Is any of our information truly private?
Last month, President Donald Trump signed a bill repealing Obama-era regulations that would have required internet services providers like Verizon (VZ) and Comcast (CMCSA) to get consent before collecting, using and selling users’ web-browsing data.
Also, WikiLeaks recently leaked documents revealing that the CIA has the ability to conduct surveillance through devices like smartphones and smart TVs. And of course, cybercriminals may hack into your computer or phone in order to try to steal your identity.
Taking steps to protect your privacy can help you take ownership of your information, says Steve Weisman, a Bentley University professor who has written several books on scams and identity theft.
“I don’t have a problem with opting in for certain information sharing. I even want to get certain kinds of targeted advertising. But I want to control, I want to be the one to make that decision,” he said.
Set tight privacy settings
“People just aren’t aware of how much personal information is being taken and regularly used in fashions that invade their privacy,” Weisman said. “It’s not as bad as you think, it’s actually quite worse.”
Sites most of us use regularly, like Facebook (FB), Google (GOOGL) and YouTube, already collect our data. “Every time you click ‘like’ on a Facebook page, Facebook is gathering that information and getting a profile on us that they’re able to sell. There’s nothing free on the free internet,” says Weisman. Take advantage of the privacy settings on these sites. The settings can sometimes be tricky to navigate, so set aside some time to go through them. Weisman advises making the security settings as strong as the site will let you.
Take advantage of the privacy settings on these sites. The settings can sometimes be tricky to navigate, so set aside some time to go through them. Weisman advises making the security settings as strong as the site will let you.
Use a secure browser
Internet service providers are able to potentially gather much more information than individual sites, which Weisman finds concerning. “Unless we’re using secure browsers, they’re going to be able to access a lot more information about everything we’re doing online,” he said. Secure browsers, like Tor, exist for users who want to remain anonymous. Tor prevents people from tracking your location or the sites you visit. “Tor gets a lot of flack because Tor has been used by criminals,” Weisman said. “But individuals seeking to use the Internet privately can also use Tor, and there are other secure browsers that maintain your privacy, and they’re not difficult to use.” One downside? Using a secure browser can slow down your internet connection.
Secure browsers, like Tor, exist for users who want to remain anonymous. Tor prevents people from tracking your location or the sites you visit. “Tor gets a lot of flack because Tor has been used by criminals,” Weisman said. “But individuals seeking to use the internet privately can also use Tor, and there are other secure browsers that maintain your privacy, and they’re not difficult to use.” One downside? Using a secure browser can slow down your internet connection.
One downside? Using a secure browser can slow down your internet connection.
Use a virtual private network
Virtual private networks create a secure, encrypted connection between your computer and a server operated by the VPN. Using VPNs can help protect against mass data collection and cyberattacks.
“It will maintain your privacy online, keep you from being hacked, and the websites you go to also will not be able to see where the connection is coming from,” Weisman said. Using a VPN is especially helpful when connected to public Wi-Fi networks, like in hotels and coffee shops. However, be aware that VPN speed and connectivity can be spottier than traditional connections. Also, VPNs can be pricey. While there are free VPNs, you tend to get what you pay for, and they may not be as secure as paid VPNs.
Be smart about your passwords
You should ideally have a unique password for each of your online accounts. This can sound daunting, so Weisman recommends starting out with a base password that has capital letters, lower-case letters and symbols, and changing the end of each password.
Another strategy is to use a password manager like Dashlane, LastPass or 1Password. Password managers generate strong passwords, sync them across your devices, and store them for you so you don’t have to remember each individual password. You only have to remember one master password to get into the applications.
Emmanuel Schalit, CEO of Dashlane, says his company has never had a major security breach, and that Dashlane has built an infrastructure that secures your information by ensuring your master password is not stored on any of their servers. “We at Dashlane don’t have access to it, it can’t be stolen from us, or we can’t be forced by a government to give it because we don’t have it. It’s only in your head,” he said.
To people who are reluctant to put all their eggs in one basket, Schalit has this analogy: “Would you rather your money in the form of bank notes [be] in 17 places in your house, or would you rather put it in the bank?” If you’re going to use a password manager, make sure to pick a complex master password and make sure to never share it with anyone or send it in an email.
Be careful with your security questions
Be sure not to pick security questions that can be easily researched. “When Sarah Palin’s email was hacked, her security question was, where did I meet my husband? And the answer was Wasilla High School. And the hacker just went to Wikipedia,” said Weisman. Better yet — just make it up. You don’t have to answer the question honestly — it just needs to be something you’ll remember.
“When you’re setting up your security question ‘what is your mother’s maiden name,’ say ‘my mother’s maiden name was fire truck,'” said Weisman.
Keep your devices secure
In light of the WikiLeaks revelation that the CIA has the ability to hack into smart TVs and smartphones, it’s important to be smart about security.
“The biggest thing is to keep yourself from not being the low hanging fruit,” Weisman said. These devices are not only vulnerable to the government, but to cybercriminals who want access to your devices in order to steal your identity, install ransomware, or extort money from you. Ransomware is a type of computer virus that blocks access to a computer, server or mobile device, and encrypts the data stored on that device. The victim is forced to pay to unlock the data. Last year, Hollywood Presbyterian Medical Center in Los Angeles paid around $17,000 to unlock its computer network after becoming infected with ransomware.
“It’s connected to the Internet, it’s vulnerable,” said Weisman. Install security software, and make sure that it’s updated as soon as new updates come out to protect your devices against the latest forms of malware. Also, make sure your router has the latest security updates and that you’ve changed the default password to a unique password. This is especially important as the internet of things concept grows and more people have devices like smart toys, security cameras and smart refrigerators connected to their routers.
Making the effort to check your routers, install new browsers, and set new passwords can be time consuming, but after you spend the time, it’s a “one and done,” Weisman said. “Once you’ve set these systems in place, they pretty much take care of themselves.”