{"id":4521,"date":"2018-01-26T15:15:44","date_gmt":"2018-01-26T15:15:44","guid":{"rendered":"https:\/\/www.unlockbase.com\/blog\/?p=4521"},"modified":"2018-10-31T09:26:53","modified_gmt":"2018-10-31T09:26:53","slug":"16-things-know-digital-privacy-invasion","status":"publish","type":"post","link":"https:\/\/www.unlockbase.com\/blog\/16-things-know-digital-privacy-invasion\/","title":{"rendered":"16 Things You Should Know About Digital Privacy Invasion"},"content":{"rendered":"<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4522\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/16-Things-You-Should-Know-About-Digital-Privacy-Invasion.jpg\" alt=\"16 Things You Should Know About Digital Privacy Invasion\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/16-Things-You-Should-Know-About-Digital-Privacy-Invasion.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/16-Things-You-Should-Know-About-Digital-Privacy-Invasion-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>TL;DR<\/h3>\n<ol>\n<li><a href=\"#GoogleIsCollecting\"><em>Google is collecting data about you through your phone.<\/em><\/a><\/li>\n<li><a href=\"#PhishingComes\"><em>Phishing comes in so many forms.<\/em><\/a><\/li>\n<li><a href=\"#NeverTrust\"><em>Never trust your password to anyone, not even your phone.<\/em><\/a><\/li>\n<li><a href=\"#UsePassword\"><em>Use Password Managers.<\/em><\/a><\/li>\n<li><a href=\"#ChangePassword\"><em>Change your passwords regularly.<\/em><\/a><\/li>\n<li><a href=\"#AddExtraLayer\"><em>Add an extra layer of lock to your phone.<\/em><\/a><\/li>\n<li><a href=\"#CleanBrowsers\"><em>Clean your browsers more often (than your house).<\/em><\/a><\/li>\n<li><a href=\"#DontClick\"><em>Don\u2019t just click \u201cOK\u201d or \u201cI agree\u201d absentmindedly.<\/em><\/a><\/li>\n<li><a href=\"#Employ2FA\"><em>Employ 2FA (2 Factor Authentication) for all withdrawals (and on all your online accounts).<\/em><\/a><\/li>\n<li><a href=\"#CheckFidelity\"><em>Check the fidelity of your Social Media accounts.<\/em><\/a><\/li>\n<li><a href=\"#CreateGuest\"><em>Create A Guest Wifi Network.<\/em><\/a><\/li>\n<li><a href=\"#InstallFirewall\"><em>Install a Firewall on your computer or on your home network.<\/em><\/a><\/li>\n<li><a href=\"#UseVPN\"><em>Use a VPN to hide your ass.<\/em><\/a><\/li>\n<li><a href=\"#AvoidPublicWifi\"><em>Avoid using public Wi-Fi.<\/em><\/a><\/li>\n<li><a href=\"#InstallManufacturer\"><em>Install manufacturer updates when needed.<\/em><\/a><\/li>\n<li><a href=\"#CarefullApps\"><em>Be careful with the apps you install.<\/em><\/a><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>When we think about privacy in the digital world, we all suddenly feel anxious. Are we truly safe from privacy invasion? Are our phones especially equipped to keep our bank details, emails, phone numbers, etc free from hackers and digital thieves?<\/p>\n<p>We\u2019ve heard enough stories from people who lost their money because of email phishing and of those whose private videos got exposed and never got their peace again. It\u2019s adding up to the anxiety people are burdened with nowadays, even after the extraordinary layer of security technology has to offer.<\/p>\n<p><strong>Mobile phones<\/strong> in particular, is one of the most vulnerable gadgets that is prone to hacker attacks. It gets especially hotter nowadays, since more and more people are using their mobile phones to buy things online, and even purchase products right off the shelves at <strong>Walmart<\/strong>.<\/p>\n<p>Although mobile phones have become the best boon for humankind, it could also be the source of our greatest bane. With all the threats that\u2019s going on around us, what can you do or what do you need to know to keep yourself safe when using your phone?<\/p>\n<p>Well, let\u2019s delve deeper and discover what you should know and what you can do to protect your privacy and essentially, your life.<\/p>\n<p><a name=\"GoogleIsCollecting\"><\/a><\/p>\n<h2>1. Google is collecting data about you through your phone.<\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4523\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Google-is-collecting-data-about-you-through-your-phone.jpg\" alt=\"Google is collecting data about you through your phone\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Google-is-collecting-data-about-you-through-your-phone.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Google-is-collecting-data-about-you-through-your-phone-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Did you know that you are being stalked by <strong>Google<\/strong>? <strong>Google<\/strong> knows almost everything about you. It can predict with absolute accuracy what you want to buy, what you want to search about, and even tell you where you\u2019ve been last.<\/p>\n<p><strong>Google\u2019s AI<\/strong> helps them know what ads to suggest based on your search behavior. And on your phone, there\u2019s a default <strong>Google app<\/strong> that lets them know your location so they can suggest the best restaurants, places to visit, and report accurate temperature.<\/p>\n<p>Ever since <strong>GPS<\/strong>, it was possible for anyone to follow us around or stalk without us knowing, and of course, this is a government initiative through <strong>NASA<\/strong>. Your mobile phone picks up signal from your mobile phone service provider towers and they can predict with almost perfect accuracy where you are at the moment just by using that data alone.<\/p>\n<p>By default, <strong>Android<\/strong> and <strong>iOS<\/strong> users have <strong>GPS<\/strong> trackers enabled, but there\u2019s no need to sulk, you can disable these location trackers just as easily. Here\u2019s how to stop your phone from logging your location:<\/p>\n<p>&nbsp;<\/p>\n<p>To <strong>Disable location<\/strong> reporting on <strong>Android<\/strong>:<\/p>\n<ol>\n<li>Go to <strong>Settings<\/strong><\/li>\n<li><strong>Location<\/strong><\/li>\n<li><strong>Google Location Settings<\/strong><\/li>\n<li>Switch slider off on both <strong>Location Reporting<\/strong> and <strong>Location History<\/strong><\/li>\n<li>Delete <strong>Location History <\/strong><\/li>\n<li>Repeat process on each <strong>Google Account<\/strong> on your device.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>Note that by disabling these services you are essentially limiting <strong>Google<\/strong> on suggesting information that may be of help to you. Nonetheless, you can leave <strong>Location Reporting<\/strong> on when you think you need it.\u00a0You can also block Google from seeing your location through the help of <a href=\"https:\/\/www.expressvpn.com\/vpn-software\/vpn-android\">a VPN app for Android devices<\/a> from services like ExpressVPN. This not only blocks Google, but also your ISP from seeing your location.<\/p>\n<p>&nbsp;<\/p>\n<p>To <strong>Disable location<\/strong> reporting in <strong>iOS<\/strong>:<\/p>\n<ol>\n<li>Go to <strong>Settings<\/strong><\/li>\n<li><strong>Privacy<\/strong><\/li>\n<li><strong>Location Services<\/strong><\/li>\n<li>Swipe slider off on all apps or select apps you want it disabled (e.g <strong>Google Maps<\/strong>)<\/li>\n<li><strong>System Services<\/strong><\/li>\n<li>Deny <strong>location data<\/strong> from features you want to disable it<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>Note that with <strong>iOS<\/strong> you can\u2019t erase the location history, so you have to log on to a web browser for you to do that. Choose the <strong>days<\/strong> you want to <strong>delete location history<\/strong> and you\u2019re done.