Expert Tips and Tools You Can Use to Safeguard Your Privacy Online

Expert Tips and Tools You Can Use to Safeguard Your Privacy Online  by Mike Peterson.  Available from <https://www.idropnews.com/how-to/how-to-remain-private-or-anonymous-online/28441/> [December 23, 2016]

As we’ve become more and more reliant on devices and the internet in our day-to-day lives, the more of our data and information has been uploaded to the web. Not only that, but many of us rely on the internet for work or play — and internet security is essential to that. Whether you’re worried about nefarious hackers, government spying, or nosy advertisers, you can help protect your data by following a few easy steps and using a few different (and free) tools.

Here are the cybersecurity essentials — used by everyone from security experts to journalists — to get you started.

Ground Rules

If you’re worried about privacy and protecting your information, you can follow some simple rules to make sure you have a head start against any would-be spies.

First, use a strong password. The best kind of password doesn’t contain words or fragments, but rather a random assortment of letters, numbers and special characters. You can also use a password manager like LastPass, Password Safe, or KeePass. 1Password is a popular option for iOS. Additionally, don’t use the same password across all of your accounts.

Next, make sure not to over-share information on social media. You really don’t need your phone number, email address or birth dates readily accessible to the public, do you?

Set up a Google alert for your name, so you can keep tabs on how your identity is being perceived or used without your consent. Don’t like advertisers gathering information about you? Use a non-tracking search engine like DuckDuckGo.

Lastly, try to enable two-factor authentication whenever you can. In that case, your accounts will have an extra layer of security even if your passwords become compromised.

Message Safer

There are many options when it comes to encrypted messaging services, but two of the best are WhatsApp and Signal.

WhatsApp is a popular messaging app, and it might be one that you already use. But what you might not know is that WhatsApp actually features end-to-end encryption: the messages you send are scrambled, ensuring that only you and the recipient have the key needed to read them.

Signal is another excellent choice, and is popular among journalist and security experts. Along with end-to-end encryption, it also features disappearing messages — meaning that there will be no record of the conversation after the messages expire.

Signal is arguably better encrypted, but a messaging app is only useful if you use it — and you probably have more friends on WhatsApp.

Get a Secure Email Client

If you’re worried about various entities reading your email, you should look into Proton. It’s a free, secure email client based in Switzerland — meaning that it falls under Swiss, rather than American, privacy laws. That means the U.S. government can’t force Proton to give up your data. Forbes famously called it “the only email system NSA can’t access.

All emails sent through the service are end-to-end encrypted, and the client never logs your IP address. Besides a browser-based version, the service also has an Android and iOS app so you can take your secure emails on-the-go.

Some other options are Tutanota and KolabNow. Both are open-source and free-to-use. For something a bit more feature-packed, Berlin-based Posteo.de is held in very high regard among security experts. It doesn’t ask for any information when you sign up, it features two-factor authentication, and it allows you to pay others anonymously. Unfortunately, it’s not free.

Download TOR

If you’re serious about encrypting your online activities on your computer, there’s The Onion Router, also known as the TOR project.

TOR Browser is a lightweight program, available to download for both PC and Mac, that obscures your online browsing via a proxy network. When you use TOR, your computer doesn’t directly access a site — the program sends your request through various servers spread across the world. That way, the site you’re accessing never actually sees your IP address.

Of course, this security doesn’t work if you’re accessing a site that asks for login or other personal information — like Facebook or other account-based services. While your computer and IP address might be anonymous, TOR doesn’t hide the specific, possibly compromising activities that could give your identity away.

Use a VPN

A VPN works by extending a private network over the public connections we use daily. VPNs use a series of discrete networks or computers to secure and encrypt communication when using the internet. A user logging into a VPN would typically access it via a client/browser window, log-in with special credentials (really similar to how you’d log into your email) and voila — once inside the VPN, the user is secure from any eavesdropping or spying.

Any time you’re doing something on the internet, you’re exchanging and sending data to another source. A VPN ensures that each time you do so, all the data that’s being sent from your end is encrypted, and safe from people seeking to steal it. Learn more about VPNs and some of the best VPN services available, here.

Additional Considerations

Even with using privacy services like TOR, some of your DNS traffic might still leak through, potentially compromising your anonymity. To find and plug those leaks, you can use DNSLeakTest.com.

