Giving up the ghost<\/a>\u201d, this post, the first of a two-part series, suggests options that could be implemented to improve your privacy online.<\/em><\/p>\nThe Internet is an amazing tool, which to varying extents has improved the quality of our lives. It is a medium that offers us alternatives and convenience, e.g. to carry out routine tasks, to be aware of developments, and to participate in different conversations that are occurring. However, in exchange for those benefits we can become exposed to some of the more sinister elements found on the Internet. Below are some tips to limit your vulnerability and to take some control of your security and privacy online.<\/p>\n
1.\u00a0 Do not reveal your personal information<\/strong>. Although this tip goes without saying, it is amazing the number of people who are guilty of not adhering to it. Information that you should not publicly disclose online include, your full birth date (dd\/mm\/yyyy), phone numbers, addresses and your mother\u2019s maiden name. Your full birth date and mother\u2019s maiden name in particular, are frequently used as security questions by many institutions, especially banks and credit card facilities.<\/p>\n2.\u00a0 Set strong passwords<\/strong>. On most sites, users must set passwords to protect their accounts. The minimum length of passwords is usually between 6 and 8 characters and at the very least can include a combination of numbers and upper and lower case letters. To increase the strength of your passwords, and as a starting point:<\/p>\n\n- make them longer than 8 characters<\/li>\n
- do not use dictionary words, your personal information and obvious sequences, such as parts of the alphabet or numbers<\/li>\n
- add complexity by incorporating and replacing letters in your starting word or phrase with upper and lowercase letters, numbers, as well as with special characters (such as punctuation and symbols) if allowed.<\/li>\n<\/ul>\n
3.\u00a0 Regularly review the security\/privacy options of websites<\/strong>. Occasionally websites may update their terms of service, privacy policies, and\/or their privacy or security options. Many of them might notify their users of those amendments, but then again they might not. For example, several Facebook users have observed that the company is inconsistent in how it applies new updates. If an update benefits Facebook, it tends to be done automatically, but if it benefits users, they usually have to opt in.<\/p>\nHowever, most websites do reserve the right to update those policies without notice. Further, since the information tends to be readily available on the site, it becomes incumbent on users to ensure that they are aware of the revisions that have been made and to adjust their preferences accordingly.<\/p>\n
4.\u00a0 Opt out of 3rd<\/sup> party information sharing<\/strong>. When registering to use a site, persons are regularly given to option to not allow the site to share their information with other entities. Sometimes, the site will refer to those entities as \u201ctrusted\u201d, \u201cselect\u201d, or \u201cpartners\u201d, but the crux of the matter is that you really do not know who these parties are, what information they will be given, and how that information will be used.<\/p>\n5.\u00a0 Be mindful when using public PCs or unsecured Wi-Fi connections<\/strong>. Public PCs and unsecured Wi-Fi connections are a hotbed of security threats, such as through hacking and spyware, and even through persons physically eavesdropping in your vicinity. Under no circumstances should you access sites that require you to send sensitive or personal information in those environments. In addition to the examples given in the first tip, do not access bank accounts or accounts that contain credit card information. Finally, when using public PCs, ensure you log out of any account that you have accessed before you leave.<\/p>\n6.\u00a0 Clear cache or history after browsing<\/strong>. A web browser\u2019s cache stores temporary Internet files on websites visited, on documents, images, other downloaded content, and even cookies. These files are initially referenced when loading web pages, which speeds up the download time. However, these same files leave a very clear path of all of your activities online. After browsing on public PCs, it is important to ensure that the cache is emptied before you depart.<\/p>\n__________<\/p>\n","protected":false},"excerpt":{"rendered":"
Following from an earlier discussion on the changing perception of privacy, \u201cGiving up the ghost\u201d, this post, the first of a two-part series, suggests options that could be implemented to improve your privacy online.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[27,13,6,33],"tags":[38,109,110,34,41,42,108],"class_list":["post-253","post","type-post","status-publish","format-standard","hentry","category-computing","category-content","category-internet","category-lists","tag-data-protection","tag-facebook","tag-linkedin","tag-lists-2","tag-privacy","tag-social-media","tag-twitter","et-doesnt-have-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-45","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=253"}],"version-history":[{"count":16,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/253\/revisions"}],"predecessor-version":[{"id":2592,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/253\/revisions\/2592"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}