Tue. Jun 18th, 2024

7 Tips to Manage Your Identity and Protect Your Privacy Online

Online Safey
Online Safety

Worried about how much of your private information is on the internet and vulnerable to theft or misuse? You’re not alone. Online privacy is an important issue.

But there are steps you can take to help manage and protect your financial and personal information while you visit your favorite social media, news, and entertainment sites.

Here are some ways you can boost your online privacy.

1. Limit the personal information you share on social media

A smart way to help protect your privacy online? Don’t overshare on social media. Providing too much information on Facebook, Twitter, and Instagram could make it easier for cybercriminals to obtain identifying information, which could allow them to steal your identity or to access your financial information.

For example, could an identity thief determine your high school mascot or your mother’s maiden name from digging through your Facebook account? This information is sometimes used as security questions to change passwords on financial accounts.

To protect your online privacy, ignore the “About Me” fields in your social media profiles. You don’t have to let people know what year or where you were born — which could make you an easier target for identity theft.

Explore different privacy settings, too. You might want to limit the people who can view your posts to those you’ve personally invited.

Create strong passwords, too, for your social media profiles to help prevent others from logging into them in your name. This means using a combination of at least 12 numbers, special characters, and upper- and lower-case letters.

2. Browse in private mode

If you don’t want your computer to save your browsing history, temporary internet files, or cookies, do your web surfing in private mode.

Web browsers offer their own versions of this form of privacy protection. In Chrome, it’s called Incognito Mode. Firefox calls its setting Private Browsing, and Internet Explorer uses the name InPrivate Browsing for its privacy feature. When you search with these modes turned on, others won’t be able to trace your browsing history from your computer.

But these private modes aren’t completely private. When you’re searching in incognito or private mode, your Internet Service Provider (ISP) can still see your browsing activity. If you are searching on a company computer, so can your employer. The websites you visit can also track you.

So, yes, incognito browsing does have certain benefits. But it’s far from the only tool available to help you maintain your privacy while online.

3. Use a different search engine

If you’re like many web surfers, you rely heavily on Google as your search engine. But you don’t have to. Privacy is one reason people prefer to use anonymous search engines.

This type of search engine doesn’t collect or share your search history or clicks. Anonymous search engines can also block ad trackers on the websites you visit.

4. Use a virtual private network

A virtual private network (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection. VPNs mask your Internet Protocol (IP) address so your online actions are virtually untraceable.

Using a VPN is especially important when you’re on public Wi-Fi at a library, coffee shop, or other public location. A VPN will make it more difficult for cybercriminals to breach your online privacy and access your personal information.

5. Be careful where you click

One of the ways in which hackers compromise your online privacy is through phishing attempts. In phishing, scammers try to trick you into providing valuable financial or personal information. They’ll often do this by sending fake emails that appear to be from banks, credit card providers, or other financial institutions. Often, these emails will say that you must click on a link and verify your financial information to keep your account from being frozen or closed.

Don’t fall for these scams. If you click on a phishing link, you could be taken to a spoofed webpage that looks like the homepage of a bank or financial institution. But when you enter in your account information, you’ll be sending it to the scammers behind the phishing attempt.

Before clicking on suspicious links, hover your cursor over the link to view the destination URL. If it doesn’t match the financial website you use, don’t click.

6. Secure your mobile devices, too

Many of us spend more time surfing the web, answering emails, and watching videos on our smartphones than we do on our laptops. It’s important, then, to put as much effort into protecting our online privacy on our phones and tablets as on our computers.

To start, make sure to use a passcode to lock your phone. It might seem like a hassle to enter a code every time you want to access your phone’s home screen. But this passcode could offer an extra layer of protection if your phone is lost or stolen. Make sure your passcode is complex. Don’t use your birthdate, your house number, or any other code that thieves might be able to guess.

Use caution when downloading apps. These games and productivity tools could come embedded with dangerous viruses. Only buy games from legitimate sources.

Use the same caution, too, when searching the web or reading emails on your mobile devices as you do when using your laptop or desktop computer.

Don’t ignore software updates, either. These updates often include important protections against the latest viruses.

7. Use quality antivirus software

Finally, always install antivirus software on all your devices. This software can keep hackers from remotely taking over your computer, accessing your personal and financial information, and tracking your location.

Manufacturers frequently update their virus protection software as a defense against the latest malware, spyware, and other viruses. Install updates as soon as they become available or set up automatic updates on all your devices.

How to Protect Your Digital Privacy

By making a few simple changes to your devices and accounts, you can maintain security against outside parties’ unwanted attempts to access your data as well as protect your privacy from those you don’t consent to sharing your information with. Getting started is easy. Here’s a guide to the few simple changes you can make to protect yourself and your information online. 

Use These Tools

Make smart use of the tools available to keep your data safe. 

Secure your accounts

Why: In the past decade, data breaches and password leaks have struck companies such as EquifaxFacebookHome DepotMarriottTargetYahoo, and countless others. If you have online accounts, hackers have likely leaked data from at least one of them. Want to know which of your accounts have been compromised? Search for your email address on Have I Been Pwned? to cross-reference your email address with hundreds of data breaches. 

