NowComment
2-Pane Combined
Comments:
Full Summaries Sorted

13 Tips to Protect Your Internet Privacy


0 General Document comments
0 Sentence and Paragraph comments
0 Image and Video comments


Written byFiona Marcus

New Thinking Partner Conversation New Conversation
Paragraph 1 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 1, Sentence 1 0
No sentence-level conversations. Start one.

Last updated on December 6, 2018

New Thinking Partner Conversation New Conversation
Paragraph 2 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 2, Sentence 1 0
No sentence-level conversations. Start one.

Views: 1396

New Thinking Partner Conversation New Conversation
Paragraph 3 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 3, Sentence 1 0
No sentence-level conversations. Start one.

Comments: 7

New Thinking Partner Conversation New Conversation
Paragraph 4 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 4, Sentence 1 0
No sentence-level conversations. Start one.

This is a guide to protecting your internet privacy. Learning how to do so is key when we all use the internet with increasing regularity. The internet touches so many parts of our lives these days that it is central to how we operate.

New Thinking Partner Conversation New Conversation
Paragraph 5 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 5, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 5, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 5, Sentence 3 0
No sentence-level conversations. Start one.

Sadly, there are many criminals out there that seek to exploit our online life by accessing our data for their own, illegal means. It can open us up to online fraud and attack, which can not only cause us financial distress it can affect other elements of our lives like credit ratings. This does not even take into account the added stress that an online attack can have on our lives.

New Thinking Partner Conversation New Conversation
Paragraph 6 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 6, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 6, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 6, Sentence 3 0
No sentence-level conversations. Start one.

By taking on board the following 13 tips, hopefully you will be preventing this from ever happening by protecting your internet privacy in a comprehensive and robust way. Employing all these methods is fundamental to staying safe online.

New Thinking Partner Conversation New Conversation
Paragraph 7 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 7, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 7, Sentence 2 0
No sentence-level conversations. Start one.

1. Use Antivirus software

New Thinking Partner Conversation New Conversation
Paragraph 8 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 8, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 8, Sentence 2 0
No sentence-level conversations. Start one.

Antivirus software is essential for any computer or phone – regardless of whether it is connected to the internet or not. They are an excellent way to help prevent against online fraud or damage on your device. Antivirus software essentially helps prevent against intrusion into a computer by an unwanted party. It does so by identifying a computer’s weak spots and adding strength to those access points.

New Thinking Partner Conversation New Conversation
Paragraph 9 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 9, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 9, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 9, Sentence 3 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 9, Sentence 4 0
No sentence-level conversations. Start one.

It’s important to use so that data stored on a computer or a device remains safe and unreadable to anyone other than for who it was intended.

New Thinking Partner Conversation New Conversation
Paragraph 10 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 10, Sentence 1 0
No sentence-level conversations. Start one.

2. Protect Against Identity Theft

New Thinking Partner Conversation New Conversation
Paragraph 11 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 11, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 11, Sentence 2 0
No sentence-level conversations. Start one.

Identity theft is one of the ways that online fraudsters make use of all the information gathered on a person. They use this information to pose as someone so that they can make use of all manner of elements from that person’s life. In the worst cases, identity theft can allow a hacker to access a person’s bank accounts and steal money straight out of the account without the person or bank realizing before it is too late.

New Thinking Partner Conversation New Conversation
Paragraph 12 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 12, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 12, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 12, Sentence 3 0
No sentence-level conversations. Start one.

Protecting against identity theft is a way of stopping this from ever happening. To do so, people should be wary of the information that they give out about themselves. Key data is information such as zip codes, first line of their address, mothers’ maiden names or bank account details. And this is just a few pieces of data that we all happily give away online when making purchases or otherwise.

New Thinking Partner Conversation New Conversation
Paragraph 13 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 13, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 13, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 13, Sentence 3 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 13, Sentence 4 0
No sentence-level conversations. Start one.

Being aware of how identity theft occurs is the first step towards protecting against it.

New Thinking Partner Conversation New Conversation
Paragraph 14 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 14, Sentence 1 0
No sentence-level conversations. Start one.

