Broadband Privacy Issues

Aug 08, 2023
Broadband
Eleonora
Fibre cables with padlock to guard against broadband privacy issues

Source: DepositPhotos

Even if you've never fallen prey to cyber theft, it's possible that you're not happy with the amount of information online businesses and other entities have on you. Whether or not you consider it an invasion of privacy, it's worth knowing about and preparing for broadband privacy issues before they catch you off guard. 

This article identifies issues you should be aware of and provides measures you can take to protect yourself online. It also reveals the habits that can place you at risk so that you can avoid them.

Broadband Privacy Explained

Broadband privacy (more generally, internet privacy or online privacy) refers to the privacy to which you're entitled when providing information about yourself on the Web. 

The information you can provide encompasses personally-identifying information (PII) and non-personally-identifying information, whether you display or store it on a server while using the Internet.

The reason internet privacy laws exist is uncomplicated: without them, everything internet users do, say, buy, and express an interest in —in other words, all their data— would be subjected to scrutiny by third parties.

New Zealand's data privacy laws, as prescribed in its 2020 Privacy Act, ensure that citizens like you enjoy data privacy. They also detail the many broadband consumer rights you enjoy as a citizen of this country.

Related: Is fibre broadband safer than WiFi?

The Commonest Online Privacy Issues

Person editing privacy settings on a laptop to prevent identity theft

Source: DepositPhotos

Despite the laws and government authorities that exist to curb online privacy concerns, issues persist. The following are among the most common ones:

Surveillance

Governments around the world aren't above spying on their populace, citing national security concerns as their justification for doing so. What the above means for you is that you could be surveilled at any time. Even the best broadband providers will have to cooperate with the authorities by turning over private browsing data during an investigation.

Data and Identity Theft

Malicious hackers had a field day during the 2020 pandemic. They stole data and people's personal information from thousands of companies and organisations worldwide, turning around and holding them for ransom or using this sensitive information to impersonate the victims online. 

Worryingly, such data breaches are expected to continue as the world gets increasingly connected. And with the availability of fibre broadband in New Zealand, more and more people who access the internet are vulnerable to such crimes. 

Even if a company that has your data doesn't get compromised, you still need to be vigilant. Cybercriminals have a variety of tools and tricks at their disposal to steal your data, including phishing techniques, social engineering, and the more well-known malware and spyware.

Tracking

Ever get the sense that an advertisement has followed you from one website to the next? Not to worry; you aren't crazy. Tracking is the most common and invasive way your data privacy can get breached. Many websites use targeted ads that follow you around and show you ads based on your browsing history. 

It's a practice called re-targeting. Meanwhile, other sites store cookies that collect data related to your behaviour on the site and sell this information to the highest-bidding companies. These third parties then push advertisements to your inbox based on your online activity. 

Whatever the case may be, it can be disconcerting to know that companies you have no affiliation with can reach you based on your search history. 

Related: Broadband Speed Claims: Industry Guidance

Online Activities and Habits That Could Impact Your Internet Privacy

A data privacy breach doesn't happen in a vacuum. More often than not, an internet user's browsing habits may expose them to such security risks. Here are the most common habits you'll need to be aware of and correct if you don't want your data to fall into the wrong hands.

Not Logging Out of Websites

While it may feel convenient to stay logged into a website, it's not a good idea from a cybersecurity standpoint. Doing so leaves your account and device vulnerable to hackers that are willing to exploit privacy and security loopholes. Similarly, it isn't wise to let a website remember your credentials, as they'll be ripe for the picking when a cybercriminal breaks in.

Using Similar Log-In Details Across Multiple Platforms

Very few people are keen on the idea of having to remember unique usernames and passwords across multiple social media platforms and websites. Therefore, for the sake of convenience, they resort to using the same login credentials. 

If you fall into this category of internet user, you'll have to rethink this strategy. The reason is that if a hacker successfully breaks into one account, they can gain access to them all. After all, the lack of variation in credentials gives them the master key to your entire collection of accounts.

Opening Files with Murky Origins

In the entirety of the time that you’ve had internet access, it's likely you’ve received an email or two from an unfamiliar sender. While not every email whose origins are unknown contains malware, it’s best to err on the side of caution. 

Hackers employ a plethora of tricks that they use to get you to click on a suspicious link. Some criminals go as far as to clone an entire website’s branding, making it challenging to distinguish between a real and a fake message. If in doubt, contact the actual company about the email. Otherwise, clicking on a link may unleash a virus on your computer or install spyware.

Agreeing to a Service’s Terms and Conditions Without Reading Them

You wouldn’t sign a contract without reading its terms first, would you? In the same way, it isn’t wise to click “I Agree” without reading a website's terms of service. How else are you to know whether what you've agreed to will result in an invasion of your online privacy? 

It doesn’t help that many websites can bank on the fact that their visitors won’t take the time to read their terms of service. However, if you’re careful about doing so, you may find terms that grant them permission to sell your data to the highest bidder. 

Protecting Your Online Privacy: 10 Measures You Can Take

Given the breadth of ways your internet privacy can be breached, how do you protect yourself? We discuss 10 effective measures you can take to save yourself from a data breach.

1. Use Two-Factor Authentication

Person using 2-Factor Authentication for online privacy on a banking system

Source: DepositPhotos

Two-factor authentication (also called multi-factor authentication) is an additional layer of security on top of a traditional password. The method is used everywhere, from social media accounts to other software. It may take the form of a code sent to your registered phone number or one or more security questions. 

