- Worldstart's Tech Tips And Computer Help - http://www.worldstart.com -
How to Compute In Privacy: Part 1
Posted By Darnell Jackson On November 12, 2013 @ 11:29 AM In Security Help | Comments Disabled
Well, there are two main camps really, those who shrugged it off as, “ah, no biggy”; and those who are now taking a long and hard look at how well their data is being protected.
Just in case you’re in the first group and are “just curious”, here are the 6 best ways to compute in privacy.
#1 – Password Privacy
The easiest way to get your data stolen is to use a weak password.
Most people are not aware that most “hackers” crack into systems using a technique called social engineering .
They don’t always crack into your account with sophisticated high powered computers; many times they just simply put two and two together and try a few different password combinations using information they have about you. This is why writing your password on a note under your keyboard is a bad idea.
Password Privacy Do’s:
Password Privacy Don’ts:
Also don’t forget to alternate the text capitalization as this adds further complexity to your password. You can capitalize the first letter only, or the last letter only, or only the first two letters, whatever it is just remember to keep it consistent and easy for you to remember.
#2 – Search privacy
Unfortunately Google, Yahoo, and Bing have all admitted to storing and sharing your data with “others”. This can put you in a predicament when you just want to keep your private communications private.
Here are the top 8 search engines that do not store information such as when you search and what you’re searching:
If you still want to use Google but you don’t want them to know what YOU search then you should try this:
This will help prevent “others” from seeing what you search for Google such as your ISP, that is whoever is providing you an internet connection. Also, if you’re not logged in to Google then they won’t have an account to link to your searches.
*Remember, this helps dramatically but it’s still not a 100% private.
Email privacy is now becoming increasingly more important as over and over again judges have held that emails are in fact PUBLIC information.
Although this may sound shocking it is the reality that we live in today. This effectively means that someone can obtain your email through nefarious means and then claim that is okay for them to have it because it’s public.
If you want your emails to be read only by the person that you send them to here are your options:
I’ll have more of these tips in part 2 of How to Compute in Privacy.
~ Darnell Jackson
Article printed from Worldstart's Tech Tips And Computer Help: http://www.worldstart.com
URL to article: http://www.worldstart.com/how-to-compute-in-privacy-part-1/
URLs in this post:
 social engineering: http://en.wikipedia.org/wiki/Social_engineering_(security)
 Read STRONGEST PASSWORD by Jack William: http://www.worldstart.com/strongest-password/
 Image: http://youronline.biz/wp-content/uploads/2013/11/GoogleIncognito.png
 Outlook email encryption: http://office.microsoft.com/en-us/outlook-help/encrypt-e-mail-messages-HP001230536.aspx
 McAfee SaaS Email Encryption: http://www.mcafee.com/us/products/saas-email-encryption.aspx