Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Ways to Keep Your Internet Browsing Private

b2ap3_thumbnail_anonymous_browsing_400.jpgIt turns out that the Internet isn’t as anonymous as it seems. This is a hard lesson learned by more than 37 million users of Ashley Madison, a website dedicated to cheating on one’s spouse. In July, the site was hacked by the hacker group, “The Impact Team,” and they’re currently threatening to expose the cheaters by going public with the database. In this particular case, Ashley Madison users should have known better--on two levels.

The first lesson here is to not be a cheater. When it comes to pulling stunts like this, it’s not a matter of if you’ll get caught, but when.

The next “level of duh” we see here is that these cheaters actually believed their activity on Ashley Madison to be anonymous. They bought into a lie, which is kind of ironic when you stop and think about it.

The truth about what you do on the Internet is that there are many different ways to have your activity traced back to you. And forget about the idea of a website that’s completely impregnable from hackers. The fact that, just last June, the United States federal government was hacked and the records of more than 4 million employees were compromised, should be enough to give you the virtual heebie-jeebies.

When it comes down to it, a skilled hacker who’s absolutely dedicated to finding out what you’ve been up to online will be able to. Especially if they’ve got a strong motive, like having their wedding vows trampled upon. And don’t even think about running for public office if your personal email account is connected to something along the lines of an online escort service. This kind of dirt will be uncovered so fast that you’ll think you’ve been hacked by Hoover.

All of this isn’t to say that you can’t take measures to make it more difficult for hackers to track your Internet activity. Also, we’re in no way implying that, just because you take efforts to cover your online tracks, it means that you’re up to no good. When browsing the Internet in today’s volatile world of online security, any actions you can take to make your sensitive information less visible and accessible is always a smart move, even if you’ve got nothing to hide.

Here are five common sense actions you can take to make your online activity more difficult to track.

Delete Your Browser History
Obviously, you’ll want to delete your browser history if you’ve visited sketchy websites. Although, it’s also a good idea to delete your browser history in general. After all, if a hacker were to take control of your PC, they would easily be able to know which of your online accounts they should hack next, just by viewing your browser history. Bonus tip: browsing in incognito mode for Chrome, opening a private browsing window in Firefox, and InPrivate browsing in Internet Explorer and Edge, are all ways to surf the net without your browsing data being stored locally. Just keep in mind that this doesn’t hide your browsing activity from your Internet Service Provider.

Scrap Your Real Name
Not using your real name online should be obvious, yet too many users don’t even try to come up with an alternative name when registering for online accounts. In an attempt to make users more accountable for what they post, websites like Facebook have done away with fake usernames and are instead requiring real names to be used. Still, wherever you're able to set up a fake name, be sure to do so.

Don’t Use Personal Photos
Most online accounts ask for you to upload an image for your profile. If you don’t want this account to be traced back to you, then don’t use a picture of yourself, or of any other images that are personal in nature, like your house, car, kids, etc.

Keep Your Credit Card Confidential
In addition to having to worry about a hacker stealing your credit card number for fraudulent purchases, hackers can use your transaction information to figure out what you’ve bought. This can come back to bite you if you’ve purchased something that you don’t want the world to know about. Using a cryptocurrency like Bitcoin is one anonymous way to shop online, and so too are using prepaid credit cards, which can’t be traced back to an account in your name.

Don’t Use Your Personal Email Account
Another obvious move is to not use your personal email account to register for websites that you don’t want traced back to you. Setting up a “burner” email account from a free online hosting service like Gmail or Yahoo! is easy to do and doesn’t require the use of your real name. As a bonus, by separating your email accounts like this, you’ll be safeguarding your real email account (with its valuable information) from hackers, in the event that your burner email account gets hacked.

The Internet isn’t the unregulated Wild West that it used to be. Today, there are prying eyes behind every page, which means that you need to know how to navigate the web in a way that keeps your private data safe. For more tips and tools on how to protect your identity from the worst of the web, give Evolve IT a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Workplace Tips Google Computer Hosted Solutions Microsoft Upgrade Efficiency IT Support Mobile Devices Innovation Smartphone Windows 10 Network Security Ransomware Gmail Hardware Microsoft Office Office Backup Operating System Apps Business Continuity Disaster Recovery Communication The Internet of Things Social Media Hacking WiFi Bandwidth Facebook Outlook Firewall Content Filtering Wireless Technology Android Cybercrime Website Apple Best Practice Alert Employer-Employee Relationship Networking History Two-factor Authentication Data storage Data Windows Small Business Experience Phishing App Mobile Computing Big Data communications Safety Mobile Device Management Unified Threat Management Money Network Smartphones Quick Tips Managed Service Provider Running Cable Search User Information Technology Hard Drives Windows 8 Internet of Things Remote Computing Hosted Solution Shortcut Windows XP IT Services Managed IT services Documents DDoS Artificial Intelligence Heating/Cooling Tech Support Word Compliance Drones Bluetooth Social Printer Business Management Browser Automation Virtual Desktop Wireless Memory Competition Unified Communications Securty Presentation Document Management Entrepreneur Encryption Deep Learning VoIP BDR Domains Law Enforcement SaaS Hacker Proactive IT Cortana Vendor Management Network Congestion Application Save Money Customer Service Music Monitors Cryptocurrency Laptop Router IBM Displays Office 365 Google Docs Education Cleaning Holiday Analytics Black Market YouTube Saving Money Processors End of Support intranet Staffing Lithium-ion battery Office Tips LiFi BYOD Downtime Passwords Streaming Media Help Desk Writing Social Networking Disaster Micrsooft Visible Light Communication Public Speaking IP Address Business Growth Virtualization Data Management Recovery Robot Advertising Society Government Sports Augmented Reality Google Wallet Keyboard Spam Retail
QR-Code