3. Optimize your passwords

New Thinking Partner Conversation New Conversation
Paragraph 15 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 15, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 15, Sentence 2 0
No sentence-level conversations. Start one.

When we all first started using the internet and computers, the majority of us were guilty of using the same password across the board. We used the same few letters for logging into our desktop at work and at home as well as all the online accounts we had.

New Thinking Partner Conversation New Conversation
Paragraph 16 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 16, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 16, Sentence 2 0
No sentence-level conversations. Start one.

Unfortunately, this is a sure fire way to have your accounts hacked and allow yourself to fall victim to online fraud. Hackers only need to spy you logging into one application one time, and they are able to access any accounts you have online.

New Thinking Partner Conversation New Conversation
Paragraph 17 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 17, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 17, Sentence 2 0
No sentence-level conversations. Start one.

The best way round this is to use different passwords for everything. Those passwords also need to be optimized so that they are impossible to guess. Stay clear of using birthdays, relative names, pet names and other easy to guess combinations.

New Thinking Partner Conversation New Conversation
Paragraph 18 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 18, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 18, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 18, Sentence 3 0
No sentence-level conversations. Start one.

Remembering them all does sound like a headache, but there are ways around this other than storing them on your computer, which in itself is unsafe. You can use password managers which will secure hundreds of unique passwords for you. A password manager can also generate random and secure passwords when needed. We highly recommend Dashlane as a password manager.

New Thinking Partner Conversation New Conversation
Paragraph 19 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 19, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 19, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 19, Sentence 3 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 19, Sentence 4 0
No sentence-level conversations. Start one.

4. Update your cookies

New Thinking Partner Conversation New Conversation
Paragraph 20 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 20, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 20, Sentence 2 0
No sentence-level conversations. Start one.

Cookies are how websites gather and store information about your browsing history. It means that websites are able to use that data to analyze your behavior online so they can better market products and services at you.

New Thinking Partner Conversation New Conversation
Paragraph 21 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 21, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 21, Sentence 2 0
No sentence-level conversations. Start one.

However, it also means that these websites can sell that analysis to a third party so that they also have the information on you. Given that we put so much of ourselves online these days, it’s good to try to keep some sort of handle on where data about us gets to.

New Thinking Partner Conversation New Conversation
Paragraph 22 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 22, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 22, Sentence 2 0
No sentence-level conversations. Start one.

While not all cookies are bad, it pays to slightly tweak your settings so that if a cookie is installed on your computer or device automatically, you are at least alerted. It’s a good way to know exactly who is reading your online activity.

New Thinking Partner Conversation New Conversation
Paragraph 23 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 23, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 23, Sentence 2 0
No sentence-level conversations. Start one.

5. Use a VPN to Make Browsing Anonymous

New Thinking Partner Conversation New Conversation
Paragraph 24 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 24, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 24, Sentence 2 0
No sentence-level conversations. Start one.

VPNs are perhaps one of the best ways to protect yourself online and have truly anonymous browsing sessions. They work by connecting users to the internet through another server. That connection is than encrypted by the VPN provider who has set up the Virtual Private Network for its subscriber. The encrypted connection is called a tunnel and they are incredibly difficult for hackers and spammers to infiltrate to obtain data on a person while they are online. Plus, as the data is encrypted, even if they do infiltrate the tunnel, they cannot read what is being sent over the internet anyway.

New Thinking Partner Conversation New Conversation
Paragraph 25 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 25, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 25, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 25, Sentence 3 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 25, Sentence 4 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 25, Sentence 5 0
No sentence-level conversations. Start one.

Plus, one of the benefits of a VPN is that the provider hides the user’s IP addressand gives them another one once they are connected to the server. This means that a VPN can stop sites from tracking your actual IP address and therefore your location and browsing habits.

New Thinking Partner Conversation New Conversation
Paragraph 26 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 26, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 26, Sentence 2 0
No sentence-level conversations. Start one.

Picking a VPN is tricky owing to the huge market of them that exists. However, you can read our list of top rated VPN services, though we highly recommend ExpressVPN above all others. They provide a consistent, reliable connection that is secure at all times. It makes browsing anonymously easy as well as possible.