How: Everyone should use a password manager to generate and remember different, complex passwords for every account — this is the most important thing people can do to protect their privacy and security today. Wirecutter’s favorite password managers are LastPass and 1Password. Both can generate passwords, monitor accounts for security breaches, suggest changing weak passwords, and sync your passwords between your computer and phone. Password managers seem intimidating to set up, but once you’ve installed one you just need to browse the Internet as usual. As you log in to accounts, the password manager saves your passwords and suggests changing weak or duplicate passwords. Over the course of a couple of weeks, you end up with new passwords for most of your accounts. Take this time to also change the default passwords for any devices in your house — if your home router, smart light bulbs, or security cameras are still using “password” or “1234” as the password, change them.

Everyone should also use two-step authentication whenever possible for their online accounts. Most banks and major social networks provide this option. As the name suggests, two-step authentication requires two steps: entering your password and entering a number only you can access. For example, step one is logging in to Facebook with your username and password. In step two, Facebook sends a temporary code to you in a text message or, even better, through an app like Google Authenticator, and you enter that code to log in. 

Protect your Web browsing

Why: Companies and websites track everything you do online. Every ad, social network button, and website collects information about your location, browsing habits, and more. The data collected reveals more about you than you might expect. You might think yourself clever for never tweeting your medical problems or sharing all your religious beliefs on Facebook, for instance, but chances are good that the websites you visit regularly provide all the data advertisers need to pinpoint the type of person you are. This is part of how targeted ads remain one of the Internet’s most unsettling innovations.

How: A browser extension like uBlock Origin blocks ads and the data they collect. The uBlock Origin extension also prevents malware from running in your browser and gives you an easy way to turn the ad blocking off when you want to support sites you know are secure. Combine uBlock with Privacy Badger, which blocks trackers, and ads won’t follow you around as much. To slow down stalker ads even more, disable interest-based ads from AppleFacebookGoogle, and Twitter. A lot of websites offer means to opt out of data collection, but you need to do so manually. Simple Opt Out has direct links to opt-out instructions for major sites like Netflix, Reddit, and more. Doing this won’t eliminate the problem completely, but it will significantly cut down the amount of data collected.

You should also install the HTTPS Everywhere extension. HTTPS Everywhere automatically directs you to the secure version of a site when the site supports that, making it difficult for an attacker — especially if you’re on public Wi-Fi at a coffee shop, airport, or hotel — to digitally eavesdrop on what you’re doing.

Some people may want to use a virtual private network (VPN), but it’s not necessary for everyone. If you frequently connect to public Wi-Fi, a VPN is useful because it adds a layer of security to your browsing when HTTPS isn’t available. It can also provide some privacy from your Internet service provider and help minimize tracking based on your IP address. But all your Internet activity still flows through the VPN provider’s servers, so in using a VPN you’re choosing to trust that company over your ISP not to store or sell your data. Make sure you understand the pros and cons first, but if you want a VPN, Wirecutter recommends IVPN.

Use antivirus software on your computer

Why: Viruses might not seem as common as they were a decade ago, but they still exist. Malicious software on your computer can wreak all kinds of havoc, from annoying pop-ups to covert bitcoin mining to scanning for personal information. If you’re at risk for clicking perilous links, or if you share a computer with multiple people in a household, it’s worthwhile to set up antivirus software, especially on Windows computers. 

How: If your computer runs Windows 10, you should use Microsoft’s built-in software, Windows Defender. Windows Defender offers plenty of security for most people, and it’s the main antivirus option that Wirecutter recommends; we reached that conclusion after speaking with several experts. If you run an older version of Windows (even though we recommend updating to Windows 10) or you use a shared computer, a second layer of protection might be necessary. For this purpose, Malwarebytes Premium is your best bet. Malwarebytes is unintrusive, it works well with Windows Defender, and it doesn’t push out dozens of annoying notifications like most antivirus utilities tend to do.

Mac users are typically okay with the protections included in macOS, especially if you download software only from Apple’s App Store and stick to well-known browser extensions. If you do want a second layer of security, Malwarebytes Premium is also available for Mac. You should avoid antivirus applications on your phone altogether and stick to downloading trusted apps from official stores. 

Good Practices

Adopt healthy internet habits to ensure that you don’t leave yourself prone. 

Update your software and devices

Why: Phone and computer operating systems, Web browsers, popular apps, and even smart-home devices receive frequent updates with new features and security improvements. These security updates are typically far better at thwarting hackers than antivirus software.

How: All three major operating systems can update automatically, but you should take a moment to double-check that you have automatic updates enabled for your OS of choice: WindowsmacOS, or Chrome OS. Although it’s frustrating to turn your computer on and have to wait out an update that might break the software you use, the security benefits are worth the trouble. These updates include new versions of Microsoft’s Edge browser and Apple’s Safari. Most third-party Web browsers, including Google’s Chrome and Mozilla Firefox, also update automatically. If you tend to leave your browser open all the time, remember to reboot it now and again to get those updates. Your phone also has automatic-update options. On Apple’s iPhone, enable automatic updates under Settings > General > Software Update. On Google’s Android operating system, security updates should happen automatically, but you can double-check by opening up Settings > System > Advanced > System Update.

