Security Tips

Protect Your Digital Footprint

There are many definitions of “privacy.”  Personal privacy, for instance, is protecting information others collect about you. In today's digital world, you would be astounded by all the entities that not only collect information about you, but legally share or sell that information. Each time you purchase something online, stream a video, buy groceries, search the web, visit your doctor, or use an app on your smartphone, smart TV, or other home devices, information about you is collected. This information can be used to sell you goods or services, decide your interest rates for loans, or determine the type of medical care you get or the jobs you are eligible for. If this information falls into the wrong hands, it can be used by cyber attackers to target and attack you.

The goal of maintaining personal privacy is managing your digital footprint, i.e. - attempting to protect and limit what information is collected about you. Be aware that in today's digital world, it is almost impossible to eliminate your digital footprint or stop every organization from collecting information on you. But you can reduce the risk.

Steps You Can Take to Help Protect Your Privacy

There is no single step you can take to address all of your privacy concerns. Instead, you will need to take a variety of small steps. The more steps you take, the more you can help protect your privacy.

  • Limit what you post and share with others online, such as on public forums or on social media. This includes being careful of what pictures or selfies you share. Even on private forums or when you enable strong privacy options, assume whatever you post will become public at some point.
  • When creating online accounts, review what information the sites collect about you by checking their Privacy Policy and provide only what you absolutely need to. If you have concerns about what they collect, then don’t use the site.
  • Be aware that regardless of what privacy options you set, information about you is being collected, especially on free services, such as Facebook or WhatsApp. These services base their business model on collecting data on what you do and who you interact with. If you are truly concerned about your privacy, don’t use such free sites.
  • Review mobile apps before downloading and installing them. Do they come from a trusted vendor? Have they been available for a long time? Do they have lots of positive comments? Check the permissions requirements. Does the mobile app really need to know your location or have access to your contacts? If you don’t feel comfortable, then choose a different app. Look for apps that promote privacy and give you privacy options. While you may have to pay more for an app that respects your privacy, it may be worth it.
  • Consider using a Virtual Private Network (VPN) for your internet connections, especially when you’re using a public network, like free WiFi.
  • When using a browser, set the privacy options to private or incognito to limit what information is shared, how cookies are used and stored, and protect your browning history. Consider privacy extensions like Privacy Badger or privacy-focused browsers.
  • Consider using anonymous search engines designed for privacy, such as DuckDuckGo or StartPage.

In many ways, privacy is something very hard for you to protect, as so much of your privacy depends on the privacy laws and requirements of the country you live in and the ethics of the companies you deal with. Although you can never truly protect all of your privacy in this technological age we live in, these steps will help limit the amount of information collected about you.

Tips to Identify Phishing Emails

LMU has seen an increased number of fraudulent emails designed to trick recipients into clicking links, opening attachments, or taking other actions. Read more here on how to identify phishing emails.

Creating a Cyber Secure Home

Today, as so many of us are working, connecting, or learning from home, we have to pay more attention to creating a strong cyber secure home environment. Here are four simple steps to do just that.

Tips to Identify Fraudulent Job Postings

Student, keep yourself digitally secure by reading this Handshake article on how to spot common scams and red flags, tips for evaluating fraudulent job postings, and other legit resources.

Stay Safe from COVID-19 Scammers

As much of the world grapples with COVID-19 and how to handle it, cyber attackers are taking advantage of the widespread discussion of COVID-19 in emails and across the web. ITS wants to alert our community to remain vigilant for scams related to COVID-19. Click here to learn more.