<\/p>\n<p><a name=\"PhishingComes\"><\/a><\/p>\n<h2>2. Phishing comes in so many forms.<\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4524\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Phishing-comes-in-so-many-forms.jpg\" alt=\"Phishing comes in so many forms\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Phishing-comes-in-so-many-forms.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Phishing-comes-in-so-many-forms-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Bet you\u2019ve probably seen how <strong>phishing emails<\/strong> look like, and hopefully it wasn\u2019t successful on whatever its scheming to do. <strong>Email phishing<\/strong> disguises itself as a trustworthy organization aiming to gather important information from people who aren\u2019t suspecting. They can disguise to be your bank, a famous brand, <strong>Google<\/strong>, and even your phone\u2019s manufacturer!<\/p>\n<p>Even <strong>Facebook<\/strong> has had this incident and a lot of accounts in so many countries had been infected. If you suspect your computer or your phone had been infected or hacked through <strong>Facebook<\/strong> or any other website, you can run a malware scan and immediately log out from the internet.<\/p>\n<p>Unfortunately, hackers and phishers evolve fast and they are extremely creative. Nonetheless, it\u2019s easy to outsmart them if you know how they really do it. Now, take a look at these examples:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Pop-up offering quick fixes for your mobile problems.<\/strong> They can show you a result of a quick device scan and will ask you to download or install a malware that is potentially dangerous to your computer and\/or the data in it.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Email disguised to be your bank account asking for more account information.<\/strong> Your bank already has your account number, so there\u2019s no way they\u2019d ask that from you via email. Also, legitimate companies will not ask you to send your personal information through email or text.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>A Facebook message from a friend with a link.<\/strong> <strong>Facebook<\/strong> hackers have made it to your friends\u2019 inbox and if your friend unsuspectingly clicks on that link, all the person on their friends list will receive the message as well. This links will slow your computer down or install extensions on your browsers that can gather login information. You wouldn\u2019t notice they installed anything but when you login to your bank, email, or work-related sites using the infected browser, it will send the information to the hacker\u2019s server.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Emails disguised as customer complaint.<\/strong> High-level executives are the target of <strong>\u201ccustomer complaint\u201d phishers<\/strong>. They can even come up with an official-looking subpoena to make it look legitimate. More often, they are going to ask you to click a link where you will be asked to install a software so you can proceed. They can sometimes also clone your email login page where you will unsuspectingly enter your email login information to proceed.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Emails disguised as a shipping carrier asking for your personal information.<\/strong> Key here is not to provide your address or any information about you if you can\u2019t confirm you have an order with them. Most carriers don\u2019t really need to confirm shipping information because it is done by their vendor or the company where you purchase your goods from. If you are not expecting any order delivery, better to erase it right away.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Clone emails.<\/strong> As the term itself defines, this type of phishing clones or copies the exact email sent to you by a legitimate entity (<strong>e.g bank<\/strong>) and they also use an email address that looks like that of your bank. If you receive an email regarding a matter that your bank already had informed you with before, please don\u2019t click any link. Instead investigate and verify the email by searching about it. You\u2019re probably not the first to receive that email and the public have already been alerted about it.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Email from an unknown company about a freebie or a voucher you can claim by clicking a link.<\/strong> Well, it is easy to bait someone using their emotion, but remember, if the offer is too good to be true, it probably is.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Unsecured website login page.<\/strong> If you are routed to a page where you have to enter login information like username, email, pin, or passwords, always remember to check its security. Websites which as <strong>HTTPS<\/strong> and has a lock icon before the web address is safe and secure for you to enter your credentials. If on the other hand, it is only an <strong>HTTP<\/strong> or there\u2019s no lock icon, you should be concerned. Also, you can check the website\u2019s security certificate when you click on the lock icon. This helps you know how your data is protected.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Remember that phishing doesn\u2019t only use one medium of communication. It can disguise itself as an unsuspecting text message from your daughter about your credit card information, or it can be through a call. When you receive a phone call from a company <strong>XYZ<\/strong> and they are asking personal information about you (<strong>including your birthday<\/strong>) that\u2019s already one form of phishing.<\/p>\n<p>There are other ways to prevent phishing and we\u2019ll go through them in the next sections.<\/p>\n<p><a name=\"NeverTrust\"><\/a><\/p>\n<h2>3. Never trust your password to anyone, not even your phone.<\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4525\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Never-trust-your-password-to-anyone-not-even-your-phone.jpg\" alt=\"Never trust your password to anyone, not even your phone\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Never-trust-your-password-to-anyone-not-even-your-phone.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Never-trust-your-password-to-anyone-not-even-your-phone-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>As mentioned earlier, hackers and phishers have created ingenious ways to install extensions on your browsers with a single click. These extensions are triggered by certain websites, especially those where you enter login information. Although it would be easier for you to keep your passwords saved or \u201c<strong>remembered<\/strong>\u201d by your browser, it would be unsafe for you to do that.