online privacy – iDefend https://www.idefendhome.com Ultimate Protection for Your Digital Life Sat, 24 Aug 2024 20:11:00 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://www.idefendhome.com/wp-content/uploads/cropped-idefend-favicon-32x32.png online privacy – iDefend https://www.idefendhome.com 32 32 How to Secure Your Digital Life: The Online Privacy Playbook https://www.idefendhome.com/blog/onlineprivacy/theonlineprivacyplaybook/ Tue, 23 Jul 2024 21:49:28 +0000 https://www.idefendhome.com/?p=6262 Every interaction you have online is tracked and stored somewhere. Here is what you need to do to safeguard your privacy online.

The post How to Secure Your Digital Life: The Online Privacy Playbook first appeared on iDefend.

]]>
053
Every interaction you have online is tracked and stored somewhere. Here is what you need to do to safeguard your privacy online.

In this article

In today’s digital age, the internet is a central part of our lives. We use it for everything from social networking and shopping to banking and working. However, with this increased connectivity comes a significant risk to our privacy. Cybercriminals, corporations, and even governments can track and misuse our personal information. This is why protecting your privacy online is crucial.

Why Limiting Your Digital Footprint Matters

Every interaction you have online is tracked and stored somewhere. Unfortunately, not everyone who tracks your digital footprint wants to keep your personal information private or protected. Many big tech platforms have been known to take customer information and sell it to data brokers and even sometimes the dark web. 

Identity thieves aim to steal your personal information by hacking companies or by coming up with clever ways to trick you into revealing your social security number, date of birth, usernames, passwords, and other personal information. Cybercriminals can steal your money and hack your financial accounts by using this private information. Online predators and stalkers can use information they find online about you or through the dark web to harass and stalk you and your loved ones. 

A concerted effort to limit your digital footprint can go a long way in helping you remain out of the surveillance spotlight, keep your personal information private, and avoid online predators. So the question is, how can you limit your digital footprint and secure your online privacy?

7 Steps You Can Take to Secure Your Online Privacy

1 – Limit social media platforms data collection by following these tips:

    • Limit the personal info you enter into the platform.
    • Make your accounts private.
    • Turn on all privacy settings.
    • Disable personalized ads.
    • Limit app access and sharing.

2 – Use a private web browser: Consider using a more private web browser such as Brave or Firefox. These browsers provide much more privacy and data protection. They can be downloaded for free by searching for them on your current web browser.

3 – Leverage a virtual private network (VPN): When banking, shopping, web browsing, or using public Wi-Fi networks, use a VPN to secure your connection and data. There are many great VPN solutions available online. The iDefend service also includes a VPN.

4 – Remove your personal information online:
When your data is collected from various online places it is often sold to data brokers. These data brokers then sell your data to advertisers,  telemarketers, and other organizations that want to monetize you. Services such as iDefend can  help you remove your data legally from these data traffickers and people search websites.

5 – Limit your mobile device privacy settings in these areas: 

    • Personal info access
    • Location tracking
    • Active device listening
    • App access and tracking
    • Access to contacts
    • Personalized ads
    • Find my device
    • Health and fitness tracking

6 – Enable two-factor authentication (2FA): Two-Factor Authentication adds an extra layer of security by requiring a second form of verification in addition to your password when signing into online accounts. This is typically  a code sent to your phone, an email, or an authentication app. Enabling 2FA makes it much harder for cybercriminals to gain access to your accounts.

7 – Be cautious entering and sharing personal information online: Limit the amount of personal information you share online. Avoid posting sensitive details like your home address, phone number, or financial information. The more you put online the more your information will be collected and tracked.

Protecting your privacy online requires a proactive approach and a combination of strategies. By following the steps outlined in this guide, you can significantly reduce the risk of your personal information being compromised. Stay vigilant and take the necessary precautions to safeguard your digital life.

Don’t Wait to Secure Your Online Privacy.  iDefend Can Help

Not everyone has the time or expertise to do everything required to keep themselves and their family safe against growing digital risks.  iDefend makes it easier than ever to protect your family’s personal information from data traffickers, scammers, predators and unwanted surveillance. 

Learn more and get protected today with iDefend. Try it risk free and save 30%.

The post How to Secure Your Digital Life: The Online Privacy Playbook first appeared on iDefend.

]]>
Snapchat AI is Your Teen’s Private Chatbot – Free From Your Prying Eyes https://www.idefendhome.com/blog/familysafety/snapchatai/ Mon, 22 Apr 2024 20:39:02 +0000 https://www.idefendhome.com/?p=5618 Snapchat, known for its disappearing messages and creative filters, has evolved over the years to slowly incorporate advanced AI features.

The post Snapchat AI is Your Teen’s Private Chatbot – Free From Your Prying Eyes first appeared on iDefend.

]]>
pexels-shvets-production-7194009
Snapchat, known for its disappearing messages and creative filters, has evolved over the years to slowly incorporate advanced AI features.

