Tag: Online safety

How to Be Invisible Online (Without Going off the Grid)


Are you concerned about your online security? With more data breaches occurring daily, it’s crucial to protect yourself with these simple tips.

This infographic is a comprehensive look at how you can reduce your online visibility to protect your privacy, but still be seen by your family and friends. From browsing the internet to safety on social media platforms, you don’t need to be a technical genius to lessen your online risk.

You don’t have to leave the grid to disappear from hackers and unscrupulous businesses who exploit you and your information for their gain without your knowledge. However, it’s critical to protect your data on each platform you use.

Unfortunately, these big corporations don’t always have our best interests at heart. As we’ve seen from the multiple data breaches, there are times that consumers aren’t told about the hack until it was too late. Repairing your credit and personal information after a data hack is scary. By locking down your data now, you’ll save yourself a bigger headache later.


Source: Barbara Davidson, Robin

Online banking safety tips:

The security level of your Internet connection depends on the kind of settings you make.

Keep the following rules in mind if you want to tread a safe path as a user of online banking.

General Information:

  • Regularly update the operating system. In this way, you can prevent security holes being created.
  • Always use an updated version of a browser.
  • Use a virus security and update it regularly (automatic update recommended).
  • Install and activate a firewall.
  • Never save your PIN and PAN on the computer.
  • Use software only from a trust worthy source.
  • When carrying out online transactions, close all other applications. While banking online, you are advised to avoid chatting, downloading files or surfing the Internet.
  • Regularly save your data on a removable medium.
  • Select a secure password: it must have at least six characters and should be a combination of letters, numbers and special characters.
  • Note the emergency telephone number of your financial institution so that in case of emergency, you can contact someone at any time.
  • Regularly check the returns (at least once in a month) using bank statements. In case of suspicious entries, inform the financial institution immediately.

While logging in:

  • First close all browser windows and then only open a new window.
  • Manually enter the URL in the address bar of the browser, do not click on links.
  • Ensure that the address entered in the address bar starts with “https”.
  • The security lock in the browser bar must be visible and closed.
  • If necessary, check the security certificate.

After logging in:

  • Do not open any other browser window while carrying out a transaction.
  • If conspicuous error messages appear, close the operation.

After logging out:

  • Make sure your end your online banking session by clicking on “Logout”.
  • Delete the cache and the history of your browser.
  • Delete the cache and the history of your browser.
  • Close the browser window.

Rules for online banking:

  • To avoid falling prey to data fishing, you are advised to steer clear of the following risk factors:
    • Never reveal your access data such as PIN or PAN personally, or through telephone or e-mail. No authentic bank will ever ask you for such information.
    • Never carry out online transactions in an Internet café.
    • Never run a so-called security update for Internet banking if you are asked to do so through e-mail. Banks never send such updates through e-mails. Visit the home page of your financial institution and check whether it mentions such an update.

Additional tip:

Another option of banking online without fear of a phishing attack is to use a signature-protected HBCI (Home Banking Computer Interface) with a chip card. This type of Internet banking is very convenient since one does not need to enter the PAN. The guarded entry of a PIN is a further advantage, where a key logger or a Trojan cannot access the PIN you enter. For this interface, you need a relevant chip card reader with an independent PIN pad.

Source: chip