How Students Can Store and Protect Their Data on the Internet

0
How Students Can Store and Protect Their Data on the Internet

Students are some of the most active users of the Internet, thereby exposing themselves to the risk of data theft, account hacking, and more.
In our article we talk about how to protect yourself from scammers on the Internet from all sides, even if you are used to buy a research paper on programming and do not understand anything about it.

Protecting Your Privacy

Everyone leaves their footprints on the Internet, which can be used by hackers to compromise personal accounts, access bank accounts, correspondence, and passport data. Some sites and apps sell users’ information, which they get automatically in the form of IP addresses, cookies, and search history. You can’t protect your information completely, but you can control what’s already known about you.

Clear your footprint

A digital footprint is all the data left behind by your online activity. Everything you share and do online, from website visits to social media interactions, go into your digital footprint. It reflects your IP address, log-in details, and other personal information you broadcast.

All browsers collect data about your activity. This is done to improve service, display contextual advertising and offers that match your interests. The statistics let you know who you are, what you’re interested in, and where you go, so if attackers gain access to your browser, they can get all the information saved about you. But believe us, a little inconvenience and the disappearance of “useful” ads is a small price to pay for protecting yourself from data interception. Therefore, it is better to disable the collection of statistics in your browser settings.

Some data cannot be deleted immediately. This primarily concerns social networks, which store media files, correspondence, comments, payment histories, and IP addresses from which you have logged in. But this information can be uploaded and you can be alerted.

You can erase some of your data from the network by deleting your social media profiles. But be aware that information is stored on servers for a while along with it popping up in search engines. If you find unreliable and irrelevant information about yourself that you want to delete, use the “Right to be forgotten”.

Google has a special form for this. The search engine can refuse to remove links if it is not satisfied with the justification. After reviewing the request, the service removes your data within 10 days or sends a reasoned refusal.

“Just Delete Me” knows how to delete accounts. Find the desired site through a search and the service will redirect you to the profile elimination page. If you see a mention of yourself and can’t delete it yourself, find the contact details of the site owners directly through “Whois Lookup”.

Don’t give out personal information over the phone

We all know how many cases of telephone fraud there are, and every time the scammers keep perfecting their criminal schemes so that each of us can be deceived. Mostly fraud concerns banks: clients are offered to save deposits, convert money, sort out loans or do something else. Don’t give your ID data, card number, and password – the bank already knows all that. If in doubt, it’s better to hang up and go to the office yourself and give the number they called you to the security officers of the financial institution.

Set strong passwords

Browsers have a feature for auto-filling logins and passwords. It’s convenient – you don’t have to remember and enter the data several times – but it can be hacked. Pages of personal accounts in online banks and government services contain the largest amount of personal information. By accessing a browser or a phone, a fraudster can take out a loan or do other criminal activity.

This has already been saying many times, but we’ll repeat: do not put one password for all accounts – come up with many complex and keep them in mind. It makes sense to make passwords out of combinations that only you can decipher. Some suggest coming up with a sound combination that forms a non-existent word and typing it in a different layout. Turn on two-factor authentication – each time you’ll get an account verification code to your email or phone.

Managers help to securely store and generate new passwords. The most popular now are Keepass, LastPass, 1Password. Some have the ability to upload an encrypted database with passwords to the cloud and synchronize it across multiple devices. For more security, store the database locally and move it between different devices on your own.

David Johnson is a freelance writer with 9 years of experience writing for Techzillo and other established tech outlets like iMore. His focus and key interests are Apple and accessibility as well as consumer technology in general. Read our Editorial Guidlines and Fact Checking process.

LEAVE A REPLY

Please enter your comment!
Please enter your name here