In this article

In the digital landscape of today, social media platforms have become integral parts of our daily lives. While these innovations offer convenience and entertainment, they also raise significant concerns, especially when it comes to the safety and well-being of teenagers.

Among these concerns is the omnipresence of Snapchat’s AI, which can be accessed at any time, and the potential dangers it might pose.

Chatbot

One of the most striking aspects of Snapchat’s AI is its chatbot, an interactive feature that allows users to ask questions, seek advice, and engage in conversations. For teenagers, this seemingly harmless function can present a myriad of risks. The allure of a “digital friend” that is always available to chat might lead teens to seek guidance from the AI on sensitive or personal matters.

Whether it’s questions about relationships and sex, mental health, or even more troubling subjects like self-harm, the AI provides immediate answers without the nuance and empathy of a human response.

Teenagers are impressionable

The danger here lies in the misconception that this AI is a reliable source of information and support. Teenagers, who are still developing their critical thinking skills, might take the AI’s responses at face value without questioning its accuracy or understanding its limitations. This can lead to misinformation, misguided decisions, and a lack of human connection when they might need it most.

Privacy Concerns

Furthermore, the constant presence of the Snapchat AI raises privacy concerns. Every interaction with the chatbot is recorded and stored, contributing to the vast data pool that fuels Snapchat’s algorithms.

This data can be used to create targeted advertisements, personalize user experiences, and even predict behaviors. For teenagers, whose online behaviors are still evolving, this data collection can have long-lasting consequences.

You Can’t Remove It

Another alarming aspect is the inability to remove the AI from the app. Unlike traditional chatbots or apps where users can opt out or disable features, Snapchat’s AI is deeply integrated into the platform. The only way to remove it is by subscribing to Snapchat+, the premium version of the app.

This creates a dilemma for parents and teens alike. As a parent, if you don’t want your child to interact with the AI, there is no way to actually hide or get rid of it, giving your child unlimited access.

What to Do as a Parent

As parents navigate the complexities of raising teens in the digital age, understanding these dangers is crucial. Initiating conversations about online safety, critical thinking, and the limitations of AI can empower teens to make informed decisions. Encouraging them to seek human support when needed, whether from trusted adults or professional resources, can provide a balance to the allure of the always-available AI friend.

While Snapchat’s AI offers convenience and entertainment, its potential dangers should not be underestimated. From providing questionable advice to collecting vast amounts of personal data, the implications for teenagers are significant. As we move forward in this digital era, it is essential for parents, educators, and society as a whole to remain vigilant, informed, and proactive in safeguarding the well-being of our teens in the digital realm.

The post Snapchat AI is Your Teen’s Private Chatbot – Free From Your Prying Eyes first appeared on iDefend.

]]>
What To Do If Your Email Gets Hacked https://www.idefendhome.com/blog/onlineprivacy/emailgetshacked/ Mon, 05 Feb 2024 23:10:08 +0000 https://www.idefendhome.com/?p=5688 It can happen to anyone, but if you're lucky you can avoid it. Worried you've been hacked? Here's what you can do.

The post What To Do If Your Email Gets Hacked first appeared on iDefend.

]]>
pexels-tdcat-193003
It can happen to anyone, but if you're lucky you can avoid it. Worried you've been hacked? Here's what you can do.

In this article

Email has been around for a few decades now, and practically everyone has one, even if they use it infrequently. Chances are, if you’ve had your address for a few years, you’ve started to see scams, ads, and plenty more unwanted content showing up in your inbox.

You’ve probably also heard of emails getting hacked, and you may have even seen a few of these before—you get a message from your “friend” telling you they need a random amount of money, ASAP, and you’re their only hope. But what if you’re on the other end, and someone else on your contact list gets an email from “you” requesting a similar favor. What do you do then?

Email security

First off, let’s address some basic email security habits that everyone should have. If you haven’t been hacked and there’s something here you’re not doing, consider this your wake up call.

  1. Have a strong password. In today’s digital world, running about with weak and simple passwords is like leaving your car unlocked with your cash-stuffed wallet inside. If you want to anonymously test the strength of your passwords or need help coming up with stronger passwords, check out our guide to passwords.
  2. Consider two-factor authentications (2FA). Another step beyond having a password is setting up 2FA. This means you have to provide a special, one-time code in addition to your password in order to log into and access your email. It may not be right for every use case, but it’s generally a good idea. This can also be known as Multi-factor Authentication (MFA).
  3. Create “better” security questions. You’ve probably had to set up some security questions before: “What street did you grow up on?”, “What’s your mother’s maiden name?”. While these are a nice idea and their original intent was to help a user lock down their account—after all, who else would know these answers besides, well, you? The problem is that since the advent of social media, it’s often pretty easy for a hacker to either guess or do a couple minutes of research to find the answers to these secure questions. A “better” way to answer these questions is by choosing an answer that is meaningful to you but may not even have anything to do with the question itself. For example, answering “What’s your favorite drink?” with “Harry Potter”.
  4. Don’t open unexpected emails. The final tip is crucial to preventing not only your email from getting hacked, but infecting your computer or phone with viruses. Even if you have a rock-solid password, 2FA enabled, and an active virus shield, the moment you click on a strange email, follow the links inside, or try to open an attachment on it, none of that prior protection matters. The best thing you can do is to never even open these emails and instead delete or mark them as spam.

