Source: DepositPhotos
Even if you've never fallen prey to cyber theft, it's possible that you're not happy with the amount of information online businesses and other entities have on you. Whether or not you consider it an invasion of privacy, it's worth knowing about and preparing for broadband privacy issues before they catch you off guard.
This article identifies issues you should be aware of and provides measures you can take to protect yourself online. It also reveals the habits that can place you at risk so that you can avoid them.
Broadband privacy (more generally, internet privacy or online privacy) refers to the privacy to which you're entitled when providing information about yourself on the Web.
The information you can provide encompasses personally-identifying information (PII) and non-personally-identifying information, whether you display or store it on a server while using the Internet.
The reason internet privacy laws exist is uncomplicated: without them, everything internet users do, say, buy, and express an interest in —in other words, all their data— would be subjected to scrutiny by third parties.
New Zealand's data privacy laws, as prescribed in its 2020 Privacy Act, ensure that citizens like you enjoy data privacy. They also detail the many broadband consumer rights you enjoy as a citizen of this country.
Related: Is fibre broadband safer than WiFi?
Source: DepositPhotos
Despite the laws and government authorities that exist to curb online privacy concerns, issues persist. The following are among the most common ones:
Governments around the world aren't above spying on their populace, citing national security concerns as their justification for doing so. What the above means for you is that you could be surveilled at any time. Even the best broadband providers will have to cooperate with the authorities by turning over private browsing data during an investigation.
Malicious hackers had a field day during the 2020 pandemic. They stole data and people's personal information from thousands of companies and organisations worldwide, turning around and holding them for ransom or using this sensitive information to impersonate the victims online.
Worryingly, such data breaches are expected to continue as the world gets increasingly connected. And with the availability of fibre broadband in New Zealand, more and more people who access the internet are vulnerable to such crimes.
Even if a company that has your data doesn't get compromised, you still need to be vigilant. Cybercriminals have a variety of tools and tricks at their disposal to steal your data, including phishing techniques, social engineering, and the more well-known malware and spyware.
Ever get the sense that an advertisement has followed you from one website to the next? Not to worry; you aren't crazy. Tracking is the most common and invasive way your data privacy can get breached. Many websites use targeted ads that follow you around and show you ads based on your browsing history.
It's a practice called re-targeting. Meanwhile, other sites store cookies that collect data related to your behaviour on the site and sell this information to the highest-bidding companies. These third parties then push advertisements to your inbox based on your online activity.
Whatever the case may be, it can be disconcerting to know that companies you have no affiliation with can reach you based on your search history.
Related: Broadband Speed Claims: Industry Guidance
A data privacy breach doesn't happen in a vacuum. More often than not, an internet user's browsing habits may expose them to such security risks. Here are the most common habits you'll need to be aware of and correct if you don't want your data to fall into the wrong hands.
While it may feel convenient to stay logged into a website, it's not a good idea from a cybersecurity standpoint. Doing so leaves your account and device vulnerable to hackers that are willing to exploit privacy and security loopholes. Similarly, it isn't wise to let a website remember your credentials, as they'll be ripe for the picking when a cybercriminal breaks in.
Very few people are keen on the idea of having to remember unique usernames and passwords across multiple social media platforms and websites. Therefore, for the sake of convenience, they resort to using the same login credentials.
If you fall into this category of internet user, you'll have to rethink this strategy. The reason is that if a hacker successfully breaks into one account, they can gain access to them all. After all, the lack of variation in credentials gives them the master key to your entire collection of accounts.
In the entirety of the time that you’ve had internet access, it's likely you’ve received an email or two from an unfamiliar sender. While not every email whose origins are unknown contains malware, it’s best to err on the side of caution.
Hackers employ a plethora of tricks that they use to get you to click on a suspicious link. Some criminals go as far as to clone an entire website’s branding, making it challenging to distinguish between a real and a fake message. If in doubt, contact the actual company about the email. Otherwise, clicking on a link may unleash a virus on your computer or install spyware.
You wouldn’t sign a contract without reading its terms first, would you? In the same way, it isn’t wise to click “I Agree” without reading a website's terms of service. How else are you to know whether what you've agreed to will result in an invasion of your online privacy?
