Yellowstone Computing
(715)-669-6136
  • Home
  • Services
  • Support
  • Contact
  • Blog
  • About
  • Reviews
  • Repairs

Fresh Start, Part 4 – Securing Your Digital Privacy in 2021

4/17/2021

 
Picture
A guest post from our friends at Emsisoft.

3. Take Control of Your Mobile Devices
Why: Some apps play fast and loose with device permissions and may collect more data than they need to function correctly. Meanwhile, failing to secure your mobile device could result in an unauthorized user gaining access to your online accounts and personal data stored both locally on the device and in cloud-based services.

How: Hope for the best, plan for the worst. The following best practices can help you secure your mobile devices and prevent your personal data from falling into the wrong hands.
  • Only install reputable apps: Every app you install requires certain permissions to function. Some are reasonable, like a navigation app that requires access to your location; others less so, like a flashlight app that wants access to your contacts. Check app permissions in your phone’s settings, disable any permissions that seem excessive and consider uninstalling any apps that look overly intrusive.
  • Use remote erase: In the unfortunate event that your phone is lost or stolen, use remote erase to ensure that nobody will be able to access the data. Both iPhone and Android devices can be remotely erased provided certain functions are enabled. 
  • Enable device encryption: Enabling encryption ensures that your data can only be read when your device is unlocked, meaning that even if someone gains physical access to your device, they won’t be able to see what’s on it. Most modern Apple and Android devices have encryption enabled by default, while Windows 10 devices can be encrypted via Start > Settings > Update & Security > Device encryption.
4. Protect Your Digital Social Life
Why: One of the biggest threats to your online privacy is… you. The amount of personal information we willingly divulge on social media poses a serious privacy threat as it gives attackers an easy way to collect sensitive information that could be used to commit identity theft or fraud. A motivated attacker could potentially use the information you share online to open new accounts in your name, hack your accounts or send highly personalized phishing scams to your friends and work colleagues.

How: A combination of smart privacy settings and limiting what you share online can help protect your privacy on social media. Start with the following practices:
  • Change your social media settings: Every social media platform offers a range of privacy settings that enable you to configure who can see your posts, online activity and contact information. How you tweak these settings will vary depending on your needs, but as a bare minimum we recommend deselecting location tracking, restricting who can find you online and disabling targeted ads where possible.
  • Limit what you share: Protect your digital identity by limiting what you share online. Avoid filling out “About Me” fields in your social media profiles and avoid sharing personally identifiable information such as your full birthday, place of birth, address and phone number.
  • Encrypt your messages: Encryption keeps your communications secure and ensures that only you and the intended recipient can read your messages – even if they’re intercepted. Signal, an open-source secure message service is a good option. WhatsApp offers end-to-end encryption, but requires access to your contacts list if you wish to see your contact’s names. Apple’s iMessage also provides end-to-end encryption, but only for messages sent between iPhones. Facebook Messenger is not encrypted, although its “Secret Conversations” feature is (available on iOS and Android, but not on the regular web domain)
5. Set Up Guest Accounts
Why: As a hospitable host, you probably don’t think twice before giving out your Wi-Fi password to guests. What you may not realize is that connecting new users to your home network could pose a serious privacy and security risk. While your guests probably aren’t going to intentionally be snooping around your files, there’s a chance they could accidentally stumble upon your personal documents or inadvertently spread malware to your network.

How: Setting up guest accounts allows you to restrict access to your network and your devices. It’s free and easier than it sounds.
  • Set up a guest network: A guest network allows your visitors to connect to your Wi-Fi but prevents them from accessing the rest of your network and the devices connected to it. To create a guest network, open up your router settings and dig around in the Wi-Fi section for a setting called something like ‘Allow guest access’ or ‘Guest network’ and follow the setup instructions to completion.
  • Create a standard user account: Similarly, you can create a standard user account to allow your visitors to use your devices without giving them access to your private files or your system’s settings.
    ​
Everyone has the right to privacy. While intrusive data collection practices have made it more challenging to protect your digital identity, it’s still possible to maintain a good level of privacy online. Utilizing privacy-conscious tools, avoiding overly intrusive software and being mindful of how you communicate online can go a long way toward keeping your private life just that – private.
We know that some of these suggestions appear daunting but don’t worry, Yellowstone Computing is here to help! Give our experts a call at 715-669-6136 or stop by our office located at 219 N Washington St, Thorp today! 

Comments are closed.

    Yellowstone Computing

    To read about us, click here!

    Archives

    December 2021
    September 2021
    August 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    November 2016
    October 2016
    December 2015
    September 2015
    July 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014

    Categories

    All

    RSS Feed

Visit Us!

What Our Clients Are Saying

Joe is really in tune with what our business needs are... what a great guy with amazing skills... - Grassland Veterinary Service

Yellowstone Computing goes above and beyond for their customers! Joe is very knowledgeable and will go the extra mile to make sure his customers not only get what they asked for but also makes sure they are taken care of for many years to come! Between the great business services they provide and their involvement in the Thorp Chamber I'd highly recommend doing business with Yellowstone Computing! Whether you are an individual looking for computer or other technology help or a large employer who needs to either supplement your current IT support or completely outsource it Yellowstone Computing should be one of your first calls! - Justin Z.