What happens when your email is hacked?

If your email hasn’t been compromised that you know of, but want to know some of the warning signs to watch for, or are simply curious and want to take a couple minutes to learn more about it, this next section is for you.

Typically, the main reason a scammer or hacker wants access to your email address is to use it to try and spread malware or propagate scams to your contact list. Once they have access to your account, they will immediately begin using it to send out malicious emails to every saved address in your contacts. The thinking is that a person is more likely to click on and entertain a suspicious email if it’s coming from their “friend”.

The sad truth is that many people don’t take the time to consider who is actually sending the emails they click on. A lot of users will notice their friend’s email address and assume they are the one who’s sent them a request for a gift card, wire transfer, or link to a compromising video. It’s always better to check with that person (if you actually know them well enough to receive unsolicited emails from them), and verify if they actually did send you that. Otherwise, this should raise a huge red flag.

How does your Email get Hacked?

While it’s technically possible that a hacker could head over to gmail.com, type in a random address and then guess a password, this just isn’t an efficient way for a scammer to operate. More commonly, they will acquire these email addresses either from a hacked website, newsletter, or other kinds of compromised databases.

Once they’ve obtained a list of, say, a few thousand email addresses this way, a hacker might decide to use these themself or put them up for sale on the dark web for other scammers to purchase. Just the addresses themselves without a password aren’t terribly valuable, and so most people who collect these lists are looking to start spamming malicious emails in the hopes that a fraction of the recipients open up and fall for the traps they’ve laid within.

What’s more dangerous, however, is if someone does get both your email address and the password. At this point, unless you’re lucky, they’ll immediately change the password and you’ll find yourself locked out of your account. If this happens, it’s too late to protect your account proactively and you’ll instead need to take some steps to try and recover your account.

What to do if your Email gets Hacked

If you’re lucky and the hacker didn’t change your password but you’ve received reports of people getting scammy emails from your address, you should immediately call your iDefend Advisor team at 801-724-6211.

If you’ve found yourself on the receiving end of a hacked email account, following these steps is the best way to reclaim your data and get back up and running again.

  1. Report the hacking to your email provider. Most of the major providers have a way to do this from the sign-in screen.
  2. Scan your computer/phone for viruses and malware. If you have [our service], one of our techs will have your back on this one.
  3. Change your security questions and make them better. Better questions equal better security. If you’ve ever done one of those social media posts about “your first car, your high school mascot, etc.” you may have unknowingly given out answers to your security questions. Try using answers only you would know and never share them.
  4. Change your password and make it stronger. If you use this same password or email to log into other websites, you should also change it there.
  5. Let friends and family know you got hacked. If you suspect any malicious or scammy emails have been sent from your account, letting people know you got hacked and not to open anything weird from you is a good idea.
  6. Check your email settings. Pay especially close attention to the automatic forwarding settings to make sure nobody else is snooping in your inbox.
  7. Activate monitoring. If you’re worried that any of your sensitive personal data might be compromised (things like personal IDs, SSN, DOB), having active dark web monitoring and identity theft protection in place will give you peace of mind.
  8. Pay attention to any 2FA you’ve set up. As stated above, if you start seeing texts on your phone or messages through another email account with access and verification codes you didn’t request, report it to your email provider right away.

Final Thoughts

Nobody wants to wake up to a hacked email account, but unfortunately identity theft, hacking, and scams have risen exponentially over the last few years. For most of us, identity theft, ransomware, and hacking is no longer only something we’ll hear about on the news, or that doesn’t happen to us.

Having active protection in place is no longer something only business owners and global corporations need to be concerned with, as more and more individuals, families, and small businesses are falling prey to cybercrime daily. We believe that everyone deserves the peace of mind that comes with knowing your information is safeguarded, and you have steps in place for the day that identity theft comes knocking at your door.

The post What To Do If Your Email Gets Hacked first appeared on iDefend.

]]>
5 Tips for Social Media Safety https://www.idefendhome.com/blog/onlineprivacy/5tipssocialmedia/ Fri, 08 Dec 2023 22:49:21 +0000 https://www.idefendhome.com/?p=5736 These days, it's almost impossible to spend a day on social media without encountering some potential security issues: scams, privacy leaks, and fake follower requests just to name a few.

The post 5 Tips for Social Media Safety first appeared on iDefend.

]]>
pexels-cottonbro-5053835
These days, it's almost impossible to spend a day on social media without encountering some potential security issues: scams, privacy leaks, and fake follower requests just to name a few.

In this article

Social media is a powerful tool which allows us to connect to the lives of those around us without the need to be near. With that comes the ability to instant message, share photos and videos, as well as view what others have chosen to share.

You may not have enough information for someone to completely steal your identity, but if your profile isn’t properly protected you can allow for phishing attempts among other threats to take place.

