7 Simple Ways to Protect Your Privacy on the Internet


What do you do to protect your digital privacy on the internet? Do you use firewalls or other such software tools that make the internet slow and unusable?

Other methods include speciality Web browsers, encrypted email and chat; virtual private networks; and security-focused incognito operating systems. Or you’d need to stay off the internet altogether.

You can protect yourself in two ways: Lock down your devices and accounts so they don’t give away your data, and practice cautious behaviour online.

Here’s how, according to the experts at Wirecutter, a product recommendation site owned by The New York Times Company.

Secure Your Accounts

Why to Secure Your Accounts?

In the past decade, data breaches and password leaks have struck companies such as FacebookMarriottYahoo and countless others. If you have online accounts, hackers are likely to have leaked data from at least one of them.

Want to know which of your accounts have been compromised? Follow the link to get the answer.

How to Secure Your Accounts?

Managing Passwords

The first step is to use a good and complex password. By a complex password mean, a password having both capital and small alphabets, numerics, symbols, etc. For instance tipnol14kU@4c.

Now, remembering such passwords sometimes becomes really difficult, for this purpose different password managers like LastPass and 1Password are used. Both can generate passwords, monitor accounts for security breaches, suggest changing weak passwords, and sync your passwords between your computer and phone.

Password managers seem intimidating to set up, but once you’ve installed the one you just need to browse the internet as usual. As you log in to accounts, the password manager saves your passwords and suggests changing weak or duplicate passwords. Over the course of a couple of weeks, you end up with new passwords for most of your accounts. 

Take this time to also change the default passwords for any devices in your house — if your home router, smart light bulbs or security cameras are still using “password” or “1234” as the password, change them.

Two-Step Authentication

As the name suggests, two-step authentication requires two steps: entering your password and entering a number only you have access to. For example, step one is logging in to Facebook with your user name and password. In step two, Facebook sends a temporary code to you in a text message or, even better, through an app like Google Authenticator, and you enter that code to log in.

Everyone should also use two-step authentication whenever possible for their online accounts. Most banks and major social networks provide this option.

Update Your Software and Devices

Why Update Your Software and Devices?

Phone and computer operating systems, Web browsers, popular apps and even smart-home devices receive frequent updates with new features and security improvements. These security updates are typically far better than antivirus software at thwarting hackers.

How to Update Your Software and Devices?

All three major operating systems can update automatically, but you should take a moment to double-check that you have automatic updates enabled for your OS of choice: WindowsmacOS, or Chrome OS.

These updates include new versions of Microsoft’s Edge browser and Apple’s Safari. Most third-party Web browsers, including Google Chrome and Mozilla Firefox, also update automatically.

If you tend to leave your browser open all the time, remember to reboot it now and again to get those updates. Your phone also has automatic-update options. 

On Apple’s iPhone, enable automatic updates under Settings > General > Software Update. On Google’s Android operating system, security updates should happen automatically, but you can double-check by opening up Settings > System > Advanced > System Update.

For third-party software and apps, you may need to find and enable a check for updates option in the software’s settings.

Smart-home devices such as cameras, thermostats and light bulbs can receive updates to the app as well as to the hardware itself. Check the settings using the device’s app to make sure these updates happen automatically; if you don’t find an automatic-update option, you may have to manually reboot the device on occasion.

Protect Your Web Browsing

Why Protect Your Web Browsing?

Companies and websites track everything you do online. Every ad, social network button and website collects information about your location, browsing habits and more.

The data collected reveals more about you than you might expect. You might think yourself clever for never tweeting your medical problems or sharing all your religious beliefs on Facebook, for instance, but chances are good that the websites you visit regularly provide all the data advertisers need to pinpoint the type of person you are.

This is part of how targeted ads remain one of the internet’s most unsettling innovations.

How to Protect Your Web Browsing?

A browser extension like uBlock Origin blocks ads and the data they collect. The uBlock Origin extension also prevents malware from running in your browser and gives you an easy way to turn the ad blocking off when you want to support sites you know are secure. 

Combine uBlock with Privacy Badger, which blocks trackers, and ads won’t follow you around as much. 

To slow down stalker ads, even more, disable interest-based ads from AppleFacebookGoogle and Twitter

A lot of websites offer means to opt out of data collection, but you need to do so manually. Simple Opt Out has direct links to opt-out instructions for major sites like Netflix, Reddit and more.

Doing this won’t eliminate the problem completely, but it will significantly cut down on the amount of data collected.

You should also install the HTTPS Everywhere extension. HTTPS Everywhere automatically directs you to the secure version of a site when the site supports that, making it difficult for an attacker — especially if you’re on public Wi-Fi at a coffee shop, airport or hotel — to digitally eavesdrop on what you’re doing.

Some people may want to use a virtual private network (VPN), but it’s not necessary for everyone. If you frequently connect to public Wi-Fi, a VPN is useful because it adds a layer of security to your browsing when HTTPS isn’t available. It can also provide some privacy from your internet service provider and help minimize tracking based on your IP address. But all your internet activity still flows through the VPN provider’s servers, so in using a VPN you’re choosing to trust that company over your ISP not to store or sell your data. Make sure you understand the pros and cons first.

Why Not Install Sketchy Softwares?

Every weird app you install on your phone and every browser extension or piece of software you download from a sketchy website represents another potential privacy and security hole.

Countless mobile apps track your location everywhere you go and harvest your data without asking consent, even in children’s apps.

How to Avoid Sketchy Softwares?