It doesn’t help that many websites can bank on the fact that their visitors won’t take the time to read their terms of service. However, if you’re careful about doing so, you may find terms that grant them permission to sell your data to the highest bidder.
Given the breadth of ways your internet privacy can be breached, how do you protect yourself? We discuss 10 effective measures you can take to save yourself from a data breach.
Source: DepositPhotos
Two-factor authentication (also called multi-factor authentication) is an additional layer of security on top of a traditional password. The method is used everywhere, from social media accounts to other software. It may take the form of a code sent to your registered phone number or one or more security questions.
When you enable multi-factor authentication on your email or social media account, it can be the last line of defence in a situation where a hacker has your password. The idea is that even if the hacker enters the correct password, they’ll need to know the answer to your security question or have your phone on hand to receive the code that grants them access to your account.
The developers behind the software applications that power your everyday life are constantly updating them to make them perform optimally. Some of the updates they make address security vulnerabilities and are essential for keeping your account safe.
It’s important to keep abreast of software updates to ensure that you don’t miss out on the ones that offer improved data security. If you continue to use an older version of an application, it opens you up to the dangers perpetrated by individuals who spend most of their time on the dark web.
Another effective measure worth considering is the use of VPNs. A VPN offers better protection than your traditional internet connection. It’s a completely private network that scrambles (encrypts) your internet traffic and hides your identity and current location. The network’s obscuring capabilities make it difficult for outsiders to get hold of your personal data.
When you use one, you won’t be susceptible to man-in-the-middle operations and attacks, snoopers, tracking, and other issues you’d ordinarily face.
There's no getting around the fact that websites usually place tracking cookies on your browser when you visit. Fortunately, you can delete these cookies to stop them from collecting data on you.
While you can delete the cookies manually, it's more effective to configure your browser to do the task automatically. After the configuration, your browser will clear the cookies at the end of every browsing session (i.e., once you leave the website).
When browsing social media sites, websites, and other online properties, always look for the little padlock icon in the top left of your browser's search box. This icon signifies that the website is secured. In addition, make sure the website’s URL begins with HTTPS and not HTTP.
HTTP stands for Hypertext Transfer Protocol, which is the protocol that facilitates transfers from a server to a browser and vice versa. The “S” in HTTPS stands for secure, denoting that the transfers happen over a secured network. Make sure to heed this advice at all times, especially when you’re on an e-commerce website that collects financial credentials.
You're not entirely powerless to stop websites from tracking your activity across the web. Big Tech companies like Google, Apple, and Meta (Facebook and Instagram's parent company) give their users the ability to opt out of settings that track their behaviour.
You can adjust advertisement preferences, control whether your information gets shared, and so on. Investigate how to make adjustments to your preferences by checking the website or application settings section.
An effective way to keep prying eyes from seeing the files you share is to password-protect them. You can do this for PDFs and other document-based files.
Meanwhile, software applications like the ones in Google's suite let you share permissions for documents in your drive. This functionality provides a degree of control over who gets access to your files online.
Source: DepositPhotos
Anti-Virus software can protect your computer from invasions and malicious software. A good program can prevent trojan horses, spyware, viruses, and more from taking over your computer, accessing your files, and/or installing scripts that snoop on you. Investment in one to keep yourself safe.
Also, consider activating your computer’s firewall to hold back unwanted traffic. Every operating system has one, and the process is a one-click action that will keep your online activities risk-free.
Several communication platforms use end-to-end encryption technology to scramble messages during transfer. This technology lowers the chances of data being potentially intercepted before it reaches its intended recipient.
When communicating online, make sure you use applications with encryption capabilities baked into their design. Examples of communication applications worth considering include Telegram and Signal.
Cloud technology has made it easier than ever to store and backup data online. You probably send everything from Whatsapp conversations to family photos on your iPhone. While the technology offers convenience, it isn’t without issues. Wiley hackers can penetrate your internet connection and look at the data you’re sending into the cloud.
Therefore, when backing up your data to the cloud, consider using high-end encryption. Not only will it secure your Internet connection, but it'll also hide sensitive data from prying eyes.
There's no room for compromise when securing your privacy online. It's important to take stock of the online habits that may be putting you at risk and correct them at the earliest opportunity. Once you do that, consider implementing a handful or more of the 10 cyber safety measures discussed in the article.