Here are five tips for better safety:

1. Be aware of social media scams

Scam artists work to build a profile of you. When your Social Media account is allowed for anyone, including those not of your friends or followers, to openly view you, you allow for them to gain a view into your life. Those potential thieves can look in and view person videos and photos that you have uploaded. This allows them to discover ways in which they can advertise to your needs to trick you to freely give out your information for them to steal your identity.

Take for example that you recently had a birthday party. You posted pictures, tagging friends and family, as well as a few videos to commemorate your special day. The fact is that when your account is open for the world to see, they can look in and see what your home is like, who’s in your family and friends circle, as well as who you are as a person.

Still, there are some vital steps you can take which will allow you to better protect yourself.

2. Ensure your account is fully private

When new friends wish to add you, they can search for your name/username and pull up a variety of accounts until they see the corresponding picture of you. When they click on the link to your profile, they will be given a preview of your account, and the chance to send a request. Now how much you decide to show on your profiles is entirely in your control.

Under your setting section there is a tab labeled privacy. Under that you will be able to pick and choose what you want to show. It is recommended that you hide all information, including social posts. Your profile picture will still be shown, but past profile pictures, among other information will be protected and hidden until you accept that friend request.

If you want to view how your profile looks when others click on you, simply open an incognito window, and post your profile link. This will allow you to see exactly what they see before they send a request.

Tip: Do not list family members on your Social Media Account. Doing so can in fact give thieves information into common security questions, such as your mother’s maiden name. Photos also can reveal the color of your first car, first pet name, and so forth.

3. Know what happens to your information

There are a few items to keep in mind as well outside of what scam artists may be looking for. Social Media websites can also compromise your information and send it to advertisers to help them plot out ads that peak your interest. One thing you can do to help combat this is to keep your location data private. When you’re on your account with your phone, usually the app will be tracking your location and whereabouts. They can also see what you are searching for, what you are clicking on so that they can better populate their web address with ads. To keep it private, go into the settings on your phone, and find the app. Once you do, you can pick the location tracking, and turn it on to, never allow.

Consider using a VPN

Another option would be to install a VPN on your phone and computers. This would ensure that everything that you do is hidden, and that your IP isn’t exposed as well. Your information, searches and clicks on the web stays with you, and isn’t released to outside sources.

Don’t give away too much in your “About” section

Your About section on your profile can carry with it multiple points of valuable information. The nice part is, is that you can simply go in and delete it all together. Information like where you currently work, past places you’ve lived, and family and relationships, can give a perpetrator all the information they need to scam you.

While a scam artist is searching through your profile, one dangerous section is in your contacts. The most common personal information exposed on the dark web is email and phone numbers, and your Social Media profile has direct access to both. Luckily, you can go into your ‘About’ section and mask or delete that information so you will not be the victim of SPAM or Phishing attempts.

4. Only accept requests from those you know

Fake accounts are abundant, and in a matter of minutes someone can look up pictures of someone, upload them to a profile, and make it appear legitimate under a fake name. Once that is done, they can send requests to anyone they would like, to try to gain the ability to view profiles. The most important thing to remember with this is to only accept requests from those you know in person.

There is a dangerous scam that can sometimes occur where your friend’s account is copied and you receive a request to refriend them. Sometimes you can even receive a message explaining how the error occurred and why the need to friend them again. The smart thing to do is verify with the friend directly through some other source, ex. Via Phone, and confirm if that truly is the case.

5. Watch out for common attacks

One of the most important things to remember is to trust yourself when you believe it is questionable. If a friend that you haven’t spoken to in a while randomly sends you a message like, “This video is so funny! Check out this link:” Then there is a chance that your friend’s account has been hacked. Never click on the link. Doing so causes for your account to be compromised with theirs, which can be dangerous because you won’t know what kind of information they were able to gather while in your account.

When in doubt, change your password

If this does end up happening to you, immediately change your password as soon as possible. It is a good rule of thumb to change your password every couple of months to something unique and to only this account. If your password and email is compromised, then each account which uses the same username and password can be accessed as well.

Avoid “Click-bait”

Another hazardous “Click-Bait” which can also compromise your information is the Quizzes or ‘Find Out Tests’. When you want to discover ‘Which Animal Best Fits Your Personality’ you click on a link which transports you to an outside source. There you are prompted to allow access to certain information, and need to click ‘Accept’ or ‘Allow Access’. Each time you allow access to your account you allow for that service to receive anything they would like. You gave them access, yet have no idea what they took, or will use it for.

The post 5 Tips for Social Media Safety first appeared on iDefend.

]]>
The Top 3 Settings to Check on Facebook for Better Online Privacy and Security https://www.idefendhome.com/blog/onlineprivacy/top3facebookprivacysettings/ Sun, 01 Oct 2023 20:05:22 +0000 https://www.idefendhome.com/?p=5727 Facebook is a great place to communicate, share, and reconnect with friends. It is not without its drawbacks, however. One of the biggest things that goes unnoticed is how much of your personal data and identifying information the platform takes about you.