On Smartphones

Stop downloading garbage software, and stick to downloading programs and browser extensions directly from their makers and from official app stores.

You don’t need half the apps on your phone, and getting rid of what you don’t need can make your phone feel faster.

Once you clear out the apps you don’t use, audit the privacy permissions of what’s left. If you have an iPhone, open Settings and tap the Privacy option. On Android, head to Settings > Apps, and then tap the gear icon and select App Permissions. Here, you can see which apps have access to your location, contacts, microphone, and other data. Disable permissions where they don’t make sense — for example, Google Maps needs your location to function, but your notes app doesn’t.

In the future, think about app permissions as you install new software; if an app is free, it’s possibly collecting and selling your data.

On Computer / Laptops (Windows & Mac)

The same rules go for your computer. If you’re not sure what to delete from your Windows computer, Should I Remove It? can help you choose. (Yes, it’s more software, but you should delete it after you’re done using it.)

Mac users don’t have an equivalent, but all software resides in the Applications folder, so it’s easy to sift through. If you find an app you don’t remember installing, search for it on Google, and then drag it to the trash to delete it if you don’t need it.

Why use Antivirus on Your Computer?

Viruses might not seem as common as they were a decade ago, but they still exist. Malicious software on your computer can wreak all kinds of havoc, from annoying pop-ups to covert bitcoin mining to scanning for personal information. If you’re at risk for clicking perilous links, or if you share a computer with multiple people in a household, it’s worthwhile to set up antivirus software, especially on Windows computers.

How to Use a Better Antivirus on Your Computer?

For Windows OS

If your computer runs Windows 10, you should use Microsoft’s built-in software, Windows Defender. Windows Defender offers plenty of security for most people, and it’s the main antivirus option that Wirecutter recommends; we reached that conclusion after speaking with several experts.

If you run an older version of Windows (even though we recommend updating to Windows 10) or you use a shared computer, a second layer of protection might be necessary. For this purpose, Malwarebytes Premium is your best bet. Malwarebytes is nonintrusive, it works well with Windows Defender, and it doesn’t push out dozens of annoying notifications like most antivirus utilities tend to do.

For Mac OS

Mac users are typically O.K. with the protections included in macOS, especially if you download software only from Apple’s App Store and stick to well-known browser extensions.

If you do want a second layer of security, Malwarebytes Premium is also available for Mac.

You should avoid antivirus applications on your phone altogether and stick to downloading trusted apps from official stores.

Why Lock Down Your Phone when You Lose it?

You need to ensure that nobody can get into your phone if you lose it or someone steals it. Smartphones are encrypted by default, which is great, but you still need to take a few steps to ensure that your phone is properly locked down if it disappears.

How to Lock Down Your Phone when You Lose it?

You have two main defences here. The first is to use a strong passcode alongside your biometric (fingerprint or face) login. The second is to set up your phone’s remote-tracking feature.

If you haven’t taken the first step, set up a PIN or pattern, and enable the biometric login on your phone. You can find these options on an iPhone under Settings > Face ID & Passcode or Touch ID & Passcode, and on an Android phone under Settings > Security and location.

Next, set up your phone’s remote-tracking feature. If you lose your phone, you’ll be able to see where it is, and you can remotely delete everything on the phone if you can’t recover it.

On an iPhone, head to Settings, tap your name and then go to iCloud > Find My iPhone. On an Android phone, tap Settings > Security & location and enable Find My Device.

Why Enable Encryption on Your Laptop?

If you lose your laptop or someone steals it, the thief gets both a sweet new piece of hardware and access to your data. Even without your password, thieves can usually still copy files off the laptop if they know what they’re doing.

If a stranger poked around your laptop, he might get a look at all your photos, say, or your tax returns, or maybe an unfinished bit of “Game of Thrones fanfiction.

How to Enable Encryption on Your Laptop?

When you encrypt the storage drive on your laptop, your password and a security key protect your data; without your password or the key, the data becomes nonsense. Although encryption might sound like something from a high-tech spy movie, it’s simple and free to enable with built-in software.

Follow these directions on how to set up encryption on both Windows and Mac.

Ultimately, security and privacy are linked, so you need to get in the habit of protecting both. It might seem like a time-consuming, overwhelming headache, but once you follow these steps, all that’s left is to cultivate your judgment and establish good online behaviours.

Other Important Security Tips

  • Be suspicious of links in emails and on social media.
  • Make your accounts private, and don’t share anything you don’t want madepublic. 
  • Keep your main email address and phone number relatively private.
  • Use a burner email account you don’t care about for shopping and other online activities; that way, if an account is hacked, it’s not linked to an important personal account, like that of your bank.
  • Likewise, avoid using your real name and number when you have to sign up for a service you don’t care about, such as discount cards at a grocery store.
  • Don’t link together services, like Facebook and Spotify, or Twitter and Instagram, unless you gain a really useful feature by doing so.
  • Don’t buy “internet of things” devices (like smart watches or speakers) unless you’re willing to give up a little privacy for whatever convenience they provide.

Via


Naeem Javid

Naeem Javid Muhammad Hassani is working as Deputy Conservator of Forests in Balochistan Forest & Wildlife Department (BFWD). He is the CEO of Tech Urdu (techurdu.net) Forestrypedia (forestrypedia.com), All Pak Notifications (allpaknotifications.com), Essayspedia, etc & their YouTube Channels). He is an Environmentalist, Blogger, YouTuber, Developer & Vlogger.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.