Vulnerability in cybersecurity from web browsing cookies, search engines, followed ads to our used devices with Internet Service Provider (ISP) on monitoring- they all contain information, our information. Should we call privacy a luxury now? It seems to be!
However, we cannot prevent our information from slipping on the web. But are there ways to manage our information to lessen and minimize our vulnerability in cybersecurity?
Consider these ways of how personal information can be hijacked.
PERSONALLY IDENTIFIABLE INFORMATION
Also known as PII, any data provided is used to identify a certain individual. We all provide these as includes our full name, physical address, birth date, gender, marital status, passport number, email address, and even our bank account number.
This information can be hijacked either by data breaches or phishing campaigns. Enough to conduct identity theft, fake loans on your account, and access your other online accounts by correctly answering security questions. Thus increases your vulnerability in cybersecurity!
BROWSER COOKIES AND PLUGINS
Internet Service Provider or also known as ISP, tracks, and monitors every internet activity. When you visit a website, search something, and just surf, you are and can be tracked by cookies.
Web cookies are small pieces of data stored on your computer by your used web browser while doing your internet activity. These ‘small pieces of data’ are used to customize your internet experiences and can tailor which advertisements you will see. These are all marketing. But this information can also be intrusive and can slip into data breach!
Online shopping is convenient, especially in today’s health pandemic. But beware of how you conduct your transactions online! When processing your purchase, you ought to provide private credentials from card numbers to security codes and expiry dates.
Cybercriminals need this information to accomplish unauthorized transactions or can even sell these data in the Dark Web.
Free public WiFis are truly appealing. All the more to cyber attackers! You don’t need any verification, don’t you? And so are they! Any information you are sending using a Public WiFi network can be hacked and stolen. These include but are not limited to emails, account credentials, and even your financial information.
LEVEL UP YOUR PRIVACY!
USE A PRIVATE BROWSER- THE TOR PROJECT
We all love the use of Google Chrome, Safari, Microsoft Edge, Mozilla Firefox, and Opera. But have you heard of Tor Browser? The Tor Project claims “Browse Privately. Explore Freely.”
This browser isolates each website you visit thus not allowing third-party attackers and tailored ads from following you. Automatically clears your web cookies after your browsing. The same goes for your browsing history.
KNOW HTTP AND HTTPS
Secure your website visit with Hypertext Transfer Protocol Secure (HTTPS). This enables a layer of encryption for a user’s secure browsing. This is especially crucial when you do online purchases. Enhances your protection from the intrusive cyberattackers aiming your payment details and account credentials.
Look at your address bar and see if it is HTTPS enabled. You will see “https://.” or you can see a closed padlock sign.
USE PERSONAL MOBILE CONNECTION INSTEAD
Rather than opt for a public wifi connection, it’s far more secure to use your personal mobile’s 4G/LTE Connection. If you need to have your other devices connected, set up your own WiFi hotspot through your mobile device. You can set your own password for an added level of security. See your Wifi settings or your main scroller menu for this.
These simple and practical ways can modify and minimize your vulnerability in cybersecurity. Be less at risk!