Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Ways to Keep Your Internet Browsing Private

b2ap3_thumbnail_anonymous_browsing_400.jpgIt turns out that the Internet isn’t as anonymous as it seems. This is a hard lesson learned by more than 37 million users of Ashley Madison, a website dedicated to cheating on one’s spouse. In July, the site was hacked by the hacker group, “The Impact Team,” and they’re currently threatening to expose the cheaters by going public with the database. In this particular case, Ashley Madison users should have known better--on two levels.

The first lesson here is to not be a cheater. When it comes to pulling stunts like this, it’s not a matter of if you’ll get caught, but when.

The next “level of duh” we see here is that these cheaters actually believed their activity on Ashley Madison to be anonymous. They bought into a lie, which is kind of ironic when you stop and think about it.

The truth about what you do on the Internet is that there are many different ways to have your activity traced back to you. And forget about the idea of a website that’s completely impregnable from hackers. The fact that, just last June, the United States federal government was hacked and the records of more than 4 million employees were compromised, should be enough to give you the virtual heebie-jeebies.

When it comes down to it, a skilled hacker who’s absolutely dedicated to finding out what you’ve been up to online will be able to. Especially if they’ve got a strong motive, like having their wedding vows trampled upon. And don’t even think about running for public office if your personal email account is connected to something along the lines of an online escort service. This kind of dirt will be uncovered so fast that you’ll think you’ve been hacked by Hoover.

All of this isn’t to say that you can’t take measures to make it more difficult for hackers to track your Internet activity. Also, we’re in no way implying that, just because you take efforts to cover your online tracks, it means that you’re up to no good. When browsing the Internet in today’s volatile world of online security, any actions you can take to make your sensitive information less visible and accessible is always a smart move, even if you’ve got nothing to hide.

Here are five common sense actions you can take to make your online activity more difficult to track.

Delete Your Browser History
Obviously, you’ll want to delete your browser history if you’ve visited sketchy websites. Although, it’s also a good idea to delete your browser history in general. After all, if a hacker were to take control of your PC, they would easily be able to know which of your online accounts they should hack next, just by viewing your browser history. Bonus tip: browsing in incognito mode for Chrome, opening a private browsing window in Firefox, and InPrivate browsing in Internet Explorer and Edge, are all ways to surf the net without your browsing data being stored locally. Just keep in mind that this doesn’t hide your browsing activity from your Internet Service Provider.

Scrap Your Real Name
Not using your real name online should be obvious, yet too many users don’t even try to come up with an alternative name when registering for online accounts. In an attempt to make users more accountable for what they post, websites like Facebook have done away with fake usernames and are instead requiring real names to be used. Still, wherever you're able to set up a fake name, be sure to do so.

Don’t Use Personal Photos
Most online accounts ask for you to upload an image for your profile. If you don’t want this account to be traced back to you, then don’t use a picture of yourself, or of any other images that are personal in nature, like your house, car, kids, etc.

Keep Your Credit Card Confidential
In addition to having to worry about a hacker stealing your credit card number for fraudulent purchases, hackers can use your transaction information to figure out what you’ve bought. This can come back to bite you if you’ve purchased something that you don’t want the world to know about. Using a cryptocurrency like Bitcoin is one anonymous way to shop online, and so too are using prepaid credit cards, which can’t be traced back to an account in your name.

Don’t Use Your Personal Email Account
Another obvious move is to not use your personal email account to register for websites that you don’t want traced back to you. Setting up a “burner” email account from a free online hosting service like Gmail or Yahoo! is easy to do and doesn’t require the use of your real name. As a bonus, by separating your email accounts like this, you’ll be safeguarding your real email account (with its valuable information) from hackers, in the event that your burner email account gets hacked.

The Internet isn’t the unregulated Wild West that it used to be. Today, there are prying eyes behind every page, which means that you need to know how to navigate the web in a way that keeps your private data safe. For more tips and tools on how to protect your identity from the worst of the web, give Evolve IT a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 29 March 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Software Business Computing User Tips Efficiency Workplace Tips Computer Google Hosted Solutions Microsoft Upgrade Windows 10 IT Support Mobile Devices Innovation Smartphone Hardware Network Security Ransomware Gmail Operating System Microsoft Office Office Backup Apps The Internet of Things Social Media Business Continuity Bandwidth Disaster Recovery Communication Hacking WiFi Facebook Quick Tips Wireless Technology Android Apple Firewall Content Filtering Cybercrime Best Practice Website Alert Networking Smartphones Data storage Data Windows Experience Employer-Employee Relationship History Two-factor Authentication Small Business Phishing App Money Mobile Device Management Network Mobile Computing Big Data communications Managed Service Provider Outlook Safety Unified Threat Management Hosted Solution IP Address Windows XP Virtualization IT Services Documents Artificial Intelligence Tech Support Compliance Government Monitors Drones Augmented Reality Keyboard Search Social User Printer Hard Drives Browser Displays Remote Computing Virtual Desktop Shortcut Wireless Securty DDoS Unified Communications Document Management Heating/Cooling Encryption Word End of Support Law Enforcement SaaS VoIP Proactive IT Business Management Writing Cortana Network Congestion Competition Save Money Music Presentation Entrepreneur Domains Laptop Cryptocurrency Hacker Retail IBM Google Docs Education Application Holiday Cleaning Black Market Customer Service YouTube Managed IT services Processors Office Tips LiFi Staffing Downtime BYOD Passwords Streaming Media Router Bluetooth Help Desk Micrsooft Office 365 Visible Light Communication Disaster Automation Business Growth Analytics Data Management Memory Saving Money intranet Robot Lithium-ion battery Advertising Recovery Sports Deep Learning Society Google Wallet Spam BDR Social Networking Information Technology Running Cable Windows 8 Public Speaking Internet of Things Vendor Management
QR-Code