Your Privacy is a Precious Commodity, Guard It!
Privacy is no longer being considered an intrinsic right. It can be ‘rightfully’ compromised if found reasons to raise an eyebrow
Living in a password-protected digital age, we have passwords governing lives across the bandwidth where our footprints go.
From financial, to social, entertainment, personal, passwords protect our ‘accounts’ or guard our confidentiality. Really? How far are we from being fooled in the social & digital space?
Hacking, phishing, data stealing, frauds can happen to anyone, given that space and pace is fast becoming more vulnerable and right to privacy can be challenged on various grounds.
Here is least as a consumer of digital space, one can do and must know to protect your privacy.
As surveillance becomes a common factor in our daily lives, everything from web browsing to mobile devices and the Internet-connected devices in our homes have the potential to erode our privacy and personal security.
A recent survey showed an incredible increase in online shopping, especially during the ‘lockdown’ times. People not just purchased items of need but also shopped as retail therapy for better mental health. Frequent users of online shopping apps have their credit and debit card details including card numbers, expiry dates stored on their mobile handsets or computers for a ‘quick check out.’
It is recommended to use two-step authentication whenever possible for their online accounts. Most banks and major social networks provide this option. As the name suggests, two-step authentication requires two steps: entering your password and entering a number only you can access. Avoid saving card details on mobiles and indeed, give it a miss on lesser known websites and portals.
Create a Burner Email address
Since most transactions online require the consumer’s email address, it is advised to create a burner email account. Personal e-mail accounts are often the pathway that can provide a link to all our other valuable accounts, as well as a record of our communication with friends, families, and colleagues. A burner email forwards all incoming emails to your personal inbox. It saves your personal email id from reaching public domain through various digital transactions. It does not have an expiration date and works as a regular email address, except it cannot be traced back to you by the sender. Hence it guards privacy.
Avoid Public Wi-Fi Usage
There is no denying that public Wi-Fi hotspots are convenient, especially when many of us are working outside of the office. However, you may be placing your privacy and security at risk if you choose to use one while on the move without suitable precautions. Instead, use Hotspot from your phone and say No to public Wi-Fi. Avoid making financial transactions through your mobile Hotspot event though it is through your own Smartphone connection.
Cookies for personalised Experiences!
Companies and websites track everything you do online. Every ad, social network button, and the website collects information about your location, browsing habits, and more. The data collected reveals more about you than you might expect.
Search engines, including Google, Yahoo! and Bing, use algorithms based on your data to provide “personalised” experiences. However, browsing histories and search queries can be used to create crossover user-profiles detailing our accounts, clicks, interests, and more, and may become invasive over time.
Don’t get tempted and click on Ads
Many social media platforms track which advertisements you clicked on and how much time you have spent on a particular the site, looking at which product. Ignore the Shop Feature, which often occurs during your active time on Facebook.
Not keep your location on
Location tracking and history of places you visit compromises privacy. When not required, keep location tracking of your mobile handset off and also apps which ask ‘permission’ of the same must not be logged in when not needed.
App & Game ‘permissions’
Most websites, apps and games ask for Sign –in ‘permission’ through your Facebook or Google account. By doing so, you are giving them access to your data. Through your setting, these permissions can be revoked.