<\/p>\n<p><strong>Google Chrome,\u00a0<\/strong>for example, isn\u2019t a secure place to store your passwords. Anyone with access to your browser can keep your login credentials and save it for their own use. Although the hacker has to have physical access to your computer for them to steal your login information, you surely don\u2019t want them to discover something you want to hide or keep for yourself.<\/p>\n<p>Your phone\u2019s browsers are also flawed the same. You can keep your social media logins to yourself if you allow people to use your phone or borrow it. You can stay unsuspecting but better be safe than sorry.<\/p>\n<p><a name=\"UsePassword\"><\/a><\/p>\n<h2>4. Use Password Managers.<\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4526\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Use-Password-Managers.jpg\" alt=\"Use Password Managers\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Use-Password-Managers.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Use-Password-Managers-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>If you have way too many passwords for you to remember, you can install a password manager like <strong>Lastpass<\/strong>. You need only one master password for the software login and you can keep all of your passwords in there safe and sound.<\/p>\n<p>You can set a two-way authentication as well, so that when you login using a computer, you will need to authenticate it using your phone or another gadget of your choice. There are a lot of free password managers out there, so go get one now!<\/p>\n<p><a name=\"ChangePassword\"><\/a><\/p>\n<h2>5. Change your passwords regularly.<\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4527\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Change-your-passwords-regularly.jpg\" alt=\"Change your passwords regularly\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Change-your-passwords-regularly.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Change-your-passwords-regularly-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Talking about passwords, it is necessary that you change your passwords on a regular basis, especially for those which concern your privacy and your banking logins. Even <strong>Apple Pay<\/strong> has its own flaws, so never trust yourself enough to keep these passwords and <strong>PIN&#8217;s<\/strong> just the same for more than 6 months.<\/p>\n<p>It is advisable that you change your credit card pins on a regular basis to protect yourself from card skimming. If on the other hand, you use your phone to purchase, you need to make sure that your phone is locked enough that when someone steals it, it would be practically useless.<\/p>\n<p><a href=\"https:\/\/www.unlockbase.com\/blog\/cellphone-jailbreaking-legislation\/\"><strong>Jailbreaking a phone<\/strong><\/a> is something that even a grade-school kid can do nowadays, so to help protect yourself from this kind of disaster, you need to add an extra layer of lock to your phone which we will discuss next.<\/p>\n<p><a name=\"AddExtraLayer\"><\/a><\/p>\n<h2>6. Add an extra layer of lock to your phone.<\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4528\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Add-an-extra-layer-of-lock-to-your-phone.jpg\" alt=\"Add an extra layer of lock to your phone\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Add-an-extra-layer-of-lock-to-your-phone.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Add-an-extra-layer-of-lock-to-your-phone-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Adding an extra layer of lock or security to your phone is going to help you not only secure your phone\u2019s private data but it also prevents other people from using your information illegally.<\/p>\n<p>There are a lot of free <strong>App Locks<\/strong> you can download from <strong>Google Play<\/strong>. With an extra lock installed you can lock certain apps and programs using a <strong>6-digit PIN code<\/strong> and a simple toggle and voila, your <strong>Facebook<\/strong>, <strong>Gmail<\/strong>, or <strong>banking app<\/strong> is safe with another line of security.<\/p>\n<p>Mobile phone manufacturers understand this necessity that\u2019s why they always pack your devices with <strong>biometrics<\/strong> such as iris scanner, <strong>Face ID<\/strong>, <a href=\"https:\/\/www.unlockbase.com\/blog\/got-newest-fingerprint-screen-technology-mobile\/\"><strong>fingerprint scanner<\/strong><\/a>, etc. However, no technology is perfect and there are still flaws in the system.<\/p>\n<p>In an <a href=\"https:\/\/www.unlockbase.com\/blog\/may-critical-buy-iphone-x-holidays\/\"><strong>iPhone X<\/strong><\/a>, for example, your identical twin brother (if you have) can open your phone without any problem. In <strong>China<\/strong>, a lot of people had been in an uproar against <strong>Apple<\/strong> lately due to its racism in producing <strong>iPhone X<\/strong>.<\/p>\n<p>A woman had discovered that her son can <a href=\"https:\/\/www.unlockbase.com\/unlock-phone\/iphone\/iphone-x\/\"><strong>unlock her iPhone X<\/strong><\/a> and when she got to the store, she was told that there was a problem with the camera. She later discovered that everyone else can actually unlock her phone using their face with no problem and so was every other <strong>iPhone X<\/strong> in the store!<\/p>\n<p>This major flaw had been denied by <strong>iPhone<\/strong> and of course, they denied the accusation of being racist. This had happened <a href=\"https:\/\/www.unlockbase.com\/blog\/may-critical-buy-iphone-x-holidays\/\"><strong>a month later iPhone X was released<\/strong><\/a> in the market.<\/p>\n<p><a name=\"CleanBrowsers\"><\/a><\/p>\n<h2>7. Clean your browsers more often (than your house)<\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4531\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Clean-your-browsers-more-often-than-your-house.jpg\" alt=\"Clean your browsers more often (than your house)\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Clean-your-browsers-more-often-than-your-house.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Clean-your-browsers-more-often-than-your-house-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Cleaning your browser is as important as cleaning your house. You have to erase your browsing history once in a while if you want to keep your devices safe from hackers.<\/p>\n<p>Although there is a need for any hacker to have physical access to the device (<strong>e.g mobile phone<\/strong>), once someone breaks into your computer, they can look at the browser history and use the available data to steal information from you.<\/p>\n<p>&nbsp;<\/p>\n<p>It\u2019s easy to clean your browser. If you are using <strong>Chrome<\/strong> on your phone:<\/p>\n<ol>\n<li>Go to <strong>Chrome<\/strong> app<\/li>\n<li>Tap <strong>More History<\/strong><\/li>\n<li>Tap <strong>Clear browsing data<\/strong><\/li>\n<li>Go to <strong>Browsing history<\/strong><\/li>\n<li><strong>Uncheck<\/strong> any other boxes you don&#8217;t want to delete.<\/li>\n<li>Tap <strong>Clear data<\/strong><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>Clean your browser often and save yourself from dirty trouble in the future.<\/p>\n<p><a name=\"DontClick\"><\/a><\/p>\n<h2>8. Don\u2019t just click \u201cOK\u201dor \u201cI agree\u201d absentmindedly.