Tips to Keep Personal Data Safe From the Internet

Tips to Keep Personal Data Safe From the Internet

Social media has now become a lifestyle. Almost everyone who has access to the internet has a social media account. With social media, relationships and communication between friends, relatives, and family can be maintained without being limited by place and time. But behind its convenience lies a big threat. Imagine what would happen if your social media account was taken over by another party and used for crime and fraud. For this reason, the following tips are very useful for securing your social media account.

Use strong passwords.

The first and foremost thing that is often overlooked is the Password. Many people create passwords based on their name, date of birth, cellphone number, etc. which are considered easy to remember. In fact, not infrequently just write numbers or letters sequentially like '123456' or 'qwerty'.

On the one hand, it is easy to memorize, on the other hand, this is the biggest security hole that is easy to exploit. Don't think Hackers work with complicated algorithms and use sophisticated computers to take over your account, sometimes they just guess from things about you.

A secure password consists of a variety of letters, numbers, and other characters. The more variety, the higher the power. The minimum password consists of letters, numbers, and symbols, with a length of 6 characters. The use of uppercase and lowercase letters strengthens so that it avoids guesswork and complicates Brute Force or the technique of trying all compositions with third-party tools. Do not use words that are closely related to you that are easy to guess, such as name, place of birth, date of birth, cellphone number, etc.

Differentiate social media passwords with email passwords.

Every social media registration is always required to fill in an email address, this is used to verify the owner of the social media as well as for alternative account and password recovery if you forget it. For this reason, it is very important to distinguish between social media and email passwords. If at any time social media is taken over by someone else without permission, you can still recover it easily via email confirmation. If the social media password is the same as the email password, hackers easily master both and reduce your chances of taking over again.

Do not store passwords on other people's computers.

Pay close attention to where you access social media. If it's done on a computer that can be accessed by the public, for example at the office or an internet cafe, make sure not to save the password automatically in the browser. Internet browsers often offer account and password storage facilities so that one day if you access the same website, the account and password fields are automatically filled by the Auto-Fill facility from the Browser. This is intended to facilitate access, but of course, it would be dangerous if the computer was also accessed by other people. People will easily log into social media accounts using this facility.

Make sure the social media address is correct.

Phishing is a technique to collect information including accounts and passwords using a fake website address that is similar to the original website address. The way phishing works is to provide a link to the account owner that will direct users to a fake website that looks similar to the original website. You unknowingly fill in your account and password there, then your entry is recorded by hackers and you are redirected to the original website. At first glance you feel that nothing is wrong, you can still access and use social media normally, but the next day you might be surprised because the password you entered is considered wrong. Congratulations, your account has been taken over by someone else.

The safest way is to manually type the address. Remember, all current social media must use HTTPS because it is a secure access point from phishing. Again, make sure you type your social media address correctly.

Avoid logging into social media via external links.

This is related to Phishing above. Seduction to enter a fake website is usually done by providing a link via email or via a website. If you receive an email that has a link to a social media login page and asks you to fill it out, immediately mark the email as spam and ignore all the prompts, even if there are rumors of getting gifts or bonuses, all fake and scams. This also applies if you enter a certain website and there is a sweet promise of attractive prizes if you click on the link that leads to the social media login page.

Enter the mobile number for security.

What if social media and email have been taken over by a third party? An easy alternative way is to make a verification request via a mobile number. Therefore, it's a good idea to fill in your cellphone number on the social media configuration page. If there is a problem, then just confirm via SMS, you can take over your account again. One important thing, don't forget to set your cellphone number access rights. The options usually provided by social media are Public, Certain Friends, or Private. If you don't want anyone to know your cellphone number, choose a private one.

Don't click any links on social media.

Many statuses contain interesting offers to click on, such as offers to see who is snooping on our account or offers to adult content. Don't be provoked! Once you click, your account will redistribute the link to friends and groups that you follow on social media. This is called Spam Bot. Message chain that takes a lot of victims. If it continues to be infected, then you have to look for one by one which applications are installed on social media that are the culprits, then delete them.

Do not install social media mobile applications from unauthorized parties.

Nowadays access to social media is more using mobile applications installed on cellphones than using a PC or laptop. Every Mobile Operating System always provides an official Marketplace for application installation, for example, Android provides Playstore and Apple provides iTunes. Install social media applications through the official marketplace, not through third-party websites because third-party applications may contain malicious code that will suck up the information on your phone. Of course, it will be used for bad things that will harm you.

Strengthen Social Media security settings.

