Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Boosting Your Online Privacy: 10 Best Practices

    By
    Don Reisinger
    -
    August 5, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Boosting Your Online Privacy: 10 Best Practices

      Boosting Your Online Privacy: 10 Best Practices

      By Don Reisinger

      2Maximize Your Browser’s Privacy Settings

      Maximize Your Browser's Privacy Settings

      Your browser’s privacy settings might not be the panacea that will protect you from sneaky onlookers, but they are a good first step. Whether it’s Chrome or Firefox you’re using, you have the ability to modify privacy settings to limit when cookies are placed on your computer, how much information can be collected and more. There are loopholes, of course, but improving browser security is a good idea.

      3Check Out Tor, but Be Careful

      Check Out Tor, but Be Careful

      There’s little doubt that Tor is one of the best ways to maintain privacy when surfing the Web. Tor uses a peer-to-peer networking technique to make it more difficult—but not impossible—for authorities to track what users are doing on the Internet. While Tor can be a useful tool for those with only privacy needs, it has been targeted by law enforcement for those who want to use Tor for other, less-savory things.

      4Don’t Forget About Data Encryption

      Don't Forget About Data Encryption

      Data encryption is a huge concern for those who want to stay private. While the cloud has proved beneficial to people who use services such as Gmail and Dropbox, it’s important to note that without proper cloud data encryption, it’s hard to keep all of that information safe and secure. Don’t use anything in the cloud-based realm that isn’t protected by strong encryption.

      5Anti-malware Tools Always Come in Handy

      Anti-malware Tools Always Come in Handy

      Malware is still around and still allowing malicious hackers around the world to peer into a user’s computer and steal data. Realizing that, it’s a good idea for computer and mobile users to invest in anti-malware tools that will limit the chances of a hacker breaking in. Again, this isn’t a guaranteed technique for success, but it does improve privacy.

      6Two-Factor Authentication Improves Security

      Two-Factor Authentication Improves Security

      Two-factor authentication cannot be underestimated for its value to the average person. With two-factor authentication, users will know that in addition to inputting a password into an online field, they will be alerted to input credentials on another product, like a mobile device. That greatly enhances security and keeps data private from unscrupulous actors.

      7Encrypt Communications Wherever Possible

      Encrypt Communications Wherever Possible

      It’s always a good idea to use platforms that encrypt communications, like chat and email. Several chat services, such as Adium and Pidgin, use protocols that allow users to go off the record. Upon doing so, the communications are not recorded on either end and cannot be accessed a subsequent time. There are also several platforms that encrypt communication over email for those so inclined.

      8Bring On the VPN for Everyday Use

      Bring On the VPN for Everyday Use

      Virtual private networks are often used in the enterprise setting where employees are mobile and need to tunnel in privately to connect to a corporate network. However, VPNs can also be used for everyday use by masking traffic and ensuring that not even the ISP can determine where traffic is being routed. VPNs are not necessarily 100 percent anonymous, but they’re close. And that’s important.

      9Question the Cloud’s Value

      Question the Cloud's Value

      Cloud computing is a bonanza for those who want to access a particular user’s data. Whether it’s the government or malicious hackers, gaining access to cloud services to access data is viewed as a grand opportunity. Realizing that, it might be worth it for the most adamant privacy seekers to take data off the cloud and move it offline, where encryption is more user-controlled. Think about it.

      10Don’t Forget Your Social Network Privacy

      Don't Forget Your Social Network Privacy

      Social network privacy is practically an oxymoron, but it should still be a concern. Too often, people are willing to share too much information on social networks, and that data is easily gathered by unsavory individuals. Keeping social network privacy settings as locked down as possible and only sharing personal information with those you know is a best practice.

      11Stop Linking All of Those Accounts

      Stop Linking All of Those Accounts

      Internet and social media companies are link-happy, hoping that people will link up their Facebook, Google, Twitter and email accounts with their mobile devices. It’s a recipe for privacy disaster. Whether it’s a company or individual, limiting the amount of linking between accounts and the sharing of information automatically between them is always a good idea.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×