<\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4532\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Don\u2019t-just-click-\u201cOK\u201dor-\u201cI-agree\u201d-absentmindedly.jpg\" alt=\"Don\u2019t just click \u201cOK\u201d or \u201cI agree\u201d absentmindedly\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Don\u2019t-just-click-\u201cOK\u201dor-\u201cI-agree\u201d-absentmindedly.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Don\u2019t-just-click-\u201cOK\u201dor-\u201cI-agree\u201d-absentmindedly-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>We all know that apps do ask \u201c<strong>permissions<\/strong>\u201d to access certain programs on your phone like your contacts, calendar, photos, messaging, notes, etc. By default, all of these programs have their boxes ticked, it\u2019s up to you to uncheck the box next to the program you don\u2019t want the app to have access with.<\/p>\n<p>Limiting the app\u2019s access isn\u2019t going to affect the performance of the app, although there will be features that are to be compromised. Nonetheless, if you don\u2019t want your <strong>Facebook<\/strong>, <strong>Messenger<\/strong>, <strong>Twitter<\/strong> or any <strong>other app<\/strong> for that matter have access to data that you think should stay private like <strong>Contacts<\/strong>, you can opt out and still be able to use them.<\/p>\n<p>&nbsp;<\/p>\n<p>If you want to <strong>limit permissions on some apps<\/strong>, here\u2019s what you need to do:<\/p>\n<ol>\n<li>Go to <strong>Settings<\/strong><\/li>\n<li><strong>Apps<\/strong><\/li>\n<li><strong>Device<\/strong><\/li>\n<li>Tap the <strong>Gear icon<\/strong><\/li>\n<li><strong>App permissions<\/strong><\/li>\n<li>Toggle slider <strong>ON<\/strong> or <strong>OFF<\/strong> on apps you want to limit access<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>In the same way, does some websites ask for permissions. If you have seen websites asking permission to \u201c<strong>give you a notification about latest updates<\/strong>\u201d or even asking to \u201c<strong>enable cookies<\/strong>&#8220;, you better read what exactly they want from you.<\/p>\n<p>By default, you shouldn\u2019t allow them to do just that, and in fact, <strong>Google<\/strong> already penalizes websites who don\u2019t let you opt out from these \u201c<strong>permissions<\/strong>&#8220;. What these \u201c<strong>cookies<\/strong>\u201d do is to observe your behaviour when in the internet so they know what ads to suggest.<\/p>\n<p><strong>Amazon<\/strong> does this and so does other e-commerce websites. <strong>Google<\/strong> also does this, however, to a much healthier extent. When the information gathered by these cookies are given to the wrong hands, you\u2019ll be spammed and the next thing you know, you\u2019ll have annoying pop-ups every now and then.<\/p>\n<p>&nbsp;<\/p>\n<p>If you are using <strong>Chrome<\/strong> on your computer, here\u2019s how you change permission on all sites you will visit:<\/p>\n<ol>\n<li>On you computer, left click on <strong>Chrome<\/strong><\/li>\n<li>Hover your mouse on the top right, click <strong>More<\/strong> (it looks like 3 bullets in a line)<\/li>\n<li>Click <strong>Settings<\/strong><\/li>\n<li>Scroll down and click <strong>Advanced<\/strong> at the bottom<\/li>\n<li>Under \u201c<strong>Privacy and Security<\/strong>\u201d click on <strong>Content Settings<\/strong><\/li>\n<li>Change the <strong>permission<\/strong> you want to update.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>If you are using <strong>Android<\/strong> or <strong>iOS<\/strong> on your gadget, here\u2019s how you get there:<\/p>\n<ol>\n<li>Open <strong>Chrome<\/strong><\/li>\n<li>On the top right, click <strong>More<\/strong> \u00a0(it looks like 3 bullets in a line)<\/li>\n<li>Hit <strong>Settings<\/strong><\/li>\n<li>Under <strong>Advanced<\/strong>, tap <strong>Content Settings (iOS)<\/strong> or <strong>Site Settings (Android)<\/strong><\/li>\n<li>Tap on the <strong>permission<\/strong> you wish to change.<\/li>\n<li>Please follow \u201c<strong>Recommended<\/strong>\u201d advise from <strong>Google Chrome<\/strong> but ideally, you would want the following to be on the corresponding mode:<\/li>\n<\/ol>\n<ul>\n<li><strong>Cookies<\/strong> &#8211; Removing some cookies may mean that <strong>you will be logged out<\/strong> from some websites)<\/li>\n<li><strong>Camera<\/strong> &#8211; Should be on \u201c<strong>Always Ask<\/strong>\u201d mode<\/li>\n<li><strong>Location<\/strong> &#8211; \u201c<strong>Ask before accessing<\/strong>\u201d<\/li>\n<li><strong>Microphone<\/strong> &#8211; \u201c<strong>Ask before accessing<\/strong>\u201d<\/li>\n<li><strong>Notifications<\/strong> &#8211; \u201c<strong>Ask before sending<\/strong>\u201d<\/li>\n<li><strong>Flash<\/strong> &#8211; \u201c<strong>Ask first<\/strong>\u201d<\/li>\n<li><strong>Pop-up&#8217;s<\/strong>&#8211; \u201c<strong>Blocked<\/strong>\u201d<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>For more information regarding <strong>Chrome<\/strong> browser settings, you can visit <a href=\"https:\/\/support.google.com\/chrome\/?hl=en\"><strong>Chrome Support<\/strong><\/a> or you can go here for the full tutorial on their support site.<\/p>\n<p><a name=\"Employ2FA\"><\/a><\/p>\n<h2>9. Employ 2FA (2 Factor Authentication) for all withdrawals (and on all your online accounts)<\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4533\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Employ-2FA-2-Factor-Authentication-for-all-withdrawals-and-on-all-your-online-accounts.jpg\" alt=\"Employ 2FA (2-Factor Authentication) for all withdrawals (and on all your online accounts)\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Employ-2FA-2-Factor-Authentication-for-all-withdrawals-and-on-all-your-online-accounts.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Employ-2FA-2-Factor-Authentication-for-all-withdrawals-and-on-all-your-online-accounts-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>One way to also add another level of security to your <strong>bank accounts<\/strong>, <strong>Paypal<\/strong>, etc. you can add a <strong>2-factor Authentication<\/strong> for all withdrawals. What this do is to provide you a notification on your phone (<strong>you bring daily<\/strong>), to authenticate and allow the withdrawal or any transaction.<\/p>\n<p>This will help you to validate and deny the transaction that\u2019s at hand. This keeps your money safe because the hacker has to have a physical access of your phone in order to do the last half of their job.<\/p>\n<p>You can add <strong>2FA on Paypal, WordPress, Evernote, Lastpass, Dropbox, Slack, Amazon, WhatsApp, and on your social media accounts.<\/strong> <a href=\"https:\/\/support.google.com\/accounts\/answer\/1066447?co=GENIE.Platform%3DAndroid&amp;hl=en\"><strong>Google Authenticator<\/strong><\/a> is one of the commonly used <strong>2FA apps<\/strong> and it supports a hostful of websites and apps that you want to have extra security. Thankfully, there\u2019s a <strong>Google Authenticator app<\/strong> for both <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.google.android.apps.authenticator2&amp;hl=en\"><strong>Android<\/strong><\/a> and <a href=\"https:\/\/itunes.apple.com\/ph\/app\/google-authenticator\/id388497605?mt=8\"><strong>Apple<\/strong><\/a>.