How to Keep Your Online Activity and Identity Private
Today, your continuously connected lives are leaving behind a trail of data from your electronic devices. From the apps on your smartphones, your browser history on your computer, to the data on your fitness tracking device- anything that is connected to the Internet is storing information.
What Information is Okay to Share Online?
While all this abundance of information sharing may seem alarming, there are good reasons for it. It’s very natural to hit the “accept” popup when your device asks for allowing Cookies, location services, or to access other features of your device to be used by certain Apps or programs. We often do this without thinking of the privacy ramifications. Companies actually need to track certain information in order for their products to work. Therefore, these technologies help facilitate GPS directions, localized search results to find a nearby restaurant, and help improve the targeting of ads.
Remember- you are in control of what information you share abut yourself online. Research privacy policies and block access to suspicious requests from Apps or programs. If you have social media accounts, be sure to check those privacy settings too.
Risks to Privacy with Connected Devices
The downside to this information sharing is that there are also ways in which your privacy can be compromised, illegally or unintentionally. Unfortunately, some companies do not think of security first and focus on the functionality of their product primarily. With the emerging Internet of Things, most of the new gadgets we bring into our homes now have the ability to connect to Wi-Fi. This means Internet connected devices such as streaming security cameras, light bulbs, thermostats and smart home products all have computers in them that store data. Most all of these technologies have security issues, such as default passwords left unchanged once installed, to unsecured routers protecting these devices. As a result, cybercriminals with nefarious intent can bypass the poor security included in these devices. The key to protecting your privacy is learning how to properly setup and secure all of your connected devices.
Data breaches aren’t going anywhere--what you need to know
It may seem like stories of massive data breaches are popping up in the news on a weekly basis these days. Unfortunately, this is not surprising.
Online Christmas shopping: Naughty or nice?
Norton released results of their Online Shopping Survey just in time for the holidays, when online retailers offer sales to lure shoppers into buying presents for themselves and others.
What is a no-log VPN?
VPNs with no logs protect your privacy by not keeping logs of where you go or what you do online.
Travel tips for staying safe on public Wi-Fi
Travel used to mean getting away from it all. Public Wi-Fi and mobile devices now keep us connected 24x7. But unsecured public Wi-Fi is risky. Learn how to stay safer on public Wi-Fi while traveling.
How a VPN can help hide your search history
Even in private browsing mode, your IP information is being collected. Learn how a VPN can help hide your IP address and search history.
VPN for Mac
Help protect your browsing activity while using your Mac computer with a VPN. Learn how a VPN provides privacy while you browse and helps keep your information safe when using public Wi-Fi.
VPN For Windows
Help keep your browsing activity private by using a VPN on your Windows PC. Learn what a VPN is and how it helps to keep your information safe and private, especially when using public Wi-Fi.
Secure browsing with a VPN for desktop computers
Protect your browsing data, personal information and privacy with a virtual private network (VPN) for your desktop computer. Learn how a VPN encrypts your browsing data and keeps your computer’s IP address private.
The risks of public Wi-Fi
Did you know there could be threats lurking in the background on public Wi-Fi while you balance your bank account and sip a latte at your favorite cafe?
What is a VPN? And why you should use a VPN on public Wi-Fi
Using public Wi-Fi could put your private information and anonymity at risk of eavesdropping. A VPN can help protect your privacy online.
Straight talk about cyberstalking
Technology opens our lives up in ways that weren't possible even less than a decade ago.
Tips for protecting your privacy online
With online spying in the news, you may be wondering who’s watching where you go online and what sites you visit. This is a legitimate concern.
What are cookies?
Mention “cookies,” and most people expect a treat to appear. When talking about computers, however, cookies aren’t what’s on the dessert menu. In fact, they’re not even physical objects.
Telltale signs an app is violating your privacy
Malware isn’t just for laptops and desktops. In fact, it can be a lot easier for malware to end up on your mobile phone or tablet than your computer.
What are some of the laws regarding internet and data security?
Numerous laws in the U.S. cover Internet, data security, and privacy in the United States, with the 1974 Privacy Act (link is external) arguably being the foundation for it all. The Privacy Act passed to establish control over the collection, maintenance, use, and dissemination of personal information by agencies in the executive branch of the U.S. government.
How to clean up your online digital footprint
Your “digital footprint” includes all traces of your online activity, from commenting on news pieces or social media to making online purchases. When you know the boundaries of your digital footprint, and take steps to control it, you can protect your identity and your reputation.
Protecting your privacy on social media networks
Social networking sites such as Facebook, Twitter, Instagram, and Snapchat have become societal cornerstones. People love sharing their personal news and views about what’s going on in their lives.
What personal information should you safeguard?
Some 10 million identity thefts happen in the United States every year. Taking extra steps to protect your personal information—and knowing what information you need to safeguard—is the best way to prevent identity theft from happening to you.
Software terms of service and privacy policies explained
If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as “grayware,” count on you allowing them access to your information.
Emerging Cyberthreats | Norton Internet Security Center
Malware threatens new technologies and devices every day. Stay educated on most up-to-date ways to protect yourself.