More

    How to increase the level of protection on the Internet?

    Today protection is the most important part of Internet usage. In the case of a computer shared between different members of a family, it may be wise for each person to create a personal user account protected by a password, so that they can log in from a session independent of those of other users. However, only a dedicated proxy can globally protect your device from cyber problems.

    This proxy server will protect your data by hiding your real IP address. This way you will never face geo-restrictions again, it makes gaming easier than ever! One of the most reliable proxy providers is PrivateProxy, they can help you to choose proxy according to you needs and financial situation.

    Some sites collect your data for reuse for commercial purposes. They draw up your profile and save your searches via cookies, to offer you targeted ads by email or via advertising banners in particular when you: 

    • make a reservation;
    • purchase online;
    • create a personal account;
    • leave a comment or fill out a form on a site.

    To be sure that the site you work with is legal, you must verify that it is registered with the CNIL (Commission nationale de l’informatique et des libertés). This information is indicated in the legal notices of the site.

    When purchasing online by credit card, you must also ensure that the e-commerce site is secure.

    Ways to be more secure online

    It should be noted that sites displaying https in the address bar are more secure than sites that operate according to the http protocol, more vulnerable to hacking.

    Thus, to be sure to browse in secure mode, on https sites where your personal data is encrypted, it is better to use proxy servers for your computer.

    When you browse, proxy is available on Firefox, Chrome, and Opera, automatically returning you to secure sites.

    Use a browser that preserves privacy

    Some browsers have made privacy a priority, in order to stand out from the giant Google, which is much more indiscreet.

    This is the case of Tor Browser, which does not integrate any spy devices and does not store data relating to user behaviour.

    Although they are still little known to the general public, these alternative browsers are increasingly seductive and have proven themselves in terms of ergonomics, relevance and also security.

    Encrypt your personal data

    Very useful for keeping your exchanges confidential, some free instant messaging software offers additional plugins that allow you to code content. Duch programmes also integrate a cryptographic protocol to keep your SMS and MMS private.

    To receive and send emails by securing your data by encryption and keeping your anonymity, there are also free solutions. These programs have developed powerful security options.

    Manage your passwords well

    Several open source password management software can be downloaded free of charge from the internet. Such services allow you to create a different password for each site or application requiring a personal entry code.

    No need to know them all. Only the key opening service’s password database must be memorised. Easy to use and compatible with all browsers, they generate complex passwords and store them securely, so that they are not intercepted by a keylogger.

    Adjust Facebook’s privacy settings

    By default, a facebook status is public and the photos you post are visible to everyone. It’s up to you to set up your account so that only your friends can see your photos and what you post on your wall.

    This configuration is done from the “Settings and privacy tools” window of the “Settings” menu. Just select “friends” instead of “public”. You can then check how your account appears in the eyes of a stranger who consults it by clicking on the “Who can see my content” tool in the “Privacy shortcuts” menu.

    You can create groups of friends to customise access to your account content. You can also control the publications made by other people in your journal, from the “Journal and identification” menu, by changing the options in the “Who can publish in your journal” and “Who can see what other people publish in your journal”.

    On the other hand, the social network offers multiple security options that are not activated by default and that allow you to control access to the facebook photos you post or tagged photos posted by a third party.

    In order not to see photos taken from his smartphone automatically published on Facebook, the “photo synchronisation” option must be disabled from the “Settings” menu of the application.

    Other details, facebook authorising the use of pseudonyms when creating an account, you may not mention your real name to guarantee your anonymity.

    Do not always accept the general conditions

    It should not be forgotten that when you check “I accept the terms and conditions” on a website without even reading them, you may give your consent for your data to be reused, for commercial purposes most of the time.

    This is how, for example, the photo of a person registered on a dating site can be displayed in an advertising banner on any online site.

    Since the Data Use Policy may vary from one site to another, it is important to scrutinise the conditions you are asked to accept in order to act with full knowledge of the facts.

    The Data Protection Act provides that every individual has the right to access and rectify digital data concerning him or her.

    This way you can use this right of scrutiny to know what a site has about you, because it is obliged to answer you. If it turns out that the data is false, you can have it changed or deleted.

    Under certain conditions, you can also delete personal information by asserting your “right to oppose”.

    In practice, it can be commercial data, a personal account, messages posted on a social network, a forum, photos or video in which you appear, disseminated without your knowledge.

    The request must be addressed to the site administrator (legal notices). In the event of non-response, a complaint is made to the CNIL.

    In addition, there is still a legal vacuum concerning the future of digital data of deceased persons and the CNIL recently opened the debate to bring the institutions to legislate on this subject.

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay tunes - Get the daily news in your inbox