New Thinking Partner Conversation New Conversation
Paragraph 27 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 27, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 27, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 27, Sentence 3 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 27, Sentence 4 0
No sentence-level conversations. Start one.

6. Turn off Your GPS

New Thinking Partner Conversation New Conversation
Paragraph 28 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 28, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 28, Sentence 2 0
No sentence-level conversations. Start one.

Turning your GPS off on your phone in its settings application is key to maintaining your privacy while online. By turning it off, it means that all your applications (of which there will be many) will not be able to read where you are. Some of these applications, especially if they are social media apps, will post this location online.

New Thinking Partner Conversation New Conversation
Paragraph 29 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 29, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 29, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 29, Sentence 3 0
No sentence-level conversations. Start one.

The reason that this is bad for your privacy is that it advertises when you are not home. This is a safety risk for so many reasons. Plus, it’s not always the nicest feeling to know that you can be tracked and traced wherever you go. Turning off your GPS is an easy way to stop geotagging and any danger of revealing your location.

New Thinking Partner Conversation New Conversation
Paragraph 30 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 30, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 30, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 30, Sentence 3 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 30, Sentence 4 0
No sentence-level conversations. Start one.

7. Deactivate the Auto Fill Option

New Thinking Partner Conversation New Conversation
Paragraph 31 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 31, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 31, Sentence 2 0
No sentence-level conversations. Start one.

This may sound like overkill, but turning off your autofill option is an easy way to start protecting yourself online.

New Thinking Partner Conversation New Conversation
Paragraph 32 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 32, Sentence 1 0
No sentence-level conversations. Start one.

Autofill works by recognizing familiar words and numbers when you complete forms online. Have you ever noticed how when you type in your home’s number, that an autofill option comes up with your street name too? This is dangerous for several reasons, but particularly because this information to enable autofill to work has to be stored somewhere online.

New Thinking Partner Conversation New Conversation
Paragraph 33 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 33, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 33, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 33, Sentence 3 0
No sentence-level conversations. Start one.

If it stored online, it is open to a data breach by online criminals and hackers. To stop this even being a possibility, simply turn your autofill option off. The feature may save you a few seconds here and there, but ultimately you can survive without it and it protects your identity online.

New Thinking Partner Conversation New Conversation
Paragraph 34 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 34, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 34, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 34, Sentence 3 0
No sentence-level conversations. Start one.

8. Using Private Browsing Modes

New Thinking Partner Conversation New Conversation
Paragraph 35 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 35, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 35, Sentence 2 0
No sentence-level conversations. Start one.

In answer to the increased need for online security and staying anonymous online, some browsers have a private browsing feature. These features help users protect themselves when using the internet. A good example is Google Chrome’s Incognito function. Many people will recognize it from the icon that looks like a hat and glasses. It certainly has its limitations, but if you don’t have a VPN it’s better than nothing.

New Thinking Partner Conversation New Conversation
Paragraph 36 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 36, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 36, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 36, Sentence 3 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 36, Sentence 4 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 36, Sentence 5 0
No sentence-level conversations. Start one.

Other anonymous browsers that are worthy of mentioning are TOR or search engines like DuckDuckGo. Neither of them allow cookies or pop ups, plus they use a secure and encrypted method for browsing. This means that neither of them track a user’s online activity which further addresses online privacy.

New Thinking Partner Conversation New Conversation
Paragraph 37 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 37, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 37, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 37, Sentence 3 0
No sentence-level conversations. Start one.

9. Only Use HTTPS Links

New Thinking Partner Conversation New Conversation
Paragraph 38 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 38, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 38, Sentence 2 0
No sentence-level conversations. Start one.

HTTPS is a form of tech jargon that very few people actually know the true meaning behind. There is actually very little need to know the technicalities behind it in any detail, other than you should always ensure that a website uses this as part of its address. If it simply says HTTP or any other derivation, it is not safe to use.