The post The Top 3 Settings to Check on Facebook for Better Online Privacy and Security first appeared on iDefend.

]]>
pexels-andersonguerra-1138735
Facebook is a great place to communicate, share, and reconnect with friends. It is not without its drawbacks, however. One of the biggest things that goes unnoticed is how much of your personal data and identifying information the platform takes about you.

In this article

Facebook (FB) is still one of the most popular social media networks in the world with some sources pointing at over 2.9 billion monthly active users! If you’ve found yourself afloat in this deep-blue sea of social fish, you might now be aware of just how much the platform and its parent company Meta take advantage of your personal information.

We’ve laid out a list of settings you can look for, to help you take control of your privacy on FB. Keep in mind that some of these may change slightly as FB updates their website, but if you have any questions, just contact our support team.

Top 3 settings to check

Once you are logged into your FB account, simply click on your profile and select “Settings”. From there, navigate to each of the following settings. Refer to this guide for our recommendations, or feel free to choose what best matches your needs and preferences.

1. Security and Login

We recommend taking a look at the following sections while you are here:

Where you are logged in

This is perhaps the most important option for you to check, since it shows any device you’ve logged into your FB account from before. Our recommendation would be to sign out of everything, and then sign back into only the devices you actually use and have access to.

Two-factor authentication

This is a recommended security feature on any website where you have sensitive data stored. Turning this on will mean logging in is slightly more inconvenient, but makes it incredibly difficult for anyone to hack into your account, as they’d also need access to whatever you set as your second factor.

Authorized logins

Any device listed here has required you to set up two-factor authentication on it.

Choose 3 to 5 friends to contact if you get locked out

This can be a good option if you are ever locked out of your account. Whoever you designate here can help you recover the login information.

2. Privacy, Timeline and Tagging, Stories, Location, Blocking

There are numerous settings here that allow you to personalize these settings to your liking. There is no “right” way to do this since it’s all up to your personal preference. We recommend reading through these and familiarizing yourself with what kind of information you may be unknowingly sharing.

3. Apps and Websites

This section may surprise you, but don’t panic. It will list any site or app that you have ever allowed permission to use your account details. For example, if an app ever asks you to “Sign in with Facebook”, it will show up here.

We recommend revoking access to anything you don’t use or recognize.

What else can I do?

iDefend offers many services, including a robust arm aimed directly at supporting parents, improving online privacy, and general safety and best practices with social media. It also features social media monitoring services which will automatically notify you when it flags certain suspicious activities on your accounts.

In addition to Facebook, this also works for several other popular platforms. For more information, reach out to one of our iDefend Advisors.

The post The Top 3 Settings to Check on Facebook for Better Online Privacy and Security first appeared on iDefend.

]]>
What to Expect (and to Not Expect) From Using a VPN https://www.idefendhome.com/blog/devicesecurity/expectornotfromvpn/ Wed, 07 Sep 2022 19:53:30 +0000 https://www.idefendhome.com/?p=5715 In this digital age, having a Virtual Private Network (VPN) might seem like a necessary or vital piece to your personal cybersecurity, but is one right for you? We break it down for you in this guide.

The post What to Expect (and to Not Expect) From Using a VPN first appeared on iDefend.

]]>
pexels-stefan-coders-1019774-5146493
In this digital age, having a Virtual Private Network (VPN) might seem like a necessary or vital piece to your personal cybersecurity, but is one right for you? We break it down for you in this guide.

In this article

While using a VPN, there are a few benefits you can expect. On the other hand, there are several popular myths surrounding these apps. As long as you’re aware of this, you’ll go into using a VPN with the proper expectations.

What to Expect

Increased Privacy

Using a VPN will encrypt and protect your data traveling through it. This will help prevent advertisers, your ISP, governments, and other sources from viewing and accessing your browsing habits. This will help limit ads you encounter online from being tailored to you personally, and your browsing history.

Geolocation

Another popular use of a VPN is “region spoofing”, or appearing online that you are in another part of the world. This serves to further protect your personal data, and you may even succeed in accessing content that has been restricted by region.

What not to Expect

Complete Security

VPNs are not antivirus solutions. They will not prevent you from getting infected with viruses and malware. You will still be at risk any time you are browsing dishonest or malicious websites.

Faster Internet

Having your network traffic encrypted and going through the VPN will in many cases affect it such that your internet speeds will suffer as a result. There isn’t much you can do here besides upgrading your bandwidth with your ISP.

Streaming Location Spoofing

Many people attempt to use VPNs to circumvent streaming content restrictions on sites such as Netflix and Hulu. These companies are aware of this and are constantly cracking down on offenders, blocking them from their sites. You may get lucky for a while, but it’s in the company’s business interests to prevent region spoofing.

Should I Get a VPN?

Perhaps the soundest bit of advice when it comes to a VPN is just try it out. There are dozens upon dozens of VPNs out there, and many of these offer some type of free trial period.

It’s also extremely common for VPN companies to offer steep discounts if prepaying for several years at a time.

