Tags

, , , , , , , , , , , , ,

IdentifyingFilesNot too long ago, taking the phone off the hook was all it took to increase your privacy. And back then, there was no need to worry about hackers commandeering your old-school word processor.

Below are some tips, tricks, links and sites that can ensure that when it comes to security, you are surfing the net in solitude.

Opera

Some say a web browser is only as safe as you make it.  Opera has a ton of built-in and user-friendly features that make amping up the privacy quite simple. Although the number of users are limited (especially when compared to Chrome or Mozilla) those that use it rave about its trustworthiness.

Two-factor protection

Designed to reduce the risk of identity theft and phishing, two-factor protection is a security factor found within the largest email providers—Gmail, Yahoo and Outlook. The two factors include knowledge-based criteria (something known only by the user) and a possession factor (something only the user possesses).

Metadata

Metadata is information about data. A good way to visualize it is as a Microsoft Word document. The document’s metadata includes information such as the filename, author, size, and date of creation. Hackers can use metadata to steal personal information.

Identifying Files

Also know as “cookies,” these tracking files are what help to create the personalized ad content you find while surfing the Internet.  For those interested in strengthening their online privacy, you want to use a browser that has built-in tools that circumvent cookies. Cookies are great for advertising and marketing purposes, but they also create a digital footprint that cyber criminals crave.

PGP

Pretty Good Privacy or PGP is a computer program that provides cryptographic privacy and authentication by use of data encryption and decryption. The use of PGP provides another excellent layer of protection to enhance your online privacy.

•  SSL/TLS

SSL and TLS are two common security protocols that provide heightened security features.  When you’re purchasing an item online, you want to make sure that “Https” and the lock icon are present. If they aren’t, then do not proceed with the transaction. Other protocols include: SMTP, POP3 and IMAP. These do not protect your metadata from snoops and spies.

WPA

Most WiFi browser settings feature either WPA or WEP.  WPA, which is an acronym for Wi-Fi Protected Access is considered by most the superior security tool.  Essentially what WPA does—and to a lesser extent WEP—is encrypt data between the computer and access point, making it more difficult for hackers to lift this information.

DuckDuckGo

Although it sounds like a grade school game, DuckDuckGo is a serach engine with its number one priority being a safe and private experience for its users.  Unlike Google or Yahoo, DuckDuckGo provides no personalized search results; and the search findings go for quality over quantity in provided links.

EzFIM Can Help

There are many tips to help ensure that you are perusing the internet in a secure manner.  One key platform that must be in place on your company’s network in order to keep hackers at bay is a solid File Integrity Management system, such as EzFIM’s award-winning and affordable product.

For more information on how EzFIM can help with security, contact one of our Tech Security experts today at: (855) 393-4666 or email them at info@ezfim.com.