For third-party software and apps, you may need to find and enable a Check for updates option in the software’s settings. Smart-home devices such as cameras, thermostats, and light bulbs can receive updates to the app as well as to the hardware itself. Check the settings using the device’s app to make sure these updates happen automatically; if you don’t find an automatic-update option, you may have to manually reboot the device on occasion (a monthly calendar reminder might help).

Don’t install sketchy software

Why: Every weird app you install on your phone and every browser extension or piece of software you download from a sketchy website represents another potential privacy and security hole. Countless mobile apps track your location everywhere you go and harvest your data without asking consent, even in children’s apps

How: Stop downloading garbage software, and stick to downloading programs and browser extensions directly from their makers and official app stores. You don’t need half the apps on your phone, and getting rid of what you don’t need can make your phone feel faster. Once you clear out the apps you don’t use, audit the privacy permissions of what’s left. If you have an iPhone, open Settings and tap the Privacy option. On Android, head to Settings > Apps, and then tap the gear icon and select App Permissions. Here, you can see which apps have access to your location, contacts, microphone, and other data. Disable permissions where they don’t make sense—for example, Google Maps needs your location to function, but your notes app doesn’t. In the future, think about app permissions as you install new software; if an app is free, it’s possibly collecting and selling your data.

The same rules go for your computer. If you’re not sure what to delete from your Windows computer, Should I Remove It? can help you choose. (Yes, it’s more software, but you should delete it after you’re done using it.) Mac users don’t have an equivalent, but all software resides in the Applications folder, so it’s easy to sift through. If you find an app you don’t remember installing, search for it on Google, and then drag it to the trash to delete it if you don’t need it.

In Case of Emergency

Think ahead just in case you lose your phone or computer. 

Lock down your phone in case you lose it

Why: You need to ensure nobody can get into your phone if you lose it or someone steals it. Smartphones are encrypted by default, which is great, but you still need to take a few steps to ensure your phone is properly locked down if it disappears. 

How: You have two main defenses here. The first is to use a strong passcode alongside your biometric (fingerprint or face) login. The second is to set up your phone’s remote-tracking feature. If you haven’t taken the first step, set up a PIN number or pattern, and enable the biometric login on your phone. You can find these options on an iPhone under Settings > Face ID & Passcode or Touch ID & Passcode, and on an Android phone under Settings > Security and location.

Next, set up your phone’s remote-tracking feature. If you lose your phone, you’ll be able to see where it is, and you can remotely delete everything on the phone if you can’t recover it. On an iPhone, head to Settings, tap your name, and then go to iCloud > Find My iPhone. On an Android phone, tap Settings > Security & location and enable Find My Device

Enable encryption on your laptop (it’s easier than it sounds)

Why: If you lose your laptop or someone steals it, the thief gets both a sweet new piece of hardware and access to your data. Even without your password, a thief can usually still copy files off the laptop if they know what they’re doing. If a stranger poked around your laptop, they might get a look at all your photos, say, or your tax returns, or maybe an unfinished bit of Game of Thrones fanfiction. 

How: When you encrypt the storage drive on your laptop, your password and a security key protect your data; without your password or the key, the data becomes nonsense. Although encryption might sound like something from a high-tech spy movie, it’s simple and free to enable with built-in software. Follow these directions on how to set up encryption on both Windows and Mac. 

Speaking of computer theft, if you store a lot of data on your computer, it’s worth the effort to back it up securely. For this purpose, Wirecutter likes the online backup service Backblaze, which encrypts all its data in a way that even the folks at Backblaze don’t have access to it. 

The Importance of Paranoia

Ultimately, security and privacy are linked, so you need to get in the habit of protecting both. It might seem like a time-consuming, overwhelming headache, but once you follow these steps, all that’s left is to cultivate your judgment and establish good online behaviors.

Be suspicious of links in emails and on social media. Make your accounts private and don’t share anything you wouldn’t mind getting out anyway. Keep your main email address and phone number relatively private. Use a burner email account you don’t care about for shopping and other online activities; that way, if an account is hacked, it’s not linked to an important personal account, like that of your bank. Likewise, avoid using your real name and number when you have to sign up for a service you don’t care about, such as discount cards at a grocery store (your area code plus Jenny’s number usually gets you whatever club-card discount a retailer offers). Don’t link together services, like Facebook and Spotify, or Twitter and Instagram, unless you gain a useful feature from doing so. Don’t buy Internet of Things devices unless you’re willing to give up a little privacy for whatever convenience they provide. 

Once you settle into a low-key, distrustful paranoia about new apps and services, you’re well on your way to avoiding many privacy-invading practices.

By Chala Dandessa

I am Lecturer, Researcher and Freelancer. I am the founder and Editor at ETHIOPIANS TODAY website. If you have any comment use caalaadd2@gmail.com as email contact. Additionally you can contact us through the contact page of www.ethiopianstoday.com.

Leave a Reply