Internet browser, search engine and passwords

Internet browser

A programme used to surf the internet

VULNERABILITIES

  1. Cookies

  2. Trackers

ACTION

  1. Clear your cookies every time you browse (through your browser’s Preferences > Settings)

  2. Disable and block third party cookies (Browser > Preferences/Settings > Privacy > Clear Cookies), install the add-on Privacy Badger

  3. Find out what is tracking you by running an anti-spyware tool (this can also clear cookies - See References “Advanced PC/Laptop Security” for recommended tools)

  4. Browser Extensions (see References)

  5. Use HTTPS connections whenever possible (Brave has integrated HTTPS Everywhere)

Search engine

A Search Engine is a program that uses keywords a user types into a search field (the search box) to find information on the World Wide Web

VULNERABILITIES

  1. Search history is discoverable

  2. See this full and comprehensive article on How Internet Search Engines Work

ACTION

  1. If using Google/Yahoo/Bing and other search engines turn off search personalisation (Search Tools > All Results > Verbatim)

  2. Use HTTPS

  3. Use alternative search engines that don’t track your searches, i.e. DuckDuckGo , Startpage

Passwords

A password is a string of characters used to prove identity and access approval to enter a device, website or network.

VULNERABILITIES

  1. Tracking via cell service

  2. Spyware

  3. Phishing

  4. Find My Phone apps

  5. Internet-enabled apps

  6. Tracking app

  7. Mobile (bug)

ACTION

  1. Never, ever reuse passwords across sites / services. Use a different, unique, complex generated password for each login.

  2. Use a password manager, with a strong unique password known only to you. eg. Keepass, LastPass 3.0

  3. Change your passwords regularly (monthly is recommended).

  4. Do not log-in to websites from a link in an email

  5. Do not trust emails asking for personal information, survey data, or anything else that could reveal information about you, no matter how professional they look

  6. Two-step verification (see References)

Last updated