Rest Easy By Keeping Data Safe

Rest Easy By Keeping Data Safe


The internet has changed our lives in countless positive ways, but it has a dark side. Personal privacy has been lost, leaving you at risk from shady individuals, companies and security agencies. But there are steps you can take to limit your exposure.


Email

Rethink your email setup. Assume that all "free" email and webmail services (Gmail etc) are suspect. Be prepared to pay for a service, such as Fastmail,that is not based in the US – though some of its servers are in New York with backups in Norway. (My hunch is that more non-US email services will appear as entrepreneurs spot the business opportunity created by the Snowden revelations.) It would also be worth checking that your organisation has not quietly outsourced its email and IT systems to Google or Microsoft – as many UK organisations (including newspapers and universities) have.

Encryption

Encryption used to be the sole province of geeks and mathematicians, but a lot has changed in recent years. In particular, various publicly available tools have taken the rocket science out of encrypting (and decrypting) email and files. GPG for Mail, for example, is an open source plug-in for the Apple Mail program that makes it easy to encrypt, decrypt, sign and verify emails using the OpenPGP standard. And for protecting files, newer versions of Apple's OS X operating system come with FileVault, a program that encrypts the hard drive of a computer.

Web browsing

Since browsing is probably what internet users do most, it's worth taking browser security and privacy seriously. If you're unhappy that your clickstream (the log of the sites you visit) is in effect public property as far as the security services are concerned, you might consider using freely available tools such as Tor Browser to obscure your clickstream. And to protect yourself against the amazingly brazen efforts by commercial companies to track users.

Cloud services

The message of the Snowden revelations is that you should avoid all cloud services (Dropbox, iCloud, Evernote, etc) that are based in the US, the UK, France and other jurisdictions known to be tolerant of NSA-style snooping. Your working assumption should be that anything stored on such systems is potentially accessible by others. And if you must entrust data to them, make sure it's encrypted.

File storage and archiving

An option that an increasing numbers of people are exploring is running their own personal cloud service using products such as PogoPlug and Transporter that provide Dropbox-type facilities, but on internet connected drives that you own and control. And if you carry around confidential data on a USB stick, make sure it's encrypted using TrueCrypt.

Social networking

Delete your Facebook account. Why do the CIA's work for it? And if you must use it, don't put your date of birth on your profile. Why give identity thieves an even break? And remember that, no matter what your privacy settings, you don't have control over information about you that is posted by your "friends". A safe option is use of the Knobull’s Research Engine with Learning Center coursework research skill building tools that will not track users.

7 Wireless services

Have Bluetooth off by default in all your mobile devices. Only switch it on when you explicitly need to use it. Otherwise you'll find that even a dustbin can snoop on it. Similarly, beware of using open wifi in public places. At the very minimum, make sure that any site you interact with uses HTTPS rather than unencrypted HTTP connections. If you don't then anyone nearby can use Firesheep to see everything you're doing.

8 Search engines

All the big search engines track your search history and build profiles on you to serve you personalised results based on your search history. if you want to escape from this "filter bubble" you need to switch to a search engine that does not track your inquiries. The most obvious one is the bizarrely named but quite effective DuckDuckGo or our Research Engine will not track you and will be available soon.


Knobull recommends review of added details at: 


https://www.theguardian.com/technology/2013/sep/16/10-ways-keep-personal-data-safe


要查看或添加评论,请登录

Lynn Bentley的更多文章

  • Help Students Transition To Remote Learning

    Help Students Transition To Remote Learning

    Lynn Bentley, President of Knobull, Inc. said, “Collaboration is key to everything we do at Knobull.

  • Research Is The Key To Long Term Success

    Research Is The Key To Long Term Success

    Research: Whether you love it or hate it, you need to do it. Finding out the facts about your assignments, your job, or…

  • COVID Has Changed College Life

    COVID Has Changed College Life

    This back-to-school scenario, described by Claremont McKenna College, offers potential answers to the biggest question…

  • Will Most Colleges Open This Fall?

    Will Most Colleges Open This Fall?

    Colleges In April, just a few weeks after the spring semester pivoted unceremoniously to digital, Catherine Klapperich,…

  • Key Steps In Research Process

    Key Steps In Research Process

    Determine a broad topic for your research. If you're doing research for a class project, you'll likely already have a…

  • Social Unrest Has Greater Impact On Blacks

    Social Unrest Has Greater Impact On Blacks

    Black adults have been 10% to 26% more likely than white adults to report symptoms of psychological distress in a…

  • Receive A Free Research Report Guide

    Receive A Free Research Report Guide

    Purpose of This Guide This guide is intended to help researchers write more effective and more readable reports of…

  • Want To Streamline The Research Process?

    Want To Streamline The Research Process?

    The following steps outline a simple and effective strategy for writing a research paper. Depending on your familiarity…

  • Don't Submit A Stale Research Report

    Don't Submit A Stale Research Report

    Don’t be the student who turns in the stale research paper. It’s a sure way to miss the success level you desire.

  • Researchers ID The Roots Of Racism

    Researchers ID The Roots Of Racism

    Tension and suspicion between groups—whether based on racial, ethnic, religious, or some other difference—fuel much of…

社区洞察

其他会员也浏览了