Thursday, April 30, 2020

Encrypt Your Data Without Leaking To Third Parties



Let’s get straight to the point. There’s a dark world out there in the wilderness of Internet. Taking some basic precautions like encrypting your data will give you enough immunity to deal with the unknown. So here we dive.
  1. Switch to communication platforms that offer encryption.
Encryption is ciphering your messages so that only the intended receiver gets the message. This is pretty basic now and I am guessing most of you are already using it. For those who aren’t, choose mediums that offer strong encryption like WhatsApp messenger, iMessage and Signal for text messaging, and Facetime, Firefox Hello, Google Hangouts and Signal for video calling. In the weaker side of this spectrum lies emails, phone calls and SMSing.
  1. Update your software.
Software developers work hard at ensuring you receive the best features while operating your device. They are constantly at it. So, update your software (keep away the lazy) to ensure you have the latest features added to your software. This will make sure that you are extra protected.
  1. Look for the lock.
Verify that the websites you are on use encryption before you give away your personal info. The websites that use encryption will have a tiny lock icon next to the web address. Next time, look for the lock.
  1. Gain some insight on online tracking.
Every website that you use tracks your activities to ensure you receive more of what you are looking for. Most of the websites asks for permission to do this. But others don’t. A simple answer is to use an extension that will help you see who is watching you. Try Mozilla Lightbeam, an add on that gives graphical data on who is scanning you.
  1. Use 2FA whenever possible.
Two-factor authentication is a go-to move for all you virtually aware people. For instance, requiring an OTP whenever there is a log in to your account will give you added level of security. Get started with your Gmail!
  1. For the nth time, get your passwords complicated.
As humans, we are gifted at complicating things. So, why not use the skill in password making? Get creative and complex. Bring in letters, numbers, special characters and experiment with cases. Let it be a Tower of Babel for hackers.
  1. Dump unused accounts.
Internet is no place to treasure things. If you are not using something, the best thing to do is do away with it. Delete accounts that you created on a whimsy but then left it to whimsies. To scare you a little, all your data stored in your unused data could be sold if kept untouched. 

No comments:

Post a Comment

Ping Command

Using #pingcommand utility to find #ipaddress of a target #domain , Find the maximum network frame size and emulate the #tracert. #C...