How to stay anonymous online-how to respond to a data breach.

Views expressed in this cybersecurity-intelligence update are those of the reporters and correspondents.

Content provided by “PCMag.com.”

Source:

https://mail.google.com/mail/u/0/#inbox/FMfcgzGlkFwLHCGCzqCsxVdlRQsHjbbh

Please click link or scroll down to read your selections.

Trouble viewing this email? View in a browser
PCMag SecurityWatch
How to Disappear From the Internet in 8 Easy Steps
As a cruelly labeled “geriatric millennial,” I’m part of a generation that grew up without the internet in our daily lives but took to it as soon as it was available. As a kid, I spent as much time playing outside as I spent on internet bulletin boards and GeoCities sites as a teenager. During my time online, I quickly learned that while the internet was framed as a haven of anonymity, the ads that seemed to follow me wherever I went told a different story.

Big companies such as Amazon, Facebook, Google, and Microsoft have made a lot of money over the years on the back of our browsing habits. Unfortunately, we’ve also given away plenty of personal data voluntarily, as well as against our will, through breaches and hacks. It’s frustrating. Should we all give up and let the powers-that-be keep track of our every online interaction?

Of course not. As PCMag’s Features Editor Eric Griffith writes, there are easy ways for everyone to minimize their online footprints and make themselves harder to track. For example, using a burner phone or an app that creates anonymous phone numbers to make calls and send texts can improve your privacy. Another way to make yourself harder to track and hack is by maintaining a firewall on your home network. In addition to these methods, you should also enable privacy browser extensions, surf in anonymous mode, turn on a VPN, send encrypted emails, avoid clicking on spam links, and lockdown (or eliminate) your social media.

All of these tips are pretty easy to follow, but they add an extra step or two to your online routine. The big companies mining your data hope you don’t have the time or the desire to complete these tasks to stay anonymous online. Show them your privacy is worth the trouble. Take the time today to lock down your online life.

Stay safe,

Kim Key
PCMag Security Analyst

TECH DEAL OF THE DAY
If you buy something from our links, we may get a commission from the sale. Learn more here.
Gateway 14.1″ 1080p Intel Core i3-1115G4 Slim Laptop w/ 128GB SSD, Fingerprint Scanner
 $279.00
GET DEAL

TODAY’S TOP NEWS
Coinbase Discloses That 6,000 Customers Got Hacked This Spring

Apple Pay, Visa Exploit Allows Unauthorized Payments From a Locked iPhone

Google Commits $1 Million to Secure Open-Source Program

FCC to Create Rules to Stop SIM-Swapping Attacks

Millennials Worry More About Facebook Breaches Than Bank Account Hacks

Don’t Let a Data Breach Get You Down: How to Protect Your Privacy Online
It’s Cybersecurity Awareness Month! Each October, the nonprofit National Cyber Security Alliance (NCSA) and the federal Cybersecurity and Infrastructure Security Agency (CISA) come together to raise awareness about the importance of cybersecurity in the United States. This year, each week in October has a designated theme. This week, the topic is Be Cyber Smart. The theme stresses the importance of maintaining stringent online privacy practices, such as using a password manager to store your unique, complex passwords. You should also use a VPN while browsing online.

Earlier this year, I spoke with Troy Hunt, the man behind a site named Have I Been Pwned. He posts evidence of data breaches every day on his website. In an excerpt from that interview, Hunt had some advice for anyone who finds their email address or other personal information posted due to a data breach.

Q: So, what kinds of activities should I look out for if my data shows up in a breach?
A: The first thing you want to do is make sure that if there’s a password involved, that password isn’t used anywhere else you would be looking at for people potentially logging into your other accounts. So as opposed to monitoring that, we’d much prefer people to use some good password habits in the first place. Now getting into the most sinister side of things, I’d be more worried about things like identity theft as someone [may have] enough information to take out a loan in my name or try and get a tax refund in my name.

Have you found your information in a data breach? What were your next steps for improving your online security? Let us know in the comments.


Protect Your Online Privacy With 11 Essential Apps

Keep Company Data Private With These VPNs for Businesses and Teams

Don’t Risk It All! Choose the Best Antivirus Protection

Safeguard All Your Devices: We Review McAfee AntiVirus Plus

Increase Your PC Protection With the Best Security Suites

TOP TECH DEALS
Want more deals like these delivered to your inbox?
GET OUR BEST DEALS TODAY
2021 Model Apple 10.2″ iPad 64GB Wi-Fi Tablet w/ A13 Bionic Chip, Touch ID
$329.00 $299.00
GET DEAL

Monster Boomerang Bluetooth 5.0 Neckband Speaker, use code: QB6EJL9U
$89.96 $44.98
GET DEAL

Price Drop Apple AirPods Pro Active Noise-Cancellation True Wireless Headphones
$249.00 $179.00
GET DEAL

Ninja AF100 4-Quart Air Fryer
$89.00 $69.00
GET DEAL

MSI Katana GF76 17.3″ 144Hz Intel Core i7 11800H Gaming Laptop w/ NVIDIA RTX 3050 Ti, 16GB RAM & 512GB SSD
 $1,021.00
GET DEAL

All product and deal information such as discount, price and availability are believed to be accurate as of the time of publication. Please verify these details with the merchant site and check the merchant’s terms and conditions before you buy. Publisher is not responsible for errors or omissions.
SHARE & FOLLOW US
      

For the latest cybersecurity news and information, please check the blog sidebar, links, and twitter posts.  Thanks for joining us today.

Russ Roberts

https://atomic-temporary-195915488.wpcomstaging.com