How to Protect Yourself from Information Technology? Building Your “Digital Fortress”

The security system is built. But there are still programs that actively interact with the network. We'll configure them. Nothing complicated or unnecessary, just common sense; you'll figure out the nuances yourself. The main thing is to get started.

Two-factor authentication is an important place to start.

Many services (from email accounts to banks) offer users two-factor authentication. For example, with confirmation via a code sent via SMS to a phone. Using 2FA reduces the risk of hacking to virtually zero.

In this case, you can use a phone number other than the one commonly known. This is another security feature.

Configuring programs that actively work with the Network

Browsers

Our goal is to prevent any information from being collected about you. To do this, please configure your browser for secure operation (FireFox and other browsers designed to protect your privacy).

Set up automatic deletion of cookies after closing your browser (files that are saved on your computer and then allow you to “recognize you”), and disable the ability of websites to track you (so-called “trackers” that allow you to track your movements on the Internet).

You can choose the option that suits you best. Your task is to find the right balance between security and ease of use.

Please note that your browser works in tandem with a VPN service, maintaining your privacy.

Search engines

Another popular feature accessible through a browser. And it's through search engines that we get a lot of information about ourselves.

Instead of Google or Yandex, you can use search engines that don't collect data, such as DuckDuckGo. You'll also need to configure your browser to use this service, which means simply selecting it in the settings.

DDG is similar to a VPN, but it doesn't hide your IP address. Unlike other search engines, it doesn't collect your search history for advertisers and encrypts all connections. Consequently, it won't show you targeted ads.

E-mail

You'll need to configure your email client, if you use one. It's similar to configuring your browser. Just check the “Privacy” and “Security” options in the program's settings to make sure everything is set up correctly.

But it's far more important to connect to the right email service that offers greater privacy (ProtonMail, Tutanota). After all, emails are a great source of information about you.

Typically, such emails aren't free because they don't make money from advertising. However, they store all emails in guaranteed encrypted form. You keep the decryption key; even the service's administration can't access it. This is the best encryption model, so-called “end-to-end encryption.” It's best to consider these types of email offers.

Another tip about email: Use different email addresses for different purposes. Work email, personal email, and a “secret email” for account recovery. To prevent password resets, use a known email address. For forum registration, it's best to use a disposable email address. An added benefit is that you won't receive spam.

Other programs and services

Of course, the list of settings isn't limited to browsers, search, and email. This could include, for example, social networks (Facebook, VKontakte) and instant messengers (Skype and others). In other words, any programs connected to the Internet, or network services. Anything that could collect information about you needs to be configured or switched to more user-friendly services.

System maintenance: updates, backups, cleaning

Developers often release updates to fix discovered security vulnerabilities. No matter how tempting it may be to skip the system update, trust me, it's worth it.

Set your operating system and all applications to always be updated .

You should also avoid using programs (operating systems) that are no longer supported, as they are extremely vulnerable to hacker attacks.

Don't forget to save data on hard drives and online services.

There are also specialized programs for cleaning and optimizing computers. They effectively remove old programs, their leftovers, and system junk. However, it's important not to overdo it, as excessive optimization can impair performance.

We'll wrap up our review of completing the “digital fortress” with some cleaning tips. Enjoy!

Leave a Reply

Your email address will not be published. Required fields are marked *