<\/p>\n<p>It\u2019s fairly easy to get the app working. Once downloaded, install the app on your phone and sync your phone and tablet. For a full tutorial on how it\u2019s done on <strong>Android<\/strong> or <strong>iOS<\/strong>, you can go <a href=\"https:\/\/support.google.com\/accounts\/answer\/1066447?co=GENIE.Platform%3DAndroid&amp;hl=en\">here<\/a>.<\/p>\n<p><strong>Apple<\/strong> also has <strong>2-step authentication verification<\/strong> procedures that will notify you of any <strong>iCloud<\/strong> access or any app access on your <strong>iPhone<\/strong> or <strong>Mac<\/strong>. If you want to enable it, here\u2019s how:<\/p>\n<p>&nbsp;<\/p>\n<p>On <strong>iOS<\/strong>:<\/p>\n<ol>\n<li>Go to <strong>Settings<\/strong><\/li>\n<li>Sign in on <strong>iCloud<\/strong><\/li>\n<li>Tap arrow on <strong>Apple ID<\/strong><\/li>\n<li>Tap <strong>Password and Security<\/strong><\/li>\n<li>Tap <strong>Turn ON Two-factor Authentication<\/strong><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>On <strong>macOS<\/strong>:<\/p>\n<ol>\n<li>Go to <strong>System Preferences<\/strong><\/li>\n<li>Sign in on <strong>iCloud<\/strong><\/li>\n<li>Click <strong>Account details <\/strong><\/li>\n<li>Click <strong>Security <\/strong><\/li>\n<li>Click <strong>Turn ON Two-Factor Authentication<\/strong><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><strong>Microsoft<\/strong> is also on the same league, and it will add more security on your <strong>OneDrive<\/strong>, <strong>Skype<\/strong>, <strong>Xbox Live<\/strong>, etc. If you want to enable <strong>2FA<\/strong> on your, you can look at this tutorial from <a href=\"https:\/\/support.microsoft.com\/\"><strong>Microsoft Support<\/strong><\/a> for guidance.<\/p>\n<p><strong>Google<\/strong> also has a <strong>2FA<\/strong> capability and they have enabled email alerts by default so you can receive an email about new browser logins. If there\u2019s a login on a new or unrecognized device, <strong>Google<\/strong> will let you know about it via email.<\/p>\n<p><a name=\"CheckFidelity\"><\/a><\/p>\n<h2>10. Check the fidelity of your Social Media accounts.<\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4534\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Check-the-fidelity-of-your-Social-Media-accounts.jpg\" alt=\"Check the fidelity of your Social Media Accounts\" width=\"650\" height=\"582\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Check-the-fidelity-of-your-Social-Media-accounts.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Check-the-fidelity-of-your-Social-Media-accounts-300x269.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Your social media accounts are surely going to be a headache once hacked. People can steal your identity or use your private information to blackmail you. But as mentioned earlier, you can enable <strong>2FA<\/strong> on each of your social media accounts to keep them protected.<\/p>\n<p>For mobile-only app or service which do not have <strong>2FA<\/strong> capability, you can enable login verification. Also, if you have logged in any of your social media account on another gadget, you need to remove or \u201c<strong>forget<\/strong>\u201d your password on those devices. With <strong>SnapChat<\/strong>, you can do this remotely using login verification. You can also generate a <strong>Recovery Key<\/strong> or <strong>Code<\/strong> for when your mobile device is stolen to protect your social media accounts.<\/p>\n<p>&nbsp;<\/p>\n<p>On the other hand, <strong>Facebook<\/strong> also have created a way for their users to know whether their account has been hacked. If you haven\u2019t tried this trick yet, here\u2019s how:<\/p>\n<ol>\n<li>Go to <strong>Settings<\/strong><\/li>\n<li>Click <strong>Security and Login<\/strong><\/li>\n<li>Click <strong>Where You&#8217;re Logged Into<\/strong><\/li>\n<li>You will see your <strong>login history\u2019s dates, places, and device used<\/strong><\/li>\n<li>If it wasn\u2019t you, click \u201c<strong>Not You<\/strong>\u201d<\/li>\n<li>Click <strong>Secure Account<\/strong><\/li>\n<li>Click <strong>Get Started<\/strong> and <strong>Facebook<\/strong> will walk you through the rest of the steps. It includes changing your current password.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>If your <strong>Facebook<\/strong> account have been hacked you will see suspicious logins that you have not initiated. In order to prevent this from happening again in the future, you need to:<\/p>\n<ol>\n<li>Turn <strong>log in alerts<\/strong>.<\/li>\n<li><strong>Update<\/strong> your password often.<\/li>\n<li>Enable <strong>2FA<\/strong><\/li>\n<li>Choose <strong>3 to 5 friends to contact<\/strong> if your account is locked out.<\/li>\n<li>Be vigilant with <strong>friend requests<\/strong>.<\/li>\n<li>Don&#8217;t click suspicious links.<\/li>\n<li>Don\u2019t believe any emails about changing your password or about your account being hacked. You need to login to <strong>Facebook<\/strong> first to confirm this because you will receive a notification from them if it is indeed true. It\u2019s a no-no to update your password outside of the <strong>Facebook<\/strong> app or web page itself because <strong>Facebook<\/strong> will never ask you to do that.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>The same rule applies to every other social media account you have. Never assume your account is safe unless you did the extra mile of checking it. The information they can get from your <strong>Facebook<\/strong> or other social media accounts is enough to steal your peace and ruin your life.<\/p>\n<p><a name=\"CreateGuest\"><\/a><\/p>\n<h2>11. Create A Guest Wifi Network<\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4535\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Create-A-Guest-Wifi-Network.jpg\" alt=\"Create A Guest Wifi Network\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Create-A-Guest-Wifi-Network.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Create-A-Guest-Wifi-Network-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>The struggle of having a connected home is keeping everything safe from thieves. If you have a connected home network, you don\u2019t want anyone else to see or even remotely access your computer or gadget.<\/p>\n<p>This is also one reason why, it is advised that you have a \u201c<strong>Guest<\/strong>\u201d Wifi network, so if your friends want to connect to your home Wifi when you hang out, they can do so without compromising your security.<\/p>\n<p>If you have a connected home, it is important to keep all the access only to your trusted gadgets. Letting in an unauthorized mobile phone or laptop to your main Wifi network is dangerous because that means they can access your router\u2019s login page and change the settings.<\/p>\n<p>Whereas if they are connected to the guest network, they will not be able to access your router\u2019s page. Thus, a guest network strengthens your network\u2019s security.