Even iDefend includes a VPN in its services at no additional charge to our members.

If you have any questions about a VPN, what it does or doesn’t do for you, and if it’s a good fit for your household, give one of our Advisors a call and they’ll be more than happy to go through things with you.

The post What to Expect (and to Not Expect) From Using a VPN first appeared on iDefend.

]]>
How to Quickly Secure Your Google Account https://www.idefendhome.com/blog/onlineprivacy/quicklysecuregoogleaccount/ Sat, 09 Apr 2022 01:32:03 +0000 https://www.idefendhome.com/?p=5753 Your Google account already has robust layers of security, but how well does it respect your privacy?

The post How to Quickly Secure Your Google Account first appeared on iDefend.

]]>
pexels-wdnet-218717
Your Google account already has robust layers of security, but how well does it respect your privacy?

In this article

Google’s offering of dozens of free web apps is what makes it a popular choice among many users. Like any big internet corporation, however, these apps and accounts have access to any personal information you share on there. In this guide we’ll point out some setting you can check on to take control of just what information is shared with them.

Account Settings You Should Check

From your google account, click on your account picture or icon. From there, you should see an option called “Manage your Google Account”. Now, navigate to each setting described below and feel free to implement any of our recommendations. You can also customize this according to your individual needs.

Home

Look for any flags here, including any security issues found. Google has a nice walkthrough process that helps you correct anything they’ll point out to you on here.

Personal Info

Now is a great time to make sure any information you have here is correct, so that you can recover your account more easily in case you lose access to it. You can also control how much or how little you put here.

Data & Personalization

We recommend taking their Privacy Checkup that Google provides. You can also adjust the settings in here according to what you want.

Security

Two-factor identification is a recommended security feature on any website where you have sensitive data stored. Turning this on will mean logging in is slightly more inconvenient, but makes it incredibly difficult for anyone to hack into your account, as they’d also need access to whatever you set as your second factor.

Finally, look through any devices you have listed here and remove any you no longer use or don’t recognize.

The post How to Quickly Secure Your Google Account first appeared on iDefend.

]]>
Top 10 Bad Cybersecurity Habits to Break in 2022 https://www.idefendhome.com/blog/devicesecurity/10badhabitstobreakin2022/ Sat, 22 Jan 2022 17:22:57 +0000 https://www.idefendhome.com/?p=5841 We all have bad habits, and the new year is a great time to try (and usually fail) breaking them. Here are 10 simple things you can stop doing to have better cyber health.

The post Top 10 Bad Cybersecurity Habits to Break in 2022 first appeared on iDefend.

]]>
old_habits_new_habits-300x200-1
We all have bad habits, and the new year is a great time to try (and usually fail) breaking them. Here are 10 simple things you can stop doing to have better cyber health.

In this article

The new year is a great opportunity to evaluate many areas of your life. With cybercrime surging to all-time highs last year, improving your personal and home cyber protection has never been more important. Take better control of your online security and privacy this year by breaking a few bad cyber habits that may put you at risk.

2021 was a big year for cybercrime

Last year shaped up to be one of the worst years on record for cybercrime and losses from scams. In the first nine months of 2021 alone, 281.5 million people were impacted by data breaches and data leaks (ITRC). Hackers targeted people working from home, resulting in a 300% increase in data breaches with their employers (Verizon).

Over $80m scammed

During a nine month stretch last year, victims were scammed out of $80 million in cryptocurrency investment scams (FTC). And that’s only what’s been reported to the Federal Trade Commission. At the same time in 2021, the elderly in America lost over $1 billion in new cyber scams (IC3).

If by chance you’re not feeling the urgency to find new ways to protect your digital world, consider that more than a third of US identity theft victims last year said they didn’t have enough money to buy food or pay for utilities last year after suffering financial losses due to fraud (ITRC).

Focus on things you can control

While you can’t control things like data breaches with businesses, you can do your part. Here are 10 bad habits to break this year to better protect your privacy and your hard-earned money.

Stop doing these things now:

1. Stop ignoring computer problems

When your computer starts having problems – when applications don’t work, files go missing, or your computer and your internet becomes painfully slow, your computer might be infected with a virus, spyware, or other types of hacker tools. Do not ignore computer problems. Get a security check-up done right away from a trained professional when your computer starts acting up.

2. Stop using outdated software

Don’t ignore security updates to your computer and smart devices. More than 50 new vulnerabilities in operating systems, browsers, and other software on computers and devices are discovered every day. Cybercriminals look for and use these vulnerabilities as a top method of attack. The good news is that by switching on automatic updates and clicking to update when prompted, you can easily keep your computer and your smart devices up to date and protected.

3. Stop not thinking before clicking

Scam emails, known as phishing emails, are possibly the most prolific cyber threats you’ll face today. Attackers try to trick their victims into clicking on malicious links or opening a virus-infected attachment in an email that appears to come from a legitimate company or person. The number one rule is to think before you click. If you weren’t expecting the email, be suspicious.

