The daily use of the Internet, with its immeasurable possibilities, has created a false sense of security and anonymity among all users. However, it is questionable whether such internet privacy really exists when ICT is used.
The truth is that, under the cloak of free, numerous and important interests are camouflaged by companies, individuals and even governments, of which there are well-known examples like this. Therefore, every precaution is little when it comes to ensuring your own security on the Internet, since privacy is the currency of exchange in almost all the services that can be found on the network.
Personal data, the most precious treasure on the Internet
Indeed, from the moment you access a website, you are accepting that the website in question begins to handle multiple personal data. Although it is true that these cookies are necessary for certain functionalities, such as sharing content on social networks, making use of the help chat, etc., it is no less true that with these data the company will be able to guide its commercial strategy towards its users.
But, what are the data that the websites register when they are accessed? The program most used for its reliability and for the functionalities of its free version is Google Analytics. This program can collect data of various kinds, such as location, searches through which a site has been reached, the device from which you are browsing, the operating system, the pages that are being viewed from the same website and others. data such as the sex and estimated age of the user.
However, the greatest danger to the internet privacy of the user is found in the data itself that it provides itself. Thus, from the data provided on social networks in an absolutely natural way, to the data that some companies like Microsoft request for “scientific” purposes, such as those mentioned here, it is the user who gives away the most precious asset that one can possess on the Internet privacy.
How to safeguard the security of your own privacy in the virtual environment
To guarantee the security and privacy of users, nothing better than following the advice of one of the cyber security company Panda Security. In its decalogue for the security of the Internet user, it includes a series of basic recommendations for the protection of our data:
- Never open electronic messages of unknown origin.
- Never provide your personal data or any type of access codes.
- Never open files from unknown senders.
- Do not write down your passwords in any document, or share them with other users.
- Short or easily deduced passwords should not be used. Do not use the same passwords in High Security Systems (Banks, University) as in less secure Systems.
- There is no need to respond to messages that request information urgently. The STIC or your bank will never request any personal data from you electronically.
- You must have the UAL antivirus software installed on your computer. (For PAS and PDI)
- It is convenient to install anti-spyware to avoid Spyware.
- Keep updated with the different patches or security updates both the operating system of your computer and your Internet browser.
- Make backups regularly to avoid losing important data.
- It is highly recommended to keep your computer frozen (except for security updates) using the computer freeze software provided by STIC (DeepFreeze).