New Thinking Partner Conversation New Conversation
Paragraph 39 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 39, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 39, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 39, Sentence 3 0
No sentence-level conversations. Start one.

The reason that it is not safe is that a website that is not HTTPS can have malware installed on it by a cyber criminal or fraudster. This means that they can gain access to the communications between the user and the website. Hackers can then obtain sensitive data on website users.

New Thinking Partner Conversation New Conversation
Paragraph 40 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 40, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 40, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 40, Sentence 3 0
No sentence-level conversations. Start one.

HTTPS ensures that users cannot do this by preventing intruders tampering between a website and its users.

New Thinking Partner Conversation New Conversation
Paragraph 41 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 41, Sentence 1 0
No sentence-level conversations. Start one.

10. Make Sure All Your Social Media Accounts Are Private

New Thinking Partner Conversation New Conversation
Paragraph 42 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 42, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 42, Sentence 2 0
No sentence-level conversations. Start one.

This is fundamental to limiting the amount of sensitive data that is available about you that is online. Securing your social media accounts is essential as these days most are public by default. This means that it is far easier to gather information on you and build a bigger picture that opens you up to online fraud.

New Thinking Partner Conversation New Conversation
Paragraph 43 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 43, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 43, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 43, Sentence 3 0
No sentence-level conversations. Start one.

Facebook is a prime example as it is no longer an application where users are in full control of their internet privacy. Instead, it is a huge money making company that makes a profit from the data that its users post online or save to their profiles. It is possible to change your settings so that the company cannot sell your information, but users should also be aware about what other information they post.

New Thinking Partner Conversation New Conversation
Paragraph 44 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 44, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 44, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 44, Sentence 3 0
No sentence-level conversations. Start one.

For example, some users are guilty of inadvertently posting sensitive information such as phone numbers or email addresses. This is helpful data to so many marketing companies out there as well as online criminals. Or many, if not all, of us will post pictures of our vacation while actually on that vacation – thus revealing that our homes are empty. This is a massive security risk.

New Thinking Partner Conversation New Conversation
Paragraph 45 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 45, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 45, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 45, Sentence 3 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 45, Sentence 4 0
No sentence-level conversations. Start one.

By changing your settings to the utmost private ones available, you are helping protect your internet privacy no end. This needs to be done across all your social media accounts.

New Thinking Partner Conversation New Conversation
Paragraph 46 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 46, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 46, Sentence 2 0
No sentence-level conversations. Start one.

11. Remember to Log Out

New Thinking Partner Conversation New Conversation
Paragraph 47 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 47, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 47, Sentence 2 0
No sentence-level conversations. Start one.

It sounds so obvious, but so many of us simply don’t log out of our accounts when we sign in online. This means that our accounts stay open and running in the background. It opens us up to a security breach. This is because those accounts or websites you are logged into can then read everything else you are up to online.

New Thinking Partner Conversation New Conversation
Paragraph 48 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 48, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 48, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 48, Sentence 3 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 48, Sentence 4 0
No sentence-level conversations. Start one.

Importantly, closing the window of the account that you have logged into is not enough. A social media giant like the aforementioned Facebook can read everything you are up to, even if you have shut the application or window you were accessing Facebook through. Facebook then stores what you have got up to online which then becomes a precious commodity to third parties, Facebook itself, and online hackers. You have no control of what happens to that precious commodity either.

New Thinking Partner Conversation New Conversation
Paragraph 49 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 49, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 49, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 49, Sentence 3 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 49, Sentence 4 0
No sentence-level conversations. Start one.

To stay untrackable, simply log out each and every time you access an online account. Again, it may take a few moments to do so, but the time you have spent may save you a great deal of pain further down the line.

New Thinking Partner Conversation New Conversation
Paragraph 50 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 50, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 50, Sentence 2 0
No sentence-level conversations. Start one.

12. Beware of Spam Emails

New Thinking Partner Conversation New Conversation
Paragraph 51 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 51, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 51, Sentence 2 0
No sentence-level conversations. Start one.

Spam emails are an easy way to avoid being hacked online. By deleting them immediately the moment they get into our inboxes, we are protecting our internet privacy no end. Online users who open suspicious emails are ones that often fall victim to online fraud.