Similarly, you can see just how much information your computer web browser is giving away by going to BrowserLeaks.com or Panopticlick. You can take notes and additional steps to plug those leaks, too — like turning off cookies and disabling site tracking.

Many apps on the iPhone use location services — while this can be great for remembering exactly where you took that iPhone picture, it also means that your data might have scarily specific locations attached to them. For example, the Exif data embedded into your bathroom selfie can potentially let attackers know exactly where you live. Paranoid? Just turn off location services for any or all apps via Settings > Privacy > Location Services.

Expert Tips and Tools You Can Use to Safeguard Your Privacy Online  by Mike Peterson.  Available from <https://www.idropnews.com/how-to/how-to-remain-private-or-anonymous-online/28441/> [December 23, 2016]

10 Small Business Website Errors That Drive Customers Away

10 Small Business Website Errors That Drive Customers Away by Brad Shorr.  Available from <http://www.forbes.com/sites/allbusiness/2016/12/18/10-small-business-website-errors-that-drive-customers-away/#593f057c4611> []

Visitors seldom leave a small business website with a neutral impression. For most prospects, your small business is an unknown quantity, so their first impression of your company will either make them more comfortable doing business with you or less comfortable. For this reason, you want their first experience with your website to inspire them to contact you—not your competitor.

These are the 10 biggest website problems that can drive potential new business away:

1. “Look at Me” Content

If you think burying prospects under a mountain of features, benefits, and self-praise will convince prospects to buy from you, think again. Information dumps and inwardly focused website content are big turnoffs. Website visitors want to know what’s in it for them, and they want to know quickly. Always write from the prospect’s point of view, and keep it at a high level.

2. Blurry Branding

Many small businesses try to communicate excellence in everything: “We’re the best,” “we’re the cheapest,” “we’re the most innovative,” etc. All this does is confuse prospects or make them think you’re mediocre at everything. Like big, successful brands, try to be known for one thing, and hammer that point home. Think about Apple: It does lots of things well, but most people are attracted to its products because of its design excellence. What differentiates your company in a meaningful way? That’s your brand.

3. No Credibility Elements

As I mentioned earlier, many small businesses can be unknown quantities. To overcome buyer skepticism, you must have powerful credibility elements on your website. The most impressive types are customer testimonials; BBB and other well-known accreditations; and statistics about your number of customers, volume of sales, and other pertinent data that makes your company look big, growing, and successful. Without credibility elements, website visitors have only your marketing propaganda to go by, and that won’t be enough.

4. Clumsy Contact Options

If your website doesn’t make it easy for visitors to contact you, they won’t. Small business websites frequently lack easy-to-use contact forms, and many don’t even display a phone number. Clumsy contact options can drive site visitors crazy. Good contact forms have only a few required fields and include a privacy statement to reassure prospects you won’t sell or give away their email address. It’s also imperative to send prospects a confirmation email after they submit a form.

5. Poor SEO Structure

Because your small business is not a household name, you need customers to be able to find you in Google search results when they are looking for the products or services you offer, but don’t yet know that you exist. Many small business websites are poorly structured for SEO, making it difficult or impossible for Google crawlers to understand the content and rank it accordingly. The result? You are invisible in Google searches, a deficiency that over time could cost your business hundreds or thousands of sales leads or online orders.

6. Using Stock Photography

Small businesses are usually on a tight budget, so using stock photography is a tempting way to cut costs on website design. Big mistake. This isn’t 2002; prospects have seen thousands of websites and have likely seen your stock photos a hundred times. Stock photography conveys a lack of imagination, a company that is going through the motions and presenting a false image. It should be called “schlock photography.” Instead, spend a few hundred dollars on a professional photographer to take interior/exterior building shots, headshots of personnel, and useful photos of products. It will make your company feel real and add credibility in a big way.

7. Typos

Website copy must be free of grammatical errors, spelling errors, vague statements, and other defects that tell customers your company doesn’t pay attention to details, lacks sophistication, and is content to do the job halfway. Few businesses have professional writers on staff, but they are easily found online, as are editors. Skilled freelancers are affordable, and can transform negative-impact content into content that prospects find irresistible. Obviously well worth the investment!