Social media provides complete security settings such as restriction of comment rights, tags/tagging, writing on the wall, viewing private information, etc. Social media also provides tools that record where and when there is login access to your account. Strengthen your social media access security configuration, do not leave all information open to the public. One tool that may be useful is a tool to Log out all devices that have been logged in. With this, you can force exit if a third party is playing with your account without permission.

Change passwords periodically.

It is better if the password that has been used for years is replaced with a new password. Especially if many already know your password. Usually, social media will provide notifications to change passwords if there are security problems that attack their servers. Replace immediately, don't delay anymore. You are also required to change the password if it is felt that another party is using your account with a computer or other equipment. Do a mass log out through the features on social media and change the password as soon as possible.

Do not give social media accounts and passwords to third parties.

This technique is called Social Engineering. The trick is simple, impersonating an official party who asks for your account and password for security reasons. Usually, requests are sent via email from parties who pretend to be the official social media managers. Stop! None of the social media managers will ask you to fill in the account name and password for any reason. So if someone does that, it's definitely a scammer.

Don't forget to log off

The next security is Don't forget to Logout or Logoff after using social media. Especially if you access social media through a public computer. Social media uses a small application called a cookie to temporarily store your account and password for as long as you are active on social media. This cookie makes it easy to recognize and record your surfing information while on social media. This is actually not a dangerous program, but leaving the computer without logging out will automatically open your social media account, even if you close the browser because this cookie still saves your account. Logout and this cake will be completely deleted from your browser, and prevent other parties from entering your social media account.

Activate two-factor authentication (2FA)

Don't give OTP codes to other people. Two-factor authentication requires a code outside of a password to log into certain accounts. This can be a code sent to you via text message or email. This second layer of protection can protect you, should your password be compromised in any way.

Apply encryption

Encryption prevents other parties from monitoring the network and the information you enter on the sites you visit. Encryption is very important to keep your personal data safe on the Internet. Encryption works by scrambling everything you send over the network.

This prevents other parties from monitoring network activity from the information you enter on the sites you visit.

Have a backup email

Use backup email to avoid spamming. To protect the privacy of your social media and internet accounts, you also need to use a backup email. Almost every web requires an email address if we want to use their services. If you visit a trusted site, then security is not a problem. But unfortunately, there are many sites with questionable reputations. By having a backup email, you avoid spamming. So, your activity in the main email will not be disturbed.

Choose private browsing or incognito mode

The way to maintain privacy on the internet is to use incognito mode when browsing. The history and passwords stored in the browser can leave you vulnerable to security threats.

Fortunately, modern browsers already have a private browsing mode or an incognito mode. Incognito mode makes Chrome delete all history and cache data when you close the browser window.

Use a tracker blocker

Tracker blocker can solve your data leak. Most sites on the internet use some sort of tracking or analytics platform. These trackers allow websites to track their marketing effectiveness and get information about the number of visitors.

Unfortunately, this tracker also collects your data, such as your IP address, location, and device type. Therefore, use a tracker blocker to anticipate it.

Block ads

Ad blockers can also speed up loading sites you visit An ad blocker is similar to a tracker blocker in that it works by detecting ads on a page and blocking them from loading.

In addition to protecting you from the data collection that these ads can do, ad blockers can speed up loading times on the sites you visit. So, it's a good idea to use an Ad Blocker to protect privacy.

Clean cookies regularly

Delete cookies regularly. Cookies are small text files that are stored on your computer. Cookies usually contain a small amount of information related to your web browsing and device.

The sites you visit use cookies to keep you logged in to those sites. On the one hand, cookies do make your browsing activity easier. However, they also actually track your activity!

Be careful when giving permission

Don't give access to just anyone. When downloading an app on your phone, you may be asked to grant certain permissions. Take care when accepting these terms.

Because this app may request unnecessary access to your camera or microphone. Granting app permissions without being aware of which you consent to, can lead to an unintentional breach of privacy.

By knowing how to maintain privacy on the internet, you can take better care of yourself in cyberspace. Make sure all your data is stored securely and don't share personal data information with anyone.

Enable two-step verification

Enabling two-step verification is double security when criminals steal your data.

Don't use public or free WiFi.

Many in public areas offer public wifi or free wifi. You can avoid this offer because using free wifi can make the data on your cellphone unsafe.

Especially if you access financial accounts, such as mobile banking and other accounts.

Install the latest AntiVirus


Installing an updated antivirus can be one way to guard against malware or viruses that make your data lost.