7 Steps You Can Take to Protect Your Data and Privacy | Antivirus

Regardless of whether it is a small netbook or a modern high-performance computer - the value of the devices themselves is nothing compared to the data stored on them.

Devices can be purchased and operating systems reinstalled. However, the data we create, such as photos we have taken, our own stories, or other records, are irreplaceable.




Fortunately, privacy isn't advanced math. In this blog post, we'll show you seven simple steps how you can reduce the risk of data theft and protect your privacy online.

Step 1: Update Your Software.

·         

Many threats take advantage of security holes. To prevent this, software developers regularly publish updates to plug these vulnerabilities and make their applications more secure.

As a user, it is therefore important that you update your operating system, anti-virus software and other programs when prompted to do so. It is best to activate automatic updates as well if the option is available.

So, check whether your Windows up to date: Press Windows key + I. Then click Update & Security> Check for Updates.

To check if your macOS is up to date: Click the Apple icon in the top left of the screen. Select About This Mac and then Software Update ...

Step 2: Invest in Good Antivirus Software

·        

Hundreds of thousands of new versions of malware are released into the world every day.

While Windows Defender offers basic protection against these threats, investing in a proven antivirus solution is a good idea for more security and more reliable data protection.

There are several good candidates to choose from, but the options should be carefully considered. Depending on your requirements, your decision can depend on various factors, such as detection rates, user-friendliness, impact on system performance, price, customer service, or the approach to data protection followed by the provider.

If you are looking for a data protection-compliant antivirus solution that does not slow down your system, why not try the free 30-day trial version of Protegent360 Antivirus.

Step 3: Take Control of Your Passwords.

·         

A weak password is an easy target for cybercriminals. While it can take a while to make all of your passwords more secure, it is well worth the effort.

Have you used weak passwords in the past, or maybe even the same password for multiple accounts? Then you should definitely change them. If you are no longer sure which services you have registered for over the past few years, don't panic. There are a few ways you can track down the different accounts associated with your email address (s):
·         Inbox: Search the inbox of your email account (and any subfolders) for confirmation messages. Use search terms that appear frequently in subject lines such as "confirmation", "confirm", "welcome", "login" or "registration".
·         Browser: When filling out forms on the Internet, your browser may give you the option of saving this information so that you can access it again more easily later. This also applies to usernames and passwords, which in turn can help you find forgotten accounts. Check your browser settings to see which login data may be stored there.
o        Chrome: Settings> AutoFill> Passwords
o        Firefox: Access data and passwords (Depending on the version, you may have to go to Settings> Data protection & security> Access data & passwords> Saved access data ... )
o        Edge: Settings> Passwords & AutoFill> Manage Passwords
We do not recommend using automated tools like EmailExport or Desert, as these services require permission to read your inbox.
The use of the browser-internal password manager is also not recommended. While these can be useful for tracking down old accounts, they are easy to see using relatively simple methods. It is best to delete or deactivate them once you have found the information you are looking for.
Once you have found an online account, you will need to create a new password for it. Each password should be as follows:
·         Long: Passwords must be as long as possible. We recommend 16 characters or longer.
·         Unique: Each password must be unique and can only be used for one account at a time
·         Random: It is best to use a password generator to create random character combinations. Do not use any personal information such as names or dates.
Since nobody can remember hundreds of long, unique, and random passwords, why not make your digital life easier with a password manager. KeePass is a renowned, free, open-source password manager. If you prefer a more modern layout, DashlaneBitwarden or RoboForm would also be an alternative.

Step 4: Increase Data Protection in Your Browser.

·         

While it's next to impossible to remain completely anonymous online, there are several ways you can protect your privacy:

·         Install ad blocker: An ad blocker is usually a browser extension that filters out HTML elements with advertisements and suppresses communication with ad servers and tracking using tracking cookies. As a result, ad blockers not only make surfing more pleasant but can also protect you from malvertising and potentially unwanted programs. A recommended tool is uBlock Origin.
·         Install a data protection- compliant browser: From search history and login details to information on automatically filling out forms - your browser knows a hell of a lot about you. Therefore, you should use a program that respects your privacy. Good alternatives here are open source browsers such as Mozilla Firefox or lesser-known Chromium-based programs such as Iridium or Ungoogled Chromium.
·         Staying private on social networks: Once you start using social networks, you inevitably give up some of your privacy. But most platforms have different privacy settings that you can use to determine who can see your posts, activities, or contact information. Be careful what information you share, don't accept friend requests from strangers, and always think twice before clicking a link.
·         Use a privacy-friendly search engine: Google is certainly the best search engine at the moment. But this primacy has its price: your privacy. Google collects and stores a lot of your personal data, like your IP address, your location history, your web activity, what videos you watch, everything you have ever said about the Google Assistant, and much more. Fortunately, there are also some data protection- compliant alternatives, such as DuckDuckGo, Startpage, or Swiss cows. If you are curious how much information Google has collected about you, you can download a copy of this information from your Google Account: Data & Personalization> Manage data, services, and account> Download data.