New Thinking Partner Conversation New Conversation
Paragraph 52 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 52, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 52, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 52, Sentence 3 0
No sentence-level conversations. Start one.

The problem is, fraudulent and spam emails are becoming harder and harder to spot. Essentially, when opening any email, we should be very cautious of clicking any links that are contained within them. It is by clicking those links that we open ourselves up to a malware attack on your device. This malware can then access your private information.

New Thinking Partner Conversation New Conversation
Paragraph 53 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 53, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 53, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 53, Sentence 3 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 53, Sentence 4 0
No sentence-level conversations. Start one.

13. Use Public Wifi and Hotspots With Caution

New Thinking Partner Conversation New Conversation
Paragraph 54 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 54, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 54, Sentence 2 0
No sentence-level conversations. Start one.

Public wifi seems like a good way to save our data allowance with our internet provider when out and about. But accessing the internet through a hotspot or public wifi on our handheld devices makes us extremely susceptible to online attack. This is particularly true if we use that public wifi to log on to any online accounts – social media or otherwise.

New Thinking Partner Conversation New Conversation
Paragraph 55 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 55, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 55, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 55, Sentence 3 0
No sentence-level conversations. Start one.

Public wifi has no means of encryption so that anyone who is using the same wifi as you, can read whatever data you are transmitting. This therefore means that accessing any financial data, bank accounts or financial applications is a total no no. It can be so tempting, but it is just not worth it due to the danger of exposing passwords and sensitive data to prying eyes.

New Thinking Partner Conversation New Conversation
Paragraph 56 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 56, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 56, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 56, Sentence 3 0
No sentence-level conversations. Start one.

However, if you need to use a public wifi to access your bank or any other extremely sensitive data, ensure you are using a VPN at the same time. A reputable VPN will make that public wifi a secure network for you so that your data is encrypted. As ever, we recommend using ExpressVPN above all other VPN providers.

New Thinking Partner Conversation New Conversation
Paragraph 57 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 57, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 57, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 57, Sentence 3 0
No sentence-level conversations. Start one.

Staying Safe and Private Online

New Thinking Partner Conversation New Conversation
Paragraph 58 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 58, Sentence 1 0
No sentence-level conversations. Start one.

Staying safe and maintaining privacy while on the internet is now as important as shutting and locking your front door. We are just as likely to be robbed online as we are with a physical burglary – if not more.

New Thinking Partner Conversation New Conversation
Paragraph 59 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 59, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 59, Sentence 2 0
No sentence-level conversations. Start one.

Employing all the above steps will help improve your protection while online so that it is close to impossible to hack into any accounts or connections to view a user’s sensitive data. One of the easiest and most secure ways to do so is with a VPN and through antivirus software. Adopting good habits while online is also fundamental to ensuring you are safe against online trouble.

New Thinking Partner Conversation New Conversation
Paragraph 60 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 60, Sentence 1 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 60, Sentence 2 0
No sentence-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 60, Sentence 3 0
No sentence-level conversations. Start one.

In doing so, users can be assured that their data and information will always stay safe while they are connected to the internet.

New Thinking Partner Conversation New Conversation
Paragraph 61 0
No paragraph-level conversations. Start one.
New Thinking Partner Conversation New Conversation
Paragraph 61, Sentence 1 0
No sentence-level conversations. Start one.

DMU Timestamp: November 09, 2018 23:10

General Document Comments 0
New Thinking Partner Conversation Start a new Document-level conversation

Image
0 comments, 0 areas
add area
add comment
change display
Video
add comment

Quickstart: Commenting and Sharing

How to Comment
  • Click icons on the left to see existing comments.
  • Desktop/Laptop: double-click any text, highlight a section of an image, or add a comment while a video is playing to start a new conversation.
    Tablet/Phone: single click then click on the "Start One" link (look right or below).
  • Click "Reply" on a comment to join the conversation.
How to Share Documents
  1. "Upload" a new document.
  2. "Invite" others to it.

Logging in, please wait... Blue_on_grey_spinner