Geeks2U Promise
We guarantee you'll love our fast, friendly service - or we'll refund your money.  
133,572 Happy Customers & Counting
Need tech support?
1300 769 448
Extended hours, 7 days a week
Home  /  geekspeak  /  How Much Of Your Privacy Do You Protect?

How Much Of Your Privacy Do You Protect?

Businessman holding a smartphone and showing concept of online b

How proactive are you when it comes to your privacy?

It’s an interesting question, because it very much depends on the context you’re asking about. You probably do draw your curtains, especially if you’re getting out of the shower, because we’re all rather trained to understand and respect the concept of privacy then.

What about online, though?

The online world that we all spend some time in every day, whether we like it or not, is one where we’re all still learning the rules of privacy online. If research undertaken by Trend Micro is any indication, we’re slow and rather stupid learners who make many of the same basic mistakes over and over again. Their research suggests that up to 41 per cent of Australians don’t use a password or passcode to protect mobile devices at all, while 61 per cent of us simply use browser based password security features to remember our lists of passwords.

So what’s so wrong with either position? On the mobile device privacy front, while it’s a very simple thing for you to swipe at your smartphone screen to unlock it, the same is true for anyone who finds or steals your smartphone. That’s not just a worry for your photos and such created content, but also the fact that many smartphone apps that tie into specific services offer to save password and login information; so there, for example, goes your Facebook login and all the identifying information that creates your online personality as well. Given many of us happily give Facebook our birth dates so that friends can wish us a happy birthday, that’s an easy route to answer the kinds of questions that banks tend to ask to verify your identity when you phone them up.

On the browser-saving-passwords front, there’s two primary issues. Firstly, a single bank of passwords in a browser is a very obvious and rather well understood vector for attack, because while you may use any of around half a dozen commonly used browsers, that’s only six or so attacks that a miscreant needs to hit you with in order to potentially harvest all your passwords. We’re also apparently still pretty sloppy when it comes to actual password creation, with Trend Micro’s research suggesting that on average we use around five passwords to secure 26 accounts. That’s an obvious problem, rather like having one key for five doors. Lose the key, or in this case the password, and many of the supposedly private aspects of our online life would be open for anyone to see.

So what should you do to protect your privacy online? Here’s five simple steps to take:

  1. Use unique passwords for every online service. That way, even if a password breach occurs beyond your control, your privacy won’t be compromised elsewhere.
  2. Use a password manager to store your passwords behind one single, strong password that you can remember. That way, you can have strong complex passwords for all your services, but you don’t have to remember as many
  3. Think before you click. Is that Facebook quiz harvesting your personal information in return for telling you which Star Trek character you are really worth it? Is Woolworths really giving you a $1,000 shopping voucher? (hint: NO). Most privacy invasion scams work on basic greed or fear of missing out.
  4. Consider the use of VPN services, especially while travelling, to keep your online sessions secure — this is especially true if you’re not using a computer, tablet or smartphone you own.
  5. Remember that once it’s online, it’s out of your control, whether it’s a “funny” picture or your date of birth. That could mean data that vanishes quickly, or information that spreads worldwide with no chance of recall.
FacebookTwitterGoogle+Share

Recent News

snapdragon

Ever since the computer market shifted from desktop PCs to laptops, there’s been a significant balancing act going on between the needs of computer users for processing power to run programs, and the needs of those same users for battery power to keep their laptops going. At a simplified level, the harder you push a… More 

Apple-Apple

For the longest time, the generally accepted knowledge was that Apple’s Mac computers didn’t get malware or viruses. Apple even went so far as to mock its PC opposition in the famous “Mac vs PC” ads for the issues they had around security and malware, to a fairly solid effect. While Apple’s Macs do still… More 

intel

Quite often these days when we hear about a major security flaw, it’s to do with the underlying software that we’re running on our PCs, whether it’s a dodgy browser exploit, some kind of flaw in productivity software or even “free” content sites that are awash with malware. It’s not quite so often that we… More 

kindle

I’ve recently spent some time checking out Amazon’s latest Kindle e-reader, the 2nd generation Kindle Oasis. It’s the “luxury” choice in Amazon’s e-reader lineup, with a luxury price to match and a few new features to try to lure in those who love reading above other pursuits. One of the key new features is the… More