When you enable multi-factor authentication on your email or social media account, it can be the last line of defence in a situation where a hacker has your password. The idea is that even if the hacker enters the correct password, they’ll need to know the answer to your security question or have your phone on hand to receive the code that grants them access to your account.

2. Update Your Software Regularly

The developers behind the software applications that power your everyday life are constantly updating them to make them perform optimally. Some of the updates they make address security vulnerabilities and are essential for keeping your account safe.

It’s important to keep abreast of software updates to ensure that you don’t miss out on the ones that offer improved data security. If you continue to use an older version of an application, it opens you up to the dangers perpetrated by individuals who spend most of their time on the dark web.

3. Use a Virtual Private Network (VPN)

Another effective measure worth considering is the use of VPNs. A VPN offers better protection than your traditional internet connection. It’s a completely private network that scrambles (encrypts) your internet traffic and hides your identity and current location. The network’s obscuring capabilities make it difficult for outsiders to get hold of your personal data.

When you use one, you won’t be susceptible to man-in-the-middle operations and attacks, snoopers, tracking, and other issues you’d ordinarily face.

4. Get Rid of Cookies On Browser Exit

There's no getting around the fact that websites usually place tracking cookies on your browser when you visit. Fortunately, you can delete these cookies to stop them from collecting data on you. 

While you can delete the cookies manually, it's more effective to configure your browser to do the task automatically. After the configuration, your browser will clear the cookies at the end of every browsing session (i.e., once you leave the website).

5. Don’t Browse Unsecured Sites

When browsing social media sites, websites, and other online properties, always look for the little padlock icon in the top left of your browser's search box. This icon signifies that the website is secured. In addition, make sure the website’s URL begins with HTTPS and not HTTP. 

HTTP stands for Hypertext Transfer Protocol, which is the protocol that facilitates transfers from a server to a browser and vice versa. The “S” in HTTPS stands for secure, denoting that the transfers happen over a secured network. Make sure to heed this advice at all times, especially when you’re on an e-commerce website that collects financial credentials.

6. Adjust Google, Facebook, and Social Media Privacy Settings

You're not entirely powerless to stop websites from tracking your activity across the web. Big Tech companies like Google, Apple, and Meta (Facebook and Instagram's parent company) give their users the ability to opt out of settings that track their behaviour. 

You can adjust advertisement preferences, control whether your information gets shared, and so on. Investigate how to make adjustments to your preferences by checking the website or application settings section.

7. Share Your Online Files in a Safe Manner

An effective way to keep prying eyes from seeing the files you share is to password-protect them. You can do this for PDFs and other document-based files.

Meanwhile, software applications like the ones in Google's suite let you share permissions for documents in your drive. This functionality provides a degree of control over who gets access to your files online.

8. Install Anti-Virus Software and Activate Your Firewall

Antivirus software displaying virus alert on a laptop

Source: DepositPhotos

Anti-Virus software can protect your computer from invasions and malicious software. A good program can prevent trojan horses, spyware, viruses, and more from taking over your computer, accessing your files, and/or installing scripts that snoop on you. Investment in one to keep yourself safe.

Also, consider activating your computer’s firewall to hold back unwanted traffic. Every operating system has one, and the process is a one-click action that will keep your online activities risk-free.

9. Secure Your Online Communications

Several communication platforms use end-to-end encryption technology to scramble messages during transfer. This technology lowers the chances of data being potentially intercepted before it reaches its intended recipient. 

When communicating online, make sure you use applications with encryption capabilities baked into their design. Examples of communication applications worth considering include Telegram and Signal.

10. Encrypt Your Cloud Backups

Cloud technology has made it easier than ever to store and backup data online. You probably send everything from Whatsapp conversations to family photos on your iPhone. While the technology offers convenience, it isn’t without issues. Wiley hackers can penetrate your internet connection and look at the data you’re sending into the cloud.

Therefore,  when backing up your data to the cloud, consider using high-end encryption. Not only will it secure your Internet connection, but it'll also hide sensitive data from prying eyes. 

Final Thoughts

There's no room for compromise when securing your privacy online. It's important to take stock of the online habits that may be putting you at risk and correct them at the earliest opportunity. Once you do that, consider implementing a handful or more of the 10 cyber safety measures discussed in the article.

+
Selena Hoani , 2024-10-16

Filomena had amazing customer service! She was very polite and respectful. She also was great at listening to my needs and offering solutions with options that had great savings. I would give her 10 stars if that was an option. If I decide to go ahead I would choose to go have her help me again. I have not had the best experience in the past with customer service reps so I would like to thank her for making this experience a good one. Kind Regards, Selena

Charlotte Britton , 2024-07-24

Very clear and concise information. Great price comparison for saving money on our monthly bills! Thanks Issac and Glimp! I can't wait to pass these savings on to my hard working family Adding onto my review as I think this is totally unacceptable to have people call you about switching companies and you agree to change and go through the process with Glimp and then get phone calls from supposed companies BEFORE you even get the email offer from supposed companies.

KMN Sharma , 2024-09-06

The customer service was very good. Very pleasant and friendly approach. Thanks again for your help. Saving of 280$ for the same quality and performance. Will use this agency to get another deal after 12 months.

Sandra Aikin , 2024-11-26

My discussion with Tyron Kumar went very well. He was very patient and polite with my lack of knowledge of GBs etc. On the basis of our conversation I felt confident enough to change to 2 degrees immediately. I didn't give five stars because the sound was poor. It seemed as if there was a constant noise in the background and Tyron's voice had a slight echo as well.