4. Stop using bad passwords

Using the same password for multiple accounts and easy-to-guess security questions gives hackers a massive advantage. Create strong passwords for your accounts. Try using long phrases you’ll remember as your passwords, the longer the better. Don’t use the same password everywhere. Consider using a password manager to remember your passwords and phrases. And be sure to switch on two-factor authentication (2FA) on any account that offers it.

5. Stop not using security on all devices

Everyone knows you should have good anti-malware protection on your computers. Don’t forget to protect your smart phone and tablets too, especially if you have Android devices. Be sure to download and use highly recommended security apps from Google Play and the Apple App Store.

6. Stop using non-secure websites

Start paying attention to the security of websites you visit. HTTPS sites use encryption to protect your connection to the site. It authenticates the site as genuine and that it’s not a phishing website. Look for the padlock symbol and the “S” in HTTPS at the beginning of the website URL.

7. Stop sharing work and personal

With many of us spending more time working from home and maybe using personal devices for work too, the lines between personal and work on computers and devices have become blurred. Keep work and personal separate. Only use your personal email and passwords for consumer shopping, online banking, etc. Keep children and other family members off computers that you use for work.

8. Stop giving out personal information

Never give out personal information to someone who has called you. Scammers are getting good at convincing people to share their date of birth, account numbers, and other credentials over the phone. Legitimate businesses and government agencies will never ask you for private information by phone. Hang up, look up the company’s phone number yourself and then call them back.

9. Stop not backing up your files

Ransomware attacks continue to happen. Imagine if you were suddenly locked out of your computer with a message left by the hacker demanding $10,000 in bitcoin as a ransom payment to get your computer back. All the data on it, and potentially cloud storage, could be lost forever – including family photos and important work documents.

Be sure you have a cloud backup of all your files or that you regularly back up everything to a portable hard drive and store it separately in a secure location. Wiping your computer and reloading from a backup is often the only way to recover from a ransomware attack.

10. Stop not protecting your smart home

Nearly every home is outfitted with smart gadgets like voice assistants, smart TVs, and security cameras. But these smart devices are also becoming an attractive target for criminals. They can be used to infiltrate your home network, your computers and ultimately, your personal data.

Be sure to change the default passwords that come with the device – such as your home Wi-Fi router. Where possible, edit the privacy settings on devices (like a voice assistant) to not allow it to share your activity and information with the manufacturer (such as Google). Also, watch for software and firmware updates from the product manufacturer that fix potential security flaws as they are discovered. Think twice before purchasing new gadgets or toys that listen to things going on in your home, record video, or otherwise track you.

Here’s to a secure 2022!

In many ways, we are all looking forward to a better year than last year. We have enough to worry about without stressing over attacks on our digital lives. To help make sure it’s a year full of good things, start by improving your personal cybersecurity and privacy today.

 


Staying current with all the right protections can be a daunting task. Fortunately, expert help is available for helping you establish a complete cyber defense plan for you and your loved ones. iDefend is a comprehensive identity theft and cybersecurity program for individuals and families that includes unlimited access to U.S. based cybersecurity experts and advisors to help you protect your digital life.

The post Top 10 Bad Cybersecurity Habits to Break in 2022 first appeared on iDefend.

]]>
Guide to Secure Logins and Passwords https://www.idefendhome.com/blog/onlineprivacy/3tipssecurepasswords/ Sat, 14 Aug 2021 00:37:17 +0000 https://www.idefendhome.com/?p=5745 Your passwords are invaluable. It is the main defense which stands between who is allowed to view the information protected.

The post Guide to Secure Logins and Passwords first appeared on iDefend.

]]>
digital-padlock
Your passwords are invaluable. It is the main defense which stands between who is allowed to view the information protected.

In this article

Like your credit and debit cards, your online accounts have pins and passwords to allow the proper people to use and have access to your property. The slippery slope to a compromised password can lead to much greater threats and trouble down the road. When access is granted to those on the dark web, it can swiftly cascade into a greater attack.

Exposed emails are common

One of the most common types of information exposed on the dark web is email addresses and passwords. Also, keep in mind that websites can be prone to attacks causing them to be hacked. This can cause your email, passwords, name, and other information to potentially be compromised on the dark web. The difficult part is unless your information is being monitored by a service, it is near impossible to discover when such items become compromised.

These attacks, especially since 2020, are far more common, which is why we advise such information to be monitored. Therefore, it is important to protect yourself which such services, as well as following these suggestions below.

1. Make each password unique

Lengthy passwords, with various numbers and symbols can better help protect you. Also, you can capitalize different letters throughout in order to create a more complex password. You can still have a way to tie it to you personally, while still not making it obvious to guess.

For example, if you are a Saints NFL Football fan then a password like: #1Sa1nt$f4n.Dr3wbre3$ would be a strong password to consider. The different characters, random period, and different words helped create a strong password while also keeping it personal to you.

With these steps to create a more complicated password, there is a chance that the password can be exposed online. That is why it is smart to change your password every couple of months. It’s small things like that which can make all the difference in protecting you.