<\/p>\n<p>They can get the <strong>IP addresses<\/strong> of your home\u2019s main server where you store and share access to your important documents and data. Giving them access to your main Wifi is equal to giving them access to all of your house\u2019s connected devices.<\/p>\n<p>&nbsp;<\/p>\n<h3>How do you create a Guest Network?<\/h3>\n<p>&nbsp;<\/p>\n<p>By default, most routers nowadays is already broadcasting a guest network and the main network using unique individual passwords. \u00a0The guest Wifi network usually has a \u201c<strong>-guest<\/strong>\u201d suffix in the end. \u00a0If you want to customize it, which is recommended, you need to know how to access the router\u2019s setup page.<\/p>\n<p>First, know your <strong>router\u2019s brand name<\/strong>. The router is the device that transmits the internet connection coming from your modem into wireless signals. It\u2019s practically the source of your Wifi connection.<\/p>\n<p>There are also times when your modem and router is just one box, but if you aren\u2019t sure which is which, you can ask your internet service provider to walk you through.<\/p>\n<p>&nbsp;<\/p>\n<p>If you now know your router\u2019s brand name, you can then search how to open it\u2019s setup page, in most cases, all you need is your <strong>router\u2019s IP address<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li>Open <strong>browser<\/strong>.<\/li>\n<li>Enter your <strong>Router\u2019s IP address<\/strong>.<\/li>\n<li>Enter router\u2019s login information (<strong>username and password<\/strong>)<\/li>\n<li>Once logged in, look for the keywords <strong>Network<\/strong>, <strong>Guest Network<\/strong>, or <strong>Guest Access<\/strong> and click on it, or<\/li>\n<li>Click on \u201c<strong>Allow Guest Access<\/strong>\u201d<\/li>\n<li>Enter your preferred <strong>Wifi name<\/strong> on the <strong>SSID<\/strong> box.<\/li>\n<li>Enter your preferred <strong>Wifi password<\/strong> for your <strong>Guest<\/strong> network.<\/li>\n<li>Click <strong>OK<\/strong> or <strong>Finish<\/strong>.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>And voila! Your guest network is already setup. If you can\u2019t access your router\u2019s setup page, you might need help from your internet service provider (<strong>ISP<\/strong>) or you can call the router\u2019s manufacturer to walk you through.<\/p>\n<p>There are a lot of high-tech routers nowadays and the router that came from your <strong>ISP<\/strong> is probably outdated and don\u2019t have the guest network functionality. It is highly recommended you update it to the model that\u2019s best for your family\u2019s needs for wireless connectivity.<\/p>\n<p><a name=\"InstallFirewall\"><\/a><\/p>\n<h2>12. Install a Firewall on your computer or on your home network.<\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4536\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Install-a-Firewall-on-your-computer-or-on-your-home-network.jpg\" alt=\"Install a Firewall on your computer or on your home network\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Install-a-Firewall-on-your-computer-or-on-your-home-network.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Install-a-Firewall-on-your-computer-or-on-your-home-network-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>A firewall is one integral component to a home network. If you are using a cloud server in your home, you want that protected with a <strong>Firewall<\/strong>. A firewall can be a physical device or a software you can install.<\/p>\n<p>Your router is one good example of a firewall. When you are connected to the modem, you will be given a <strong>public IP address<\/strong> and that is the perfect ingredient towards a hacking disaster. If you are using a <strong>public IP address<\/strong> you are like going to a war without an armor and of course, and we don\u2019t want that.<\/p>\n<p>To fully arm yourself, you need a firewall or a device or a software between you and the cruel world of the internet. Instead of using a <strong>public IP address<\/strong>, you want to use a <strong>private IP address<\/strong>.<\/p>\n<p>The modem gives you a public IP address while the router in the other hand gives you a <strong>private IP address<\/strong>. With a router in between your device and the modem, hackers will not be able to get on your network and access your device.<\/p>\n<p>It would be an extra challenge for them to hack your network because they will have to be connected to your private home network first before they can get in and start doing their business.<\/p>\n<p>That being said, it takes your WiFi password for them to be able to steal information. With a well-secured router in your home, your network has better security.<\/p>\n<p>Now, on the other hand, a <strong>Firewall<\/strong> could also be a software. You can install a software on your device to prevent it from <strong>getting viruses or malwares<\/strong> that can potentially harm the data that\u2019s stored in your computer. These malwares can also be used to steal information from you and even shut your computer down.<\/p>\n<p>If you want the best security for your home network and your devices, you need to have a strong <strong>Firewall<\/strong>.<\/p>\n<p><a name=\"UseVPN\"><\/a><\/p>\n<h2>13. Use a VPN to hide your ass.<\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4537\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Use-a-VPN-to-hide-your-ass.jpg\" alt=\"Use a VPN to hide your ass\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Use-a-VPN-to-hide-your-ass.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Use-a-VPN-to-hide-your-ass-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>A <strong>VPN or a Virtual Private Network<\/strong> is a medium or a service that serves two purposes:<\/p>\n<ol>\n<li>To remotely connect to your company\/home computer<\/li>\n<li>To safely hide all of the data you transmit over the internet.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>The security that <strong>VPN<\/strong> offers is best if you want to transmit or access private information over the internet. A <strong>VPN<\/strong> encrypts all the information that you use over the internet, so that you browsing history, downloads, etc will not be visible to your internet service provider.<\/p>\n<p>If you are travelling or always on the go, you won\u2019t fear the security threat of using a <strong>public WiFi<\/strong> because you can login to your <strong>VPN<\/strong> and open your emails securely without feeling like anyone is sniffing on you. Now, you can use the internet and no one will know what you accessed, downloaded, or seen because your internet service provider will not be able to take records of them.<\/p>\n<p>You can hide your ass or your <strong>IP address<\/strong> and essentially be able to download via BitTorrent and save yourself from copyright infringement litigation. Just be sure to use a <strong>VPN<\/strong> that doesn\u2019t have <strong>Europe<\/strong>, <strong>US<\/strong>, or <strong>Canada<\/strong> as their exit points where these activities are considered illegal.<\/p>\n<p>You can also install a <strong>VPN<\/strong> on your mobile gadgets, so if you like the convenience of opening your email or your work <strong>CRM<\/strong>&#8216;s using your phone or tablet, you can freely do so securely!