8. Confusing Navigation

Creating user-friendly website navigation is far more complex and nuanced than meets the eye. Strong navigation is intuitive and simple, and makes it easy for visitors to quickly find what they need and get back to where they were. Small businesses often botch the job by having too many navigation labels in the header, using non-intuitive text for their labels (e.g., “People” versus “About Us”), failing to use sidebar and/or breadcrumb navigation to supplement top-level navigation. A lot of navigation issues can be corrected by observing actual users explore your website.

9. Not Showing Your Work

Small business websites that talk in generalities are not going to persuade visitors that you can deliver the goods. To build credibility and also provide insight about how you get results, make sure your website has detailed case studies, a portfolio with brief narratives and images of successful projects, and/or data showing specifically how you helped customers save money, improve throughput, or whatever else it is you do that makes your products and services valuable. Unfortunately, a lot of small companies try to shortcut the website work, and fail to provide this type of information, which is often right under their noses.

10. No Mobile-Friendly Website

This last point is probably the most important of all. Today, more people access the Internet from mobile devices than from desktop computers. If your website is not mobile-friendly, you are writing off half your potential audience—maybe a lot more depending on your business. Beyond that, a mobile-unfriendly website hurts SEO, and is likely to hurt it a lot more in the coming years. The best mobile option is usually to have a responsive design, making your website adjust automatically for optimum display on any size screen.

Avoid these 10 errors and you can transform your website into a lead- and revenue-generating machine. Plus, because so many small businesses fall into these traps, by avoiding them you will give yourself a substantial competitive advantage and get more than your fair share of business from online sources. That alone will add value to your company.

10 Small Business Website Errors That Drive Customers Away by Brad Shorr.  Available from <http://www.forbes.com/sites/allbusiness/2016/12/18/10-small-business-website-errors-that-drive-customers-away/#593f057c4611> []

Protecting Your Online Presence with 3 Simple Tips

Protecting Your Online Presence with 3 Simple Tips by Carolina.  Available from <https://www.hackread.com/protecting-your-online-presence-with-3-simple-tips/> [Dec 19, 2016]

It is safe to say that over 80% of our lives are now stored in the cloud. Work and study are now conducted online. Universities such as Bradley University are making it possible to pursue an FNP degree of your choice without leaving the comfort of your home. Unfortunately, there has been a lot of cases of identity and information theft over the past few months. As we get closer to the end of 2016, information security becomes more important than ever.

Go through our How-To section here at HackRead and you will find a lot of tips and tricks on how to protect your online presence. In this article, we’re going to review some more tips that will help you work and study online without having to worry about your information getting stolen.

Have a Trusted Computer

One of the easiest ways to minimize the risks of information theft is by accessing your office network or the online learning program’s platform using a computer you can trust. This can be your own laptop or desktop computer that only you can use.

Take proper steps to add security measures to the laptop. An up-to-date antivirus, firewall software and good user management are all that you need to get started. When you access the family nurse practitioner course you’re taking online, for instance, you don’t have to worry about other users stealing your login info.

Write It Down

Do you know that you’re more likely to have your password stolen online than when it is written down in a notebook and stored at home? Writing down passwords actually enables you to have different passwords for different accounts, which means you can secure your online presence further without a problem.

Work out a way to write down passwords without actually mentioning the account they are for. For example, you can use initials to mark which passwords are for which accounts. Keep the note safe by storing it in a locked drawer or another safe place around the house.

You should also consider using a tested-and-tried password management software. 1-Password and similar software can help you store passwords for multiple accounts safely. Even better, these apps can also suggest a strong password for your accounts by generating random strings you can use in one click.

Test Your Security Questions

One last weak link to fix is the password recovery option you use on different accounts. We often choose security questions that are easy to remember. Unfortunately, most of the security questions – and their answers – are about things that information thieves can also find online.

The name of your first dog may be posted on your Instagram or Twitter account. Your story about that visit to your aunt’s house may reveal her name and the answer to another security question. Your favorite teacher at high school and other common security questions are just as easy to guess or figure out.

Switch to a security question only you can answer, apply the previous tips we’ve covered in this article, and be sure to stay up to date with the latest security tips here on HackRead.

