{"id":256,"date":"2011-03-04T07:19:10","date_gmt":"2011-03-04T12:19:10","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=256"},"modified":"2011-03-28T22:05:40","modified_gmt":"2011-03-29T03:05:40","slug":"12-steps-to-improve-your-privacy-online-%e2%80%93-part-2","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2011\/03\/12-steps-to-improve-your-privacy-online-%e2%80%93-part-2\/","title":{"rendered":"12 steps to improve your privacy online \u2013 Part 2"},"content":{"rendered":"

Following on an earlier discussion on the changing perception of privacy, \u201cGiving up the ghost<\/a><\/span>\u201d, this post, the final of our two-part series, suggests options that could be implemented to improve your privacy online.<\/em><\/p>\n

In Part 1 of 12 steps to improve your privacy online<\/a><\/span><\/em>, we identified six steps that could be implemented. Most of those options require continuous vigilance and awareness to ensure that they are properly implemented whenever computing devices are used. For example, users must be mindful to: avoid 3rd<\/sup> party sharing options, limit their activity on public PCs and unsecured Wi-fi connections; and clearing their browse history on public PCs. Now, we move on to the final six steps.<\/p>\n

7.\u00a0 Choose secure server capability<\/strong>. When confidential information is being transmitted to over the Internet, make sure that Secure Socket Layer (SSL) protocol is used.\u00a0 A SSL connection is indicated when web addresses start with \u201chttps:\u201d<\/em> instead of the usual \u201chttp:\u201d<\/em>.<\/p>\n

Many web browsers flag any inconsistencies in a site\u2019s security certificate. Users are then advised that the site cannot be trusted, but they are usually still given the option to complete the access. Use of SSL capability generally causes web pages to load more slowly. However, with increasing broadband speeds this consequence is becoming less of a hindrance, and when balanced against protecting your private details online, it should be considered a small price to pay.<\/p>\n

8.\u00a0 Encrypt your messages<\/strong>. Most of us depend on websites that we frequent to provide secure connections when we need to log in to accounts and to perform certain transactions. However, every now and again, and especially in our own private communication, it might be necessary to send sensitive information over the Internet. Standard email is not secure \u2013 the analogy is often made that it is a postcard, not a letter. To limit unauthorised access, a personal email certificate can be included in your emails.<\/p>\n

Certificates, some of which are available for free, can be obtained from a number of sources including Comodo<\/a>, Thawte<\/a> and\u00a0Verisign<\/a>. Typically, the encryption certificate provides the owner with a public and private key. The public key is given to anyone who will receive your messages, and is in turn used by them to encrypt messages that are being sent to you. Upon receipt of such messages, you would use your private key to open them.<\/p>\n

9.\u00a0 Use spyware detection\/antivirus software from reputable sources<\/strong>.\u00a0 Although many of us are conscientious about ensuring that our security software is kept up to date, the subscription price can seem a bit expensive, especially to us in the Caribbean. Consequently, we might be prepared to use freely available applications, but this option should be exercised with care. Some of the free software or sites that offer to perform free scans for malware and spyware download those threats onto your machine. If you must, choose instead free software from reputable sources.<\/p>\n

10.\u00a0 Select more stringent security settings in your web browser<\/strong>. The more popular web browsers allow users to select their desired level of Internet security. Security can be based on a scale of low, medium or high, or by grouping sites into zones, or by activating specific features.\u00a0 In most cases, a combination of options is provided. To the extent possible, but based on the sites that will be accessed, the highest security settings should be selected. Furthermore, if your browser allows, the following settings are advised:<\/p>\n