<\/p>\n<p>Although it used to be mainly for corporate use, a <strong>VPN<\/strong> is also a wonderful add on to your home network because of the security offers. The process is pretty straightforward as downloading an app (mobile) or a software (computer) to make it work.<\/p>\n<p>Next, sign up for the service, you can choose between a paid and a free service, although the latter will probably sacrifice a little privacy from your end as they will feed you with ads according to your browsing behaviour, which is somehow a contradiction of the purpose it serves.<\/p>\n<p>After signing up, be sure to read the <strong>EULA (End User License Agreement)<\/strong> because not all <strong>VPN<\/strong>s are created equal and you might be compromising an essential feature due to this trifling negligence. There are thousands of <strong>VPN service providers<\/strong> and choosing one can get overwhelming, but the top thing to consider is the reason why you are using it.<\/p>\n<p>If security is one of the things you are most concerned of, then getting a <strong>VPN<\/strong> should be at the top of your list.<\/p>\n<p><a name=\"AvoidPublicWifi\"><\/a><\/p>\n<h2>14. Avoid using public Wi-Fi.<\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4538\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Avoid-using-public-Wi-Fi.jpg\" alt=\"Avoid using public WiFi\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Avoid-using-public-Wi-Fi.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Avoid-using-public-Wi-Fi-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>As mentioned in the previous item, connecting to a <strong>public WiFi<\/strong> is a big <strong>no-no<\/strong> when you are trying to open your emails and even your social media accounts because this could potential put your privacy at risk.<\/p>\n<p>If you are always on-the-go or can\u2019t afford the cost of your postpaid service provider you can always have a <strong>VPN<\/strong> installed so you can keep yourself secured while on a <strong>public WiFi<\/strong>. You can\u2019t expect for the speed to be fast though, as <strong>VPN<\/strong> connection uses a lot of data on encrypting your searches and may result to lower speeds.<\/p>\n<p>Also, being on <strong>public WiFi<\/strong> means you are trusting the owner whatever information they get from your internet browsing data. If you have trust issues, don\u2019t get yourself on a <strong>public WiFi<\/strong>.<\/p>\n<p>Another alternative is to bring an <strong>unlocked portable WiFi hotspot<\/strong> which allows you to insert and use any sim from every country all over the globe. With your <strong>WiFi hotspot<\/strong>, you don\u2019t need to connect to an unsecured public WiFi plus you can connect multiple devices and surf simultaneously on all these devices.<\/p>\n<p><a name=\"InstallManufacturer\"><\/a><\/p>\n<h2>15. Install manufacturer updates when needed.<\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4539\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Install-manufacturer-updates-when-needed.jpg\" alt=\"Install manufacturer updates when needed\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Install-manufacturer-updates-when-needed.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Install-manufacturer-updates-when-needed-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Alright, this is one thing that is pretty much done by your phone or computer automatically, however it\u2019s not always like that. For instance, your gadget is probably going to ask your permission to install any updates where you can do later.<\/p>\n<p>Every persistent hacker out there will always find a hole out of every software update and this is why manufacturers continue to produce update even after their flagship is out of the stores. <strong>Apple<\/strong> has been consistent in giving software updates for their phones however, <strong>Android manufacturers<\/strong> had been notoriously called out because they seem to stop giving updates after a new phone is launched. That doesn\u2019t essentially mean <strong>Android<\/strong> is less secure than <strong>Apple<\/strong>, but the assurance of a consistent software update even after 2 years of purchase should be a part of your buying conditions.<\/p>\n<p><a name=\"CarefullApps\"><\/a><\/p>\n<h2>16. Be careful with the apps you install.<\/h2>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4540\" src=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Be-careful-with-the-apps-you-install.jpg\" alt=\"Be careful with the apps you install\" width=\"650\" height=\"488\" srcset=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/Be-careful-with-the-apps-you-install.jpg 650w, https:\/\/www.unlockbase.com\/blog\/wp-content\/Be-careful-with-the-apps-you-install-300x225.jpg 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Never ever download an app that is outside the <strong>official App Store<\/strong> or <strong>Google Play<\/strong> and that means you should only install apps from these places.<\/p>\n<p>As mentioned in the earlier segment, apps ask permissions to get access to your mobile\u2019s data, if you absentmindedly allow these apps to access anything they want to have access to, you just got yourself in to trouble.<\/p>\n<p>The apps you download outside of the <strong>official Android<\/strong> and <strong>Apple stores<\/strong> are not tested by the software developers for security and they could potentially harm the data on your mobile by installing malwares or stealing vital information from it such as your contacts and calendar. It can even hack your email.<\/p>\n<p>Stay away from sketchy app stores which offer apps you don\u2019t see on the official app stores.<\/p>\n<p>&nbsp;<\/p>\n<h2>Takeaway<\/h2>\n<p>&nbsp;<\/p>\n<p>That was a whole lot of information about getting yourself safe in the internet both on mobile and on a computer, but the most important thing there is to remember is to always be vigilant and suspicious of everything you do online.<\/p>\n<p>Be suspicious about the link, be very careful when you download, be vigilant when you grant app permissions, and be wary of suspicious websites. As the golden rule of thumb says, you\u2019re better safe than sorry.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; TL;DR Google is collecting data about you through your phone. Phishing comes in so many forms. Never trust your password to anyone, not even your phone. Use Password Managers. Change your passwords regularly. Add an extra layer of lock to your phone. Clean your browsers more often (than your house). Don\u2019t just click \u201cOK\u201d [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[146,67],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>16 Things You Should Know About Digital Privacy Invasion<\/title>\n<meta name=\"description\" content=\"Conscious about your privacy in the digital world? Discover what you should know and what you can do to protect your privacy and essentially, your life. We&#039;ve compiled 16 things you should know about digital privacy invasion.