Finding good advice for greater privacy and security on the Internet is a blessing if we consider the dangers to which we are exposed daily and, unfortunately, seeing how all kinds of organizations treat our data in an abusive way collecting them in ways we don’t even imagine.
Thus, everything we do is reflected in the network, leaving between these two aspects that we have mentioned: security and privacy.
To create a balance that makes our navigation adequate , we will give you the most effective tips in relation to these two points, so that you can access all types of sites and take actions on the internet in a fair way and that does not make you feel violated.
Index:
Tricks and tips to improve your security and privacy while browsing the internet
Let’s go, point by point, to see the best actions you can consider to improve your privacy and your network security.
Configure your privacy
The first advice we give you is general and is useful for any user. You should go to the browser settings menu you use (it is usually found at the top right). Here you will have a “Settings” menu .
This is immense and with it you can make a thorough configuration of a huge number of aspects, so that you choose, point by point, everything you want to share about your navigation as well as other aspects related to it. Take time because, although it is an extensive job, it compensates .
You will see that, then, some of the advice we give you will have already implemented them on your own, as they are a selection of the most interesting or important that you can do in this first more general point.
Configure the synchronization of your data
Syncing information on devices where you sign in with Google can sometimes get you out of trouble. However, this implies that you send all of that information to Google so that they can obviously send it back, which is a contradiction if you want to improve your privacy on the internet.
In that configuration menu we have already mentioned there is a section of «Synchronization». You just have to deactivate data that does not suit you to synchronize.
And cip them
Also, try to encrypt the data you do keep in sync:
- You can do it in the same menu from the previous step; just under “Synchronization” you will find “Encryption options” .
- Just dial “Encrypt synchronized data …” .
- Now enter a password (other than your Google account ).
- You will have to confirm and save the changes.
Configure the privacy of your profiles in social networks and forums
As you do with browsers, in your different accounts on social networks, forums and other places you have security and privacy settings ; you will have to go one by one considering all the options.
And limit what you upload
Be careful with what you upload or with the options to show what you do and where you are . Do not leave indicators of which are valid addresses where you can be found, where you will be on certain days, where you work, images with recognizable elements, etc.
Say “No” to Google support services
If you use Chrome you will have noticed that there are certain points, such as spell checking that “little paint” in a browser. These are known as support services, which are still another method of capturing information.
- What you have to do is enter the browser settings , top right.
- Then enter “Settings” .
- Then, in «Advanced Settings» .
- Here you have a “Privacy and security” tab with many services that, as you see, you will see that you do not need. Turn them off and voila. This sends a no trace request.
Access sites with HTTPs protocol or SSL certificates
These are the two most appropriate ways, at present, to know that a site is safe when working with the information you give.
- HTTPs is the secure version of the well-known HTTP protocol that we have all used when accessing hundreds and hundreds of websites. Ensures secure communication between user and server.
- SSL (Secure Sockets Layer) is a security protocol that allows sites to handle round-trip information without risk, combining encryption systems compatible with other sites with which they have to communicate to move such data.
Make good management of your cookies
They are the trail of what you do and can be seen from other sites . They usually have good encryption but it is important that you configure them every time you enter a site for the first time (you see a notice by law) and that you have deleted periodically, as some save usernames and passwords.
Another way to configure cookies will be from the browser options , entering its settings menu to go to « Settings » and scroll to the advanced configuration options , among which you will find “Cookies” , a menu with many configuration possibilities.
In addition, do not forget to give them a clean once in a while , just as it should also be done with the cache.
Disable browser add-ons
All browsers include certain plugins designed , in the first instance, to improve our browsing experience.
However, they are usually counterproductive, which is why among our tips for greater privacy and security on the Internet we have to tell you to spend some time reading how they impact your information and, if you consider it, that the disable .
To do this you will have to access the configuration settings of your browser and look for an option that looks like something similar to “Disable browser add-ons” . Keep in mind that these options vary between browsers.
