You do not have to be a computer engineer to protect the privacy of your own information on the Internet. Currently, for hackers, it is easy to extract personal data and intercept messages that are issued from computers and mobile devices, but there are also simple options to avoid these encroachments.
Below are some tips that will protect private information, such as access codes to bank accounts, history of visited sites, Internet activity, or that will prevent users from falling into fraudulent payment platforms.
Make sure of the “https”. Web pages usually use the “HTTP” – hypertext transfer protocol – but the “https” – a secure hypertext transfer protocol – has elements that protect navigation because it encrypts the contents. This is accompanied by a lock icon and must appear on all web pages that are payment platforms; if not, the user must refrain from any financial transaction.
Program the browser to block cookies, which allow the website you are visiting to know what the user’s previous and future activity was. Each browser has its way to disable cookies, so just go to “settings” to find the option of enabling or disabling cookies.
Encrypt to protect the messages that are emitted from any platform. To encrypt chat messages and emails you can use cryptographic systems available on the network, such as Pretty Good Privacy (PGP) and Thunderbird, which are free, and you can also use Off the Record Messaging (OTR), a program that installs in the computer and encrypts the messages; Its advantage is that it can be used with Facebook, Google Hangouts, and other similar services.
It is also important to encrypt the hard drive so that those who can access the computer or mobile device cannot copy the saved files. Simply activate the option that is now included in the latest versions of Windows, Mac, iOS, and Android.
In conclusion, hackers or organizations that seek to appropriate information from cybernauts are oriented towards massive websites, so a final recommendation is that when you want to share important or confidential information with other users, in addition to taking into account these recommendations, also use traditional tools such as storage devices such as pen drives or SD memories.