Protecting Your Online Presence with 3 Simple Tips by Carolina.  Available from <https://www.hackread.com/protecting-your-online-presence-with-3-simple-tips/> [Dec 19, 2016]

How to secure your digital transactions

How to secure your digital transactions by Abhijit Ahaskar.  Available from <http://www.livemint.com/Leisure/eAqnDAFMqB4Vfxe7yyOfgO/How-to-secure-your-digital-transactions.html> [Last Modified: Mon, Dec 19 2016. 06 16 PM IST]

Demonetisation and the subsequent cash crunch has compelled people to use their debit or credit cards. Many are using payment wallets such as FreeCharge and Paytm to avoid using their cards all the time. Many of these first-time users are not fully aware of what is secure and what is not. This makes them an easy prey for hackers and people with malicious intent. According to Norton’s Cyber Security Insights Report (published in November 2016), 55% of users born between 1980 and 2000 have been victims of cyber crime.

Here are some tips that you can keep in mind if you are using one of the digital platforms for making your next cash transaction.

Be more cautious with public WiFi networks

Easy and fast access to internet through public WiFi networks such as at railway stations, airports and coffee shops attracts many users. Users need to keep a few things in mind before connecting to any public WiFi network. One of them is to make sure you know the right SSID (service set identifier) name of the WiFi network you are connecting to. Hackers often set up WiFi network with almost similar SSID names making users believe that there are two such networks and they can connect to any of them. Any communication made using such dubious networks will be at risk of malicious activity. It is safer to avoid WiFi networks that are not protected by a password.

Use VPN

Using a Virtual Private Network (VPN) not just sidesteps geographical restrictions on online content but can also add a layer of security to your online communications. It is widely used as a tool to secure web browsing sessions by enterprise as well as individual users. You can add a VPN on your smartphone or your WiFi network at home. For a smartphone, you will have to downloaded and install a VPN app. Most VPN apps charge a monthly subscription, while some like Opera VPN are completely free to use. Deploying a VPN in wireless router will transmit all online communication through an encrypted tunnel created by the VPN.

Use OTP during transactions

During online transactions made using a credit or debit card, banks ask users to enter their 3D secure PIN (personal identification number) or request for an OTP (one-time password). Using the latter will prompt the bank to send a six-digit number through a text message on the user’s registered mobile number. This is a unique number and is generated only for one transaction. Using a 3D secure PIN on a public WiFi can be risky. Paying through an OTP is still a safer option.

Identify secure webpages

Most websites rely on certain security protocols such as HTTPS (Hyper Text Transfer Protocol Secure) to protect users and keep their transactions secure. These websites can be identified with a green sticker and through the browser url, where the link address will start with https instead of http or www.

Alternative to online transactions—Use NUPP for transaction

Another way of bypassing the risk of online fraud during transactions is using National Unified USSD Platform (NUPP) for sending money directly to the other person’s bank account. NUPP is based on USSD (Unstructured Supplementary Service Data) technology which uses GSM networks for communication with the user and the bank and this makes it free from the risk of online hacking. To use it, dial *99# in your phone and enter and type the three letters used to identify your bank or the IFSC (Indian Financial System Code) of your bank in the next pop-up page. This will open another page with options to pay using MMID (Mobile Money Identification Number) or IFSC.

If you are paying through MMID, enter the seven-digit MMID code and the beneficiary’s mobile number. In case you are using the IFSC, enter the IFSC code and the bank account number of the beneficiary and the amount that you are paying. To complete the transaction, you will be asked to enter your four-digit mobile banking PIN number issued by your bank. For every transaction, users will be charged a nominal fee of 50 paise.

How to secure your digital transactions by Abhijit Ahaskar.  Available from <http://www.livemint.com/Leisure/eAqnDAFMqB4Vfxe7yyOfgO/How-to-secure-your-digital-transactions.html> [Last Modified: Mon, Dec 19 2016. 06 16 PM IST]

Top 12 Tips for staying safe online

Top 12 Tips for staying safe online by Kuwait Times.  Available from <https://www.zawya.com/mena/en/story/Top_twelve_tips_for_staying_safe_online-ZAWYA20161215052009/> [14 December 2016]

As the popularity of online shopping increases in Kuwait, so does the likelihood of falling foul of cyber crooks, not necessarily because they are putting in extra effort during the festive season, but simply because more of us are doing more online shopping at this time of the year, and we’re on the lookout for the hottest deals.

Sophos has put together the following cyber security tips to help you focus on family, food and fun over during this season, rather than dealing with the headache of stolen credit card details or important documents lost to ransom ware.

