Given the explosion and pace of technology, ensuring your privacy is underlined by integrity could make you feel ‘paranoid’. However what’s paramount here, it’s your ‘right’ to have privacy, and it’s your entitlement. The question is, how can you fully secure communication online?
The key aspects are those of ‘Ownership’ and ‘Risk’; both are yours as you ‘own’ the processes. However, it’s your‘risk’, and you must remediate to an acceptable level of risk acceptance, but it’s also a disciplined process (best you change your habits!!).
What are hackers, nation states, cyber criminal or do you know the difference between; HTTP/s, FTP, SSH, SSL, TLS and a host of other acronyms? The audience of this article isn’t intended for the ‘techie’, as they should already be aware. But it’s directed to the everyday user, just like you or me. ‘Keep it straightforward and manageable’ is my motto.
So let’s investigate how ‘privacy’ could be achieved in this intrusive world and protect yourself.
One thing that must be understood, and I proffer there’s no such thing as 100% secure. The cyber criminal is ubiquitous in undermining the individual. Your ‘personal data’ is a rich picking to them and marketable on their ‘black’ market.
What is it you need to know or wish to protect? (‘A’hhhh, the ’64 million $’ question!!!) And the answer lies with you!
All forms of communication leave some kind of trace, in some aspects and unbeknown to you this could be a digital trace. So let’s interrogate the tools you could put in place to protect yourself.
Something to be aware of that all isn’t ‘free’, so there may well be a charge. In your chase for your golden chalice, it’s important to decide what your privacy and security is worth! We all have different requirements, what’s critical to you, may well be indifferent to the next person.
An excellent site that looks into the array of tools, glossary and tactics for protecting yourself is contained in Security in a box or even Tactics and Tools websites. Here you’ll be given the options for:
- Securing email: It makes sense for you to secure your email as the predators are just waiting, if not struck already to steal your data. Once the crime has been carried out, your email and account have been compromised.
- Tips on responding to suspected email hacking and surveillance: We’re not all technicians, nor do we think like the cyber criminal. Only you know what potential vulnerabilities you may well have, so start today and don’t delay.
- Securing other internet communication tools: There are a myriad of tools on the internet as equally the advice given. By mapping out your requirements could prove to be proactive in the long term goal of becoming more secure online.
- Advanced email security: Encryption is at the heart of making your email more secure, in fact, it would remain safe when at rest. This will make take the additional step in explaining digital signatures, when reinforces security along with links to other sites.
Though as we’ll be aware, the Internet is a vast repository of information, where I’ll now look at other sources that could be you used. All of these are linked to the main article at ‘Security in a box’ which abundant with tools and advice, what more could be said!
As humans we all want quick fixes, it’s part of human nature, more so given the diverse response of the internet. If you are prepared to spend time in reading about the ‘theoretics’ that dictate modern technology, it’s worthwhile taking the time to visit Email Security or Poynter. Personally, I found these sites useful when looking into theoretics, or am I just a sad Muppet!!
Keeping your communications private, using the principles as shown at Alternet, though originally established for journalistic purposes, they can be equally used for family and business use.
As we all have email accounts, none of us would like to think we’ve been hacked, or there’s been anything untoward happening. However, these two sites can provide different perspectives if you’ve found something. Go Hacking and No IP give some very useful advice that you may wish to follow.
If you have a need for an email service that focuses on security and privacy, it’s worth to try this site on Network World. There are a plethora of links, but be wary as not all links aren’t functional, that said I’ve attempted to give you different arrays of options.
It’s worth noting that reading through the strands gives vital information, that could be reiterated in this article, but it’s important to give ‘positive’ statements.
If you’re specifically looking for a ‘privacy tool‘ that catalogues the best in encryption for messaging, this I suggest is the site. An excellent article, when viewing please select ‘All rankings‘ for a league table of all ‘Best secure messaging tools’, I don’t think you’ll be taken astray.
Life hacker offers awesome advice from ‘Searching’ to ‘Complete online anonymity‘, though the one which caught my eye was; Prism Break interrogates the spectrum of Mobile – Android or iOS, Computer – BSD, GNU/Linux, OSX or Windows and Network – Routers or Servers requirements, offering diversity allied to security in depth. Excellent sites.
The information in this article is rich due to its focus and diversity. Ultimately the selection of tools will be down your remediation requirements to secure your online communications. Don’t be foolhardy and make hasty decisions. Map what your requirements are and document the whole process in order you come to the right conclusion.
By keeping things simple, complexity is avoided as you’ll be managing your accounts and computer. However, as part of your process, do review everything and reassess to stay safe. Use a good VPN like ExpressVPN, as a VPN is easy to use tool for better encryption and anonymity online – this is part of my personal recommendation, an extra tip for the ones who value their privacy!
You may wish to rename your email account from ‘John.Smith@gmail.com’ to ‘Tetley3@gmail.com’ at least you’ll be aware of whom you are. Likewise, you have the opportunity to anonymize your searching on the internet; the choice is yours.
By taking ‘ownership’ of your activity, you’ll be reducing the ‘risk’ to yourself and even to your elder loved ones too.
Ensure that your antivirus and operating system (and all other programs, as much as you can) weekly updates are automated, these are the key to running a tight ship and being secure.
Top/Featured Image: By PublicDomainPictures / Pixabay
Originally posted by Howard Smith on https://securitygladiators.com/2016/03/14/secure-communication-experts-tips/