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.unlockbase.com\/blog\/16-things-know-digital-privacy-invasion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"16 Things You Should Know About Digital Privacy Invasion\" \/>\n<meta property=\"og:description\" content=\"Conscious about your privacy in the digital world? Discover what you should know and what you can do to protect your privacy and essentially, your life. We&#039;ve compiled 16 things you should know about digital privacy invasion.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.unlockbase.com\/blog\/16-things-know-digital-privacy-invasion\/\" \/>\n<meta property=\"og:site_name\" content=\"UnlockBase\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/UnlockBase\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-26T15:15:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-10-31T09:26:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.unlockbase.com\/blog\/wp-content\/16-Things-You-Should-Know-About-Digital-Privacy-Invasion.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@unlockbase\" \/>\n<meta name=\"twitter:site\" content=\"@unlockbase\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"27 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.unlockbase.com\/blog\/16-things-know-digital-privacy-invasion\/\",\"url\":\"https:\/\/www.unlockbase.com\/blog\/16-things-know-digital-privacy-invasion\/\",\"name\":\"16 Things You Should Know About Digital Privacy Invasion\",\"isPartOf\":{\"@id\":\"https:\/\/www.unlockbase.com\/blog\/#website\"},\"datePublished\":\"2018-01-26T15:15:44+00:00\",\"dateModified\":\"2018-10-31T09:26:53+00:00\",\"author\":{\"@id\":\"https:\/\/www.unlockbase.com\/blog\/#\/schema\/person\/1725f43660c571701eeaa9a3af27c991\"},\"description\":\"Conscious about your privacy in the digital world? Discover what you should know and what you can do to protect your privacy and essentially, your life. We've compiled 16 things you should know about digital privacy invasion.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.unlockbase.com\/blog\/16-things-know-digital-privacy-invasion\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.unlockbase.com\/blog\/16-things-know-digital-privacy-invasion\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.unlockbase.com\/blog\/16-things-know-digital-privacy-invasion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.unlockbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"16 Things You Should Know About Digital Privacy Invasion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.unlockbase.com\/blog\/#website\",\"url\":\"https:\/\/www.unlockbase.com\/blog\/\",\"name\":\"UnlockBase\",\"description\":\"Latest news &amp; update about UnlockBase.com server !\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.unlockbase.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.unlockbase.com\/blog\/#\/schema\/person\/1725f43660c571701eeaa9a3af27c991\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.unlockbase.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/298378872d33cd901f728453ee208fe0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/298378872d33cd901f728453ee208fe0?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/twitter.com\/unlockbase\"],\"url\":\"https:\/\/www.unlockbase.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"16 Things You Should Know About Digital Privacy Invasion","description":"Conscious about your privacy in the digital world? Discover what you should know and what you can do to protect your privacy and essentially, your life. We've compiled 16 things you should know about digital privacy invasion.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.unlockbase.com\/blog\/16-things-know-digital-privacy-invasion\/","og_locale":"en_US","og_type":"article","og_title":"16 Things You Should Know About Digital Privacy Invasion","og_description":"Conscious about your privacy in the digital world? Discover what you should know and what you can do to protect your privacy and essentially, your life. We've compiled 16 things you should know about digital privacy invasion.","og_url":"https:\/\/www.unlockbase.com\/blog\/16-things-know-digital-privacy-invasion\/","og_site_name":"UnlockBase","article_publisher":"https:\/\/www.facebook.com\/UnlockBase\/","article_published_time":"2018-01-26T15:15:44+00:00","article_modified_time":"2018-10-31T09:26:53+00:00","og_image":[{"url":"https:\/\/www.unlockbase.com\/blog\/wp-content\/16-Things-You-Should-Know-About-Digital-Privacy-Invasion.jpg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@unlockbase","twitter_site":"@unlockbase","twitter_misc":{"Written by":"admin","Est. reading time":"27 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.unlockbase.com\/blog\/16-things-know-digital-privacy-invasion\/","url":"https:\/\/www.unlockbase.com\/blog\/16-things-know-digital-privacy-invasion\/","name":"16 Things You Should Know About Digital Privacy Invasion","isPartOf":{"@id":"https:\/\/www.unlockbase.com\/blog\/#website"},"datePublished":"2018-01-26T15:15:44+00:00","dateModified":"2018-10-31T09:26:53+00:00","author":{"@id":"https:\/\/www.unlockbase.com\/blog\/#\/schema\/person\/1725f43660c571701eeaa9a3af27c991"},"description":"Conscious about your privacy in the digital world? Discover what you should know and what you can do to protect your privacy and essentially, your life. We've compiled 16 things you should know about digital privacy invasion.","breadcrumb":{"@id":"https:\/\/www.unlockbase.com\/blog\/16-things-know-digital-privacy-invasion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.unlockbase.com\/blog\/16-things-know-digital-privacy-invasion\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.unlockbase.com\/blog\/16-things-know-digital-privacy-invasion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.unlockbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"16 Things You Should Know About Digital Privacy Invasion"}]},{"@type":"WebSite","@id":"https:\/\/www.unlockbase.com\/blog\/#website","url":"https:\/\/www.unlockbase.com\/blog\/","name":"UnlockBase","description":"Latest news &amp; update about UnlockBase.com server !","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.unlockbase.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.unlockbase.com\/blog\/#\/schema\/person\/1725f43660c571701eeaa9a3af27c991","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.unlockbase.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/298378872d33cd901f728453ee208fe0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/298378872d33cd901f728453ee208fe0?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/twitter.com\/unlockbase"],"url":"https:\/\/www.unlockbase.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/posts\/4521"}],"collection":[{"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/comments?post=4521"}],"version-history":[{"count":15,"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/posts\/4521\/revisions"}],"predecessor-version":[{"id":5265,"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/posts\/4521\/revisions\/5265"}],"wp:attachment":[{"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/media?parent=4521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/categories?post=4521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.unlockbase.com\/blog\/wp-json\/wp\/v2\/tags?post=4521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}