Clean up your cyber-hygiene – 6 changes to make in the new year
- Written by Elissa Redmiles, Ph.D. Student in Computer Science, University of Maryland
Data breaches[1], widespread malware attacks[2] and microtargeted personalized advertising[3] were lowlights of digital life in 2018.
As technologies change, so does the advice[4] security experts give for how to best stay safe. As 2019 begins, I’ve pulled together[5] a short list of suggestions for keeping your digital life secure and free of manipulative disinformation.
1. Set your boundaries and stick to them
As part of my research, I’ve recently been speaking with a number of sex workers in Europe about their digital security and privacy. One consistent thing I’ve heard from them is, “The best way to stay safe is to set boundaries.” Decide – on your own, and in advance – what data you’re willing to share with apps and online services, and stick to those limits.
That way, when the latest new app asks you for a permission that oversteps what you’re willing to share, you’ll be more prepared to answer. Also set limits on the online discussions you’re willing to participate in; bow out when a discussion is hurting more than helping you. It’s even useful to set boundaries for how much time you’re willing to spend on digital security – which could be an endless task.
2. Burst your filter bubble
People who get their news primarily[6] – or exclusively – from social media are subjecting themselves to the whims of the algorithms[7] that decide what to display to each user.
Because of how these algorithms work, those people are likely to see articles only from news sources they already like[8] and tend to agree with. This isolation from people with other views, and from evidence that might challenge particular perspectives, contributes to unprecedented levels of partisanship and disagreement[9] in modern society.
Free online tools like AllSides[10] and Purple Feed[11] are some places that show news reports and social media posts from differing political perspectives, and identify information that’s generally agreed upon across the political spectrum.
3. Manage your passwords
The biggest threat to password security is no longer the strength of your passwords[12] but the fact that many people reuse the same passwords[13] for all, or many, of their accounts. Researchers are busy designing notifications to tell you when one of these reused passwords has been leaked to the world[14], but it’s safer to use different passwords, especially for your most valuable accounts.
You can use password manager software[15]. Or, use the original low-tech method, writing your passwords down on paper[16]. Believe it or not, it’s much safer to write them down than reuse the same password everywhere. Of course, this is true only if you’re sure the people you live with or frequent visitors to your home won’t try to get into your accounts.
4. Turn on multi-factor authentication
Adding an additional step for logging in to your most important social media, email and financial accounts can add lots of protection. Multi-factor authentication systems are best known for texting you a six-digit code to type in as part of your login process. While any multi-factor authentication is better than none, text messages can fairly easily be intercepted or spied on[17]. An even safer route[18] is to use a special code-generating app on your phone.
Bautsch[19]People who change phones or SIM cards often, or who want additional protection, might consider using a physical key[20] that plugs into your computer to authorize a login. They can take a bit more time to set up initially[21], but then work much faster than most other methods.
5. Delete apps you don’t use
Smartphone apps track where you are[22] very closely[23], and share your location data[24] with advertising and marketing companies.
Just carrying a phone in your pocket[25] can give tracking companies clues to where you go and how long you stay, and technical details about your phone can offer clues to your identity[26].
If you don’t use an app anymore, uninstall it from your phone. If you need it again, you can always reinstall it quickly – but in the meantime, it won’t be tracking you around the world and around the web.
6. Keep the apps you do use up-to-date
Software companies don’t always know about all the vulnerabilities in their programs – and when they issue updates users don’t always know if they’re fixing a major problem[27] or something minor. The top piece of advice experts give is to keep your software up-to-date[28] on your computers and your mobile devices.
Having spent 2018 worrying about how hackers, corporate executives[29] and hurried programmers[30] might be trying to exploit your data and your cognitive and digital vulnerabilities, resolve to be more secure in 2019.
References
- ^ Data breaches (www.fastcompany.com)
- ^ widespread malware attacks (www.trendmicro.com)
- ^ microtargeted personalized advertising (www.nytimes.com)
- ^ so does the advice (www.cnet.com)
- ^ I’ve pulled together (scholar.google.com)
- ^ get their news primarily (www.pewresearch.org)
- ^ whims of the algorithms (theconversation.com)
- ^ only from news sources they already like (science.sciencemag.org)
- ^ unprecedented levels of partisanship and disagreement (arxiv.org)
- ^ AllSides (www.allsides.com)
- ^ Purple Feed (twitter-app.mpi-sws.org)
- ^ strength of your passwords (gizmodo.com)
- ^ reuse the same passwords (dx.doi.org)
- ^ leaked to the world (doi.org)
- ^ password manager software (theconversation.com)
- ^ writing your passwords down on paper (www.vox.com)
- ^ intercepted or spied on (www.theverge.com)
- ^ safer route (theconversation.com)
- ^ Bautsch (commons.wikimedia.org)
- ^ physical key (theconversation.com)
- ^ set up initially (www.yubico.com)
- ^ track where you are (www.nytimes.com)
- ^ very closely (theconversation.com)
- ^ share your location data (theconversation.com)
- ^ carrying a phone in your pocket (theconversation.com)
- ^ offer clues to your identity (doi.org)
- ^ fixing a major problem (www.scientificamerican.com)
- ^ keep your software up-to-date (www.usenix.org)
- ^ corporate executives (theconversation.com)
- ^ hurried programmers (theconversation.com)
Authors: Elissa Redmiles, Ph.D. Student in Computer Science, University of Maryland
Read more http://theconversation.com/clean-up-your-cyber-hygiene-6-changes-to-make-in-the-new-year-108565