>They called these God-given rights. And with these rights come responsibilities.</p> <p>We teach our children they will be held accountable for their actions. We tell them they will reap what they sow. Yet they often see lawbreakers set free, or never arrested in the first place. Many who are sent to prison commit more crimes upon their release.</p> <p>This cycle repeats itself time and time again until the laws cease to be a deterrent. They become a mere nuisance to the criminals.</p> <p>As President Reagan stated, it’s time to put a stop to this. Laws are laws for a reason. We need them in order to have a functioning society.</p> <p>Some may disagree with a law. Fine. Seek to change it. Until then, live within the law.</p> <p>When laws are not enforced, lawbreakers are in essence being told that their actions are permitted.</p> <p>Laws are not the problem. Lawbreakers are the problem.</p> <p>Personal responsibility is not a burden. It is a requirement for a country that was founded on the God-given rights of freedom and liberty.</p> <p>To be truly free, one must be personally responsible. Take personal responsibility of your own rights, and make sure you are protecting yourself online. Discover the <a href="/email_privacy_risks">email privacy risks</a> you could be falling for right now. And switch your email to <a href="https://www.reagan.com">Reagan.com</a>, the ideal email for conservatives, and be in control of your actions.</p> urn:store:1:blog:post:23 http://www.reagan.com/spam-removal-service-sells-users-emails-courtroom-news-service Spam-Removal Service Sells Users' Emails (Courtroom News Service) <h1><img alt="" height="267" src="https://images.clickfunnels.com/ec/3963a0340e11e793028338170124bf/1890507_777376749039057_597732228645172405_o.0.jpg" width="400" /></h1><p>UnrollMe,&nbsp;a service that allows individuals to remove themselves from email lists, is the subject of a class action lawsuit. Users claim that the service mined user emails for valuable data and then sold it to the highest bidder. &nbsp;Read more on this from Courthouse News Service.</p><h2><a href="https://www.courthousenews.com/spam-removal-service-sells-users-emails-class-says/">https://www.courthousenews.com/spam-removal-service-sells-users-emails-class-says/</a></h2><h2>&nbsp;</h2> urn:store:1:blog:post:22 http://www.reagan.com/-comcast-paid-civil-rights-groups-to-support-killing-broadband-privacy-rules-techdirt Comcast Paid Civil Rights Groups To Support Killing Broadband Privacy Rules (TechDirt) <h1><img alt="" height="337" src="https://am23.akamaized.net/tms/cnt/uploads/2016/12/14615930366_58bfd79aff_z.jpg" width="640" /></h1>Comcast and big tech companies will do anything to violate your privacy and sell it the highest bidder. Their latest move has been to use civil rights groups. Read more on this from TechDirt.<h2><a href="https://www.techdirt.com/articles/20170329/08194837033/comcast-paid-civil-rights-groups-to-support-killing-broadband-privacy-rules.shtml">https://www.techdirt.com/articles/20170329/08194837033/comcast-paid-civil-rights-groups-to-support-killing-broadband-privacy-rules.shtml</a></h2><h2>&nbsp;</h2> urn:store:1:blog:post:21 http://www.reagan.com/congress-has-sold-off-your-privacy-infoworld Congress has sold off your privacy (InfoWorld) <h1><img alt="" src="https://images.clickfunnels.com/ff/b675e1340811e79afe294721f581b4/careers_money-100649274-large.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="350" height="350" /></h1> <p>In the latest move showing the US Government has no interest in your privacy, Internet Service Providers have been allowed to collect and sell your data. Read more about it from InfoWorld.</p> <h2><a href="http://www.infoworld.com/article/3186524/broadband/congress-has-sold-off-your-privacyand-us-security.html">http://www.infoworld.com/article/3186524/broadband/congress-has-sold-off-your-privacyand-us-security.html</a></h2> <h2> </h2>