More
Top 5 Ways to Keep Your Personal Information Private

Top 5 Ways to Keep Your Personal Information Private

04-02-2014 12:13:23

Since the Edward Snowden leaks internet privacy has become somewhat of a difficult subject to discuss. It has come to light that the NSA along with the other agencies (FBI, CIA etc.) have enabled access to our personal lives, which in return, has given us a big brother sense of insecurity. In order regain that sense of security we lost months ago I will briefly discuss 5 easy ways to keep your personal information private.

 

Email Encryption

 

First, I would use an email address from a private domain and avoid using any of the email giants (Google, Yahoo etc.) because they have allowed the NSA to access your metadata. Once you have your personalized email address, for example john@johnsmith.com , the second step is to encrypt all the correspondence that is sent to and from that address. The easiest way to do this is to purchase an E-mail SSL certificate and install it on your server. It is a little frustrating to encrypt a network but once it’s done you can freely exchange private information without having to worry about it being intercepted. For a list of email SSL certificates please visit https://sslguru.com/offer/filter/all/all/Email.

 

Secure, Encrypted Web Browsing

 

Besides the government or hackers having access to your email they also have the capabilities to view your internet browsing history and even limit the sites that you can see. Google offers “Incognito” mode but the most secure way to surf is by using an “Onion Router”. One of the most popular is Tor or “The Onion Router” which basically is a piece of software that leaves you virtually unidentified because it channels your session with multiple other computer networks each with its unique level of encryption (much like layers of a onion). Thus, if your session were ever to be intercepted it would be very difficult to trace the IP address. Tor also allows browsers to overcome certain government firewalls that may be imposed against unwanted websites.

 

Mobile

 

For all of you that are worried about big brother reading your text messages I would suggest using the application WhatsApp. All of the communication made between your phone and their servers are done so in an encrypted environment, furthermore they do not store your chat history on their servers “once delivered successfully to your phone, chat messages are removed from our system.” Keep in mind that if your phone or your friend’s phone is being used by someone else they may have access to your WhatsApp messages.

 

Online Shopping, Forms, or personal information

 

When entering personal data online always remember to make sure that you are using a secure (https:// protocol) connection. You can easily tell if the session is secure by simply looking at the URL. If the URL has https:// before the domain name then the session is encrypted, if the URL only displays http:// then the session is not secure. If the session is secure you can also usually see a padlock icon displayed in the browser, or a Green Bar symbolizing the highest level of SSL security.

 

Currency

 

Bitcoin has had a lot of publicity lately but in a nutshell it’s an internet cryptocurrency, which means “that it is both created and distributed through cryptographic means” using SHA256 cryptographic hashing. By doing this it allows all the currency owners to remain anonymous and at the same time is relatively fast, cheap and effective compared to services like Paypal and the traditional banks that have transaction fees. Getting involved in Bitcoin is as easy as “installing a client program, downloading the block chain, and setting up a digital wallet.” However because it is a relatively new currency and there have been a lot of fluctuations and I would recommend testing the water before jumping in.

 

Hopefully this is helpful information. As technology changes it is important to stay ahead of the curve in order to reduce risk. If you have any questions about internet security or need help encrypting your network please feel free to contact us….

 

 

Sources

http://www.notebookreview.com/feature/cryptography-apps-how-to-keep-your-personal-info-private/

https://support.google.com/chrome/answer/95464?hl=en

http://www.whatsapp.com/faq/general/21864047

 

 

 

 

 

Recent Posts

Comodo / Sectigo is changing its Root CAs
28-12-2018 11:23:52

Sectigo, formerly known as Comodo CA, is entering the next phase of its transition: it’s replacing Comodo CA roots with USERTrust roots on January 14, 2019. Why it happens and what it will mean to Sectigo customers?

Comodo / Sectigo is changing its Root CAs
Comodo is now Sectigo
09-11-2018 12:54:30

According to previous announcements, a year after the acquisition of Comodo Group by Francisco Partners, on November 1 Comodo CA announced that from now on it is changing its brand to Sectigo [pronounced. sec-tee-go]. The goal of rebranding is consistency in company communication and better dedication to what Comodo is doing now.

Comodo is now Sectigo
European Cyber Security Month 2018
27-09-2018 10:46:21

The European Union Agency for Network and Information Security (ENISA), which is the center of knowledge about cyber security in Europe, organizes as every year in October the European Cyber Security Month. The campaign is starting in a few days. What is its purpose and how can you participate in it?

European Cyber Security Month 2018
more posts

cyber_Folks S.A. – Cookie settings

Do you like good cookies? We too! Some cookies are required for the website to function properly. Also accept additional cookies related to service performance, social networking and marketing. Cookies are also used to personalize ads. Thanks to them, you will get the best experience of our website, which we are constantly improving. The consent granted voluntarily may be withdrawn or modified at any time. More information about the cookies used can be found in our privacy policy. If you prefer to specify your preferences precisely - see the types of cookies below.

Functional (always active)

These are cookies that are necessary for the website to function. The website will not function fully properly without accepting these types of cookies. Example: A cookie that saves your consent or objection is needed so that we know if we have your consent for certain actions on the website, they will also allow you to log in to the Customer Panel, place an order or contact us via chat.

Analytical and performance

They will make it possible to collect information on how to use the website. These files will allow us to count visits and traffic sources to our site, so we can measure and improve its performance, as well as find out which pages are the most and least popular, and understand how visitors navigate our site. They help us analyze website performance and collect synthetic information. Example: We can make heatmaps, so we know which content is readable and which is not, and this allows for better website design. Thanks to them, we can also see which blog entries were read more often and which less often, which allows us to develop more interesting content. The main tool we use is Google Analytics.

Social

It is social platform cookies that will enable you to be associated with your social media accounts. You can share content from our website there. Social network files (from third parties, such as Facebook) collect information to provide personalized advertising content. For example: Ads on your social media are better suited to you and you reduce the chance of seeing excess ads for already purchased services or products.

Marketing

These are files related to the operation of marketing automation systems and ad accountability. Thanks to them, we limit, for example, the number of views of a given advertisement. They also allow us to perform comparative tests, thanks to which we constantly improve the operation of our website. By testing multiple page layouts, it is easier to get one that provides the best readability for users. Communication also becomes more personalized. For example, we may give you an article on how to find a domain name when we see that you are looking for a domain and it is difficult for you to find a suitable name. We can also, for example, show you a hint about logging in, if we see several unsuccessful attempts in a row. Based on the information from these cookies and activity on other websites, your interest profile is built. We mainly use the Google and Facebook advertising network.