You will find the different add-ons and you just have to choose which ones you keep and which ones you do not , having the option of sending the browser to ask if you want to use them.
Deactivate activity control
Google includes a control of activity activated by default that serves, as it is deduced from its name, to have control over what happened during your navigation with your session with Google account started.
You can, however, disable it easily. Do you want to do it? Follow these simple steps:
Constantly check for updates
Although they may be a nuisance, the truth is that an important part of the updates available that are intended to improve security through patches and other modifications. This applies to everything: browsers, games, applications, operating system … Therefore, review all your software and keep it updated .
Much eye to certain downloads
Yes, the downloads are very attractive. However, when we try to download content without distribution permission we are exposed to receive all kinds of malwares . Given this we can advise you nothing more than not download anything that you know should not go down and opt for legal options, there are many.
On the other hand, when we talk about apps, always go to an application store, author’s website or specialized websites and / or with permissions . Only in this way you make sure that what you download is of quality and that it has no surprise inside. You can download an APK, no problem, but decide very well where to do it.
Create secure passwords
Do not always use the same password for all your profiles, similar patterns to follow, much less information such as birth dates, names, etc. Ideally, use a password of at least 8 dots that includes upper and lower case letters, numbers and symbols ; Nothing you didn’t know anymore.
Log out
It doesn’t matter if you’re home or not, always log out of all the sites you access, whatever type they are . It is evident if you connect to other networks but be careful because in your network you are also in danger, for example, if you have a virus that makes a third party take control of your system.
You also have, on different platforms, to know which devices have your session started and log out of them as well as disable new access .
Treat sensitive information only in your network
Don’t even think about doing sensitive actions on other networks , especially if you don’t know their property and security. We know that sometimes it is impossible, for example, for those people who do not have internet at home and are forced to perform certain telematic procedures. If there is no other choice, try to find a trusted network and, of course, follow all these tips in your browsing session.
Detect if they are tracking your information
There are extensions that will let you know which pages are dedicated , in a primary or secondary way, to track information . This way, you can avoid getting into them easily.
Do not click the banners
Especially invasive on pages that offer dubious content for free (they have to live on something), but we also find them on any website now. On many occasions, these banners will take you to places where you really do not want to go, making use of a good advertising bait. You can block advertising from here.
And if it is the case of wanting something that is advertised, do a search of the site in question or the product you want to buy and access from search engines .
Use PayPal or other similar digital wallet
PayPal includes a very good data protection system , which is of special interest when the information we are entering is as valuable as our checking or credit card number.
Activate private session on public computers
Indispensable for anyone to snoop on what you have done or stopped doing, but more indispensable if whoever is going to look at knows what he does. Getting information of interest after a browsing experience is not exactly complicated and there is much that we may be leaving “in sight.”
Therefore, use the incognito mode (or the one that corresponds) when you connect to networks that you don’t know and / or when you do it from other computers that are not your own .
Pay attention to the security features of your device
If you have them, it’s for something. When the antivirus or firewall jump they do not do so to make an appearance . It is true that the latter sometimes skips us after some updates are made, but obviously we know the reason. However, if they do it suddenly or on websites or by downloaded executables … Bad business .
Double check for sensitive information
More and more sites offer the possibility of logging in or performing certain actions (for example payments or password changes) with a double verification that requires the introduction of your password and, In addition, the completion of another activity related to your associated phone , usually the introduction of a code you receive on it.
Find out if your information is being used on the internet
Google Alerts is a great service that alerts you when a data you have entered is used. In this way, you can put, for example, your full name, and see where it is currently being used and also know, by alert, the places where this information is indexed , that is, you will be informed when Your information appears on a new site.
Use anonymous search engines
To leave no trace you can opt for alternative browsers where anonymity prevails such as Tor Browser, DuckDuckGo and the corresponding anonymous messaging.