2. Use different passwords

This may be the most frustrating part of the process but it is also one of the most important. This helps lock down each account to a specific password, which can better keep thieves out. In order to best protect yourself, you need a completely different password for each account you have.

The reason for this is if your information for your email and password, for example, is released on the dark web, then those who choose to use it can hop in and look through your email. On top of that, if you use the same email and password on other websites such as Social Media, then they too can input that compromised information and have access to far more data.

The risky part of doing this is forgetting which password goes to which account as well as all the various passwords. There are services out there which help keep track of your passwords and usernames, but the risk with that also is the chance of that service getting hacked and your information compromised (Though that is more rare.) Yet one of the worst things you can do is write your passwords down on a sticky note and place it on your desk.

Security with accounts that contain your personal and confidential information is entirely in your hands. You have the choice to make it as complex or simple as you choose.

3. Multi-factor Authentication

With the world ever evolving there have been extensive measures given to help stop unwanted access to your information. One of these advancements has been Two-Point Authentication. Not all websites or services allow for this feature, but when it does, it’s smart to activate.

This enacts for after your password is put in for another way to verify it is you. That usually includes sending a text to your phone with a specific code. Once you enter that code, you will then be allowed to enter your account. This is helpful because if someone does try to get into your account and has the password, you will receive the text with the code, stopping them from going in further.

Keep in mind that you generally want to stray from Face Authentication. It is better to keep it to where a code is sent to your phone. Even with a code being sent to an email can become compromised if your email and password have been exposed on the dark web. This simple security step may add ten to thirty seconds to your login time, but the safety it adds on protecting your information is invaluable.

How to stay safe

After following all these points there still remains a chance in which your information is compromised. Remember to continue to change your passwords every couple of months to help prevent this. Sometimes when such information is exposed to the dark web it can be an old password which can keep perpetrators locked out.

In the end, following this advice can better help keep your accounts secure. If you do have any questions always feel free to reach out to our iDefend team.

The post Guide to Secure Logins and Passwords first appeared on iDefend.

]]>
You Probably Use the Deep Web Every Day, But Not the Dark Web https://www.idefendhome.com/blog/identityandfinancial/deepwebeveryday/ Fri, 12 Feb 2021 16:37:42 +0000 https://www.idefendhome.com/?p=5326 You don’t need to know everything about the dark web to know the dangers it poses to you and your family. We'll give you the basics here.

The post You Probably Use the Deep Web Every Day, But Not the Dark Web first appeared on iDefend.

]]>
dark_web
You don’t need to know everything about the dark web to know the dangers it poses to you and your family. We'll give you the basics here.

In this article

We’ve all heard of the dark web, but what is it really? What can you find there and is it all bad? We’ll explore the difference between the dark web and the deep web, what you will find in each and what you need to know.

Deep Web or Dark Web?

You’ll sometimes hear people refer to the “dark web” and the “deep web” as the same place, but that’s not true. The deep web (also referred to as “hidden web” or “invisible web”) refers to places on the internet that can only be accessed through a login. That would include your online banking, Netflix, Ancestry.com, and any other membership site.

The deep web = login + password

If you need to login to see it, that’s the deep web. You’ve been using the deep web for years and didn’t even know it. Because it’s behind a paywall or a membership login, these parts of the internet are not indexed, so you won’t find them from a Google search.

The dark web is the bad one

The dark web isn’t indexed by search engines either, but that’s because of the illegal and dangerous nature of its content. We’ve all heard stories and read headlines of the illicit activities that take place there. It’s all true. This is a place where you can buy everything from illegally harvested organs to hacked bank account information.

It’s a truly malicious marketplace.

Cyber Criminals Love the Dark Web

You see, some cyber criminals are great at stealing personal information with malware or through hacking, but they don’t want to get caught using it. They then post listings for this information on the dark web and allow other users to purchase it.

A hacker is less likely to get caught if they are selling your information to other criminals rather than using the information for fraud.

Stolen information is the dark web’s currency

Because of this, information is one of the main items bought and sold on the dark web, and you’re caught right in the middle of it. This is where dark web monitoring comes into play.

Dark Web Monitoring

With dark web monitoring, you’ll receive notifications when your information has been compromised and is available to criminals. This could include your bank account login and password, your social security number and place of employment, or even your birth date and home address.

Any single piece of information is harmless enough—it’s easy to guess a random social security number. The trouble is when they get more than that. When multiple pieces of information are combined, it allows the criminal to commit a wide range of crimes from unemployment fraud, credit card fraud, home title theft and more.

How dark web monitoring works

Dark web monitoring will notify you when your private information is posted online. This gives you the opportunity to update passwords, change details and even pause your credit. This is the closest thing to fortune telling and it could save you from becoming a victim.

Make sure you’ve protected yourself with an identity theft recovery service, but upgrading to a dark web monitoring is the ounce of prevention that will save you from a deep dark headache.

The post You Probably Use the Deep Web Every Day, But Not the Dark Web first appeared on iDefend.

]]>