The 12 days of Cyber-Mas Secure (Part 2)

 

Read Part 1 of The 12 Days of Cyber-Mas Secure here.

 

Day 5: Review your privacy settings

Use the privacy settings of apps such as Facebook and Twitter to review who can see your posts. Facebook, for example, now has a security feature where you can change public posts into posts seen only by a select audience. The images below show how you can select “Limit Past Posts” to change old posts to just Friends.

facebook-limit-old-posts

 

Be aware that many other apps have default settings that may be less private than you would want so spend time checking them all.

Day 6: Review extent to which you disclose location

Rule of thumb: If there is no need to disclose your location, opt not to.

Some people love to geotag themselves – where they dined, where they traveled, where they are at the moment. If you are one of those who do this, be aware that your pattern of movements can give you away. Someone who is able to gain access to your locations from different apps can piece together a lot of things about yourself.

Location-based apps like Waze and Google Maps require access to your location but you can always tweak your settings so that you only allow access while using the app. Swarm, for example, is an app that lets you check into places with friends. This is the time to review who you accepted as friends in Swarm (and do some purging, if necessary) because those persons will know a lot about your dining, travel, and personal preferences. If you really want to check in, do so only AFTER you have left the place.

Long holidays like the Christmas break are also the times when bad elements are on the lookout for homes to target. Do not post your travel plans or vacation photos online while you are away.

Day 7: Run antivirus and security software

Does your laptop or mobile device have a good antivirus and/or privacy software? It’s time to get yourself one like Avast, AVG, Norton, McAfee or one of the other popular antivirus software in the market.

Set scheduled antivirus scans so it automatically scans regularly.

Day 8: Backup, backup, backup

This cannot be emphasized enough. If the contents of your mobile devices and laptops are crucial to your business or daily life, you cannot afford NOT to have backups.

This season, backup your contacts, important files, and applications. Mac users can do this using Time Machine. Cloud backups are also great but do so only with platforms that are known to have tight security measures. iCloud, Dropbox, Google Drive are some of the well-known platforms for keeping backups. If you have a portable external drive, you can also manually copy important files to it.

Day 9: Use disposable email addresses

This tip is not too popularly followed but it is one that is highly recommended if you want to reduce the amount of spam email you get — Use a disposable email address.

The moment you fill out online forms, subscribe to a newsletter, avail of that free ebook, or sign up for any online service, an email address has to be provided. If you regularly provide your primary email address for these activities, you may find your email overwhelmed by spam. There are many sites that offer disposable or throwaway email addresses. Personally, one of the sites I use is Tutanota. Creating disposable email addresses is very easy with Tutanota and your email mailbox is encrypted too.

Day 10: Activate automated alerts

An effective security measure that allows you to immediately react to a possible hack or intrusion into your accounts is to automate alerts – by SMS, email and/or mobile notification. Notifications can be bothersome at times, especially if you get too many. But there are some that you will be thankful for. Activate alerts for the following types of activities, among others:

  • Invalid login attempts
  • Password changes or requests to change password
  • Purchases using credit cards
  • ATM withdrawals

Day 11: Revoke access by rarely used apps

You may have linked some apps years ago that you no longer actively use or which may have slowly faded away into oblivion. Check all your app settings and revoke access by these apps to your active social media apps. Keeping them connected to your active app keeps open a possible security hole that someone can take advantage of.

Day 12: Set up your device so you can find it (and wipe out the data) in case of loss

If you have an iOS device, Find My Phone is an app you need to sign into using your Apple ID because it will be your savior in case you lose your device.

For Android users, Google has its Android Device Manager (ADM).

android-device-manager

You don’t need to download an app. You can use ADM using a web browser as long as:

  1. Your device is connected to your Google account.
  2. Your device has access to the internet.
  3. You allowed Android Device Manager (ADM) to locate your device (turned on by default).
  4. You allowed ADM to lock your device and erase its data (turned off by default).

This article gives more details on how to track an Android phone.

Device-tracking features are very useful. Depending on which one you use, it can give a fairly pinpointed location of your device. You can opt to ring it or report its location. You can also opt to wipe out the data remotely, a great feature when you have confidential information on the device.

So there you are — 12 different things I believe you can do so your Christmas holiday makes you Cyber-Mas Secure for 2017. Good luck securing your online devices and accounts. Let’s make 2017 a more cybersecure year.

 

This post is supported by a writing grant from the Philippine Center for Investigative Journalism (PCIJ) 

Share:

About BlogWatch

BlogWatch began in November 2009 as a group of independent-minded bloggers and social media users helping with voter education. It has since evolved into a nonpartisan group of citizen advocates who engage government and the private sector, online and offline, for social good.

BlogWatch does not solicit, ask for, demand or receive any financial or material remuneration for involvement in its activities, whether in cash or in kind. Read our editorial policy which includes disclosure, methodology and corrections policy.

Share your thoughts on BlogWatch

 

Got something to say? Share your perspectives on current issues and contribute to the conversation.  Just contact the editorial board.

Read our older posts

“Best Story:” Award for Data Journalism PH 2015

BlogWatch received the “Best Story” Award for the First Data Journalism PH 2015 from the Open Knowledge Foundation and Philippine Center for Investigative Journalism “Aid Monitoring: Citizens’ Initial Efforts in the Wake of Typhoon Yolanda” . Forbes Philippines also garnered the same award.

BlogWatch receives the “Best Story” Award for the First Data Journalism PH 2015 from the Open Knowledge Foundation and Philippine Center for Investigative Journalism  for their story on “Aid Monitoring: Citizens’ Initial Efforts in the Wake of Typhoon Yolanda” . Forbes Philippines also received the same award.

Send Us A Message