1) Clean up your passwords before you start shopping
Don’t use the same password on more than one website. If the crooks get one password, they’ll immediately try it on all your other accounts. Make your passwords as long and complex as you can; in fact, consider using a password manager, which will come up with a unique password for each website automatically.

2) Update your devices
When patches come out, most of them fix security holes that the crooks either already know about or will find out about soon. Don’t put off security updates because “later will be fine”. Follow our advice: patch early, patch often.

3) Back up your files
Whether you’re taking your laptop on holiday, or staying at home with your faithful desktop this festive season, don’t forget to back up your precious documents on all of your devices. That way if your files are lost, stolen, “reconfigured” by a teenaged “expert”, or, worst of all, held for extortion by ransom ware, you can still get your data back.

4) Watch out for booby-trapped ATMs when shopping on the High Street
Watch out for modified ATMs when you withdraw money. Crooks often glue fake parts onto or around ATMs in the hope of covertly reading both your card data and your PIN. If you see an ATM with any components that look as though they don’t belong, report it to the bank and the police. That way you protect yourself and everyone else too.

5) Beware of login links in emails
With so many emails flying around over the festive shopping period, it’s a popular time for cyber crooks to use fake ‘phishing’ emails to trick you into handing over personal data. When an email urges you to click on a link to login to your account and change your password, or some similar sort of subterfuge, it’s probably crooks trying to trick you onto a fake site that will look exactly like the real thing, except that the crooks get your password, not the real website. If you want to check a transaction on one of your accounts, open your browser and browse to the website yourself.

6) Look for the padlock in the URL bar when shopping online
A padlock in the address bar and a URL that starts with “HTTPS” means the website uses an encrypted or secure connection. All major websites, not just financial institutions, use HTTPS these days, so if you see a site that’s asking for personal information but doesn’t have the padlock, you can be sure it’s a fake.

7) Watch out for bogus courier emails
During this time, you may very well get products delivered to your home, so you’ll be expecting a visit from a courier company. Crooks know this and send fake emails about bogus delivery problems, hoping to draw you into their web. If you want to contact a courier company to check on a delivery, look up their phone number or email address yourself – don’t use any links or information from an email.

8) Don’t email your credit card details
Sometimes you’ll try to buy that special gift , but your credit card won’t go through. In perfectly good faith, the seller may ask you to email through your card details to try again later. But that email could end up in the hands of cyber crooks, even if the seller handles it with care once they’ve received it. Remember: if in doubt, don’t give it out!

9) Turn off Flash on your devices
Want to do one single, simple thing to improve your security, now and forever? Turn off Flash, or uninstall it altogether if you can. Booby-trapped Flash files are still a popular way of spreading malware, and with fewer and fewer sites actually requiring Flash, it’s safer to do without it altogether.

10) Change default passwords before using any new home video devices
Whether it’s a new baby monitor, home surveillance system, or any other internet-enabled camera, it probably has a default password. If you don’t change the password then you are making it easy for a cybercriminal to hack in and watch whatever you’re filming. That could be you, your house, your baby, or something else that you’d prefer to keep away from prying eyes.

11) Think before you share on social media
Maybe it sounds obvious, but over sharing on social media is a bad idea, and there is no better time to remind you of this than the party season. Whether it’s photos of other people, your credit card details, the fact that you’re holding a really amazing party on Friday night or anything else, stop and think before you share. Once you post it, you’ll never be able to take it back.

12) Upgrade the software on any new devices before using them
Even “new” computers and hardware devices usually need updates right away. After all, between when they were made and when you first use them, the crooks have had time to find new security holes to attack. If you want to protect your new devices, always patch before using them, even if it’s Christmas Day and you’re dying to try out your brand new present.

Finally, make sure your computers at home are secure. Sophos Home is free and allows you to protect up to 10 Windows and Mac computers from malware, ransom ware, phishing and more. You can have different settings for adults and kids, and the web filter lets you block ads. It’s an easy-to-use solution that takes minutes to download and get started. And remember, when 2017 comes around, all of these tips will still be valid. In other words, as much as we’re urging you not to let your computer security guard down over the festive season, we’re also encouraging you to keep your security guard up every day. Cyber security is for life, not just for this season.

Top 12 Tips for staying safe online by Kuwait Times.  Available from <https://www.zawya.com/mena/en/story/Top_twelve_tips_for_staying_safe_online-ZAWYA20161215052009/> [14 December 2016]