Step 5: Use Multi-Factor Authentication.

·       

Multi-factor authentication (MFA) - sometimes also referred to as two-factor authentication (2FA) - is an authentication system in which, as the name suggests, you have to confirm your identity over several stages. Your bank may require you to create an individual one-time password every time you log in using a token. Or you may need to enter a verification code sent to your mobile phone to log into your email account.

Unfortunately, MFA is not an infallible solution as it is vulnerable to phishing and man-in-the-middle attacks. However, it does provide additional protection for your online accounts and can certainly block less sophisticated attacks. If a service supports MFA, the option can usually be activated via the security settings.

Step 6: Protect Your Cell Phone.

·        

Your smartphone is also a real treasure trove of personal data these days. So be sure to take the time to set it up as securely as possible. Here are a few tips to get you started:

·         Disable notification on the lock screen: Of course, it's convenient to be able to see notifications on the locked screen. At the same time, this means that anyone else who has access to your phone can also see your messages, e-mails, and other activities. With both iOS and Android you have the option to deactivate this option.
    o    Android: The option may be different depending on the model. To get started, try it out in Settings> Privacy> Lock Screen or Settings> Notifications> Lock Screen Notifications.
    o    iOS: Settings> Notifications> Show Previews
·         Set passwords: It goes without saying that you have set up a lock on your mobile phone. In doing so, a balance between safety and comfort has to be found again and again. In terms of data security, PINs and passwords are more secure than swipe patterns, which in turn are better than biometric methods.
·         Protecting certain apps with a password: For some apps that contain sensitive information, such as e-mail or chat programs, it may be advisable to protect them with a password
    o    Android: Android itself doesn't have an internal lock function for apps, but some manufacturers incorporate such options into their own tools, such as Secure Folder from Samsung. There are also third-party apps in the Play Store.
    o    iOS: Apple's operating system does not have its own option either. There are, however, some detours that produce a similar result.
·         Install antivirus app: Cybercriminals are increasingly targeting smartphones, which is why more and more malware for mobile devices is in circulation. Like on your computer, premium apps are usually the better solution here as they offer more reliable protection and don't annoy you with annoying advertisements.
·         Use disposable addresses: Don't want to use your private e-mail address for every online service you sign up for? You can use providers such as Guerilla Mail and 10 Minute Mail to set up temporary e-mail addresses to save your inbox from spam. If you also use online dating or like to buy/sell second-hand products, then you might be interested in apps like Burner or Hushed. This allows you to create temporary phone numbers for extra privacy.
·         Check app permissions: Check your apps once in a while to see whether they might collect more data than they actually need. For example, a crossword puzzle app does not need access to the camera or microphone.
    o    Android: Settings> Apps> Permissions (option can also be in another submenu such as "Privacy") and tap on the various entries to see which apps have which permissions.
    o    iOS: Settings> Privacy and tap on the different entries to see which apps have which permissions.

·         Disable location sharing: If this option is activated, both iPhones and Android devices can track your location and save where you go - even if you are not using any location-based apps. Some apps require location sharing to function properly. If you are one of those users who see this as an excessive invasion of privacy, you can turn off location sharing:
    o    Android: Settings> Privacy> Location Access . Tap an app to view and change location permissions. You can also manage and delete Google's location history through the settings of your Google account.
    o    iOS: Settings> Privacy> Location Services. Tap an app to view and change location permissions. You can also delete your location history (which Apple says is encrypted): Settings> Privacy> Location Services> System Services> Important Places. Then uncheck the option.

Step 7: Use HTTPS Everywhere.

·       

The HTTPS (Hypertext Transfer Protocol Secure) the protocol is used to securely exchange data between your browser and a website.

In contrast to the conventional but outdated HTTP, in which the data transmitted in plain text can easily be intercepted and read, HTTPS provides an encrypted connection between your browser and the SSL (Secure Socket Layer) or TLS (Transport Layer Security) protocol the webserver.

This verifies the connection between your browser and the web server and encrypts the transmitted data. As a result, data is more difficult to intercept, and any intercepted data cannot be read out or changed.

More and more websites have already switched to HTTPS. However, some pages switch to HTTP by default or link to unencrypted versions of the page, which is a threat to your security and privacy. The HTTPS Everywhere browser extension solves this problem by automatically enabling HTTPS encryption for all websites that support HTTPS. It can also be configured to block all connections not made over HTTPS.

HTTPS Everywhere is available for all major browsers.

Conclusion

Everyone has the right to privacy - including online. While many services, unfortunately, do not take their data protection guidelines very seriously, there are some precautions that you, the user, can take yourself to protect your data and privacy, and even free of charge.

Comments