Privacy
How to Keep Your Online Activity and Identity Private
Today, your continuously connected lives are leaving behind a trail of data from your electronic devices. From the apps on your smartphones, your browser history on your computer, to the data on your fitness tracking device- anything that is connected to the Internet is storing information.
What Information is Okay to Share Online?
While all this abundance of information sharing may seem alarming, there are good reasons for it. It’s very natural to hit the “accept” popup when your device asks for allowing Cookies, location services, or to access other features of your device to be used by certain Apps or programs. We often do this without thinking of the privacy ramifications. Companies actually need to track certain information in order for their products to work. Therefore, these technologies help facilitate GPS directions, localized search results to find a nearby restaurant, and help improve the targeting of ads.
Remember- you are in control of what information you share abut yourself online. Research privacy policies and block access to suspicious requests from Apps or programs. If you have social media accounts, be sure to check those privacy settings too.
Risks to Privacy with Connected Devices
The downside to this information sharing is that there are also ways in which your privacy can be compromised, illegally or unintentionally. Unfortunately, some companies do not think of security first and focus on the functionality of their product primarily. With the emerging Internet of Things, most of the new gadgets we bring into our homes now have the ability to connect to Wi-Fi. This means Internet connected devices such as streaming security cameras, light bulbs, thermostats and smart home products all have computers in them that store data. Most all of these technologies have security issues, such as default passwords left unchanged once installed, to unsecured routers protecting these devices. As a result, cybercriminals with nefarious intent can bypass the poor security included in these devices. The key to protecting your privacy is learning how to properly setup and secure all of your connected devices.
-
Privacy vs. security: what’s the difference?
Read MorePrivacy vs. security: what’s the difference? Here’s what you need to know.
-
-
How to clear cookies in Chrome, Firefox, Safari, and other browsers
Read MoreComputer cookies keep track of data for websites, but they also hold a host of personal information. Here’s how to delete them.
-
Is Private Browsing Really Private? Short answer: No
Read MoreUsing a private browsing mode can help you do a lot of things, but maintaining total online privacy isn’t one of them. Learn more.
-
What is a VPN?
Read MoreA virtual private network (VPN) gives you online privacy and anonymity. Here’s what you need to know.
-
What is a no-log VPN?
Read MoreVPNs with no logs protect your privacy by not keeping logs of where you go or what you do online.
-
VPN For Windows
Read MoreHelp keep your browsing activity private by using a VPN on your Windows PC. Learn what a VPN is and how it helps to keep your information safe and private, especially when using public Wi-Fi.
-
VPN for Mac
Read MoreHelp protect your browsing activity while using your Mac computer with a VPN. Learn how a VPN provides privacy while you browse and helps keep your information safe when using public Wi-Fi.
-
Is hotel Wi-Fi safe? Staying secure on public Wi-Fi
Read MoreLearn how-to tips for using public Wi-Fi safely at the Wi-Fi network at your airport, cafe Wi-Fi networks, and hotel Wi-Fi networks.
-
How secure is a VPN? What makes a safe VPN?
Read MoreHere’s how to make sure you choose a safe VPN.
-
The risks of public Wi-Fi
Read MoreDid you know there could be threats lurking in the background on public Wi-Fi while you balance your bank account and sip a latte at your favorite cafe?
-
Are password managers secure?
Read MorePassword managers offer encrypted solutions for creating and storing strong passwords that help keep your data more secure.
-
How a VPN can help you now that net neutrality is dead
Read MoreWith the end of net neutrality, ISPs can now block, throttle or put data in slow and fast lanes. Find out how a VPN can help you navigate these changes.
-
How to delete your search history and maintain privacy with a virtual private network (VPN)
Read MoreIf you value your online privacy, a VPN can help hide your IP address, keeping your identity anonymous while you search the web.
-
What is a digital footprint? And how to help protect it from prying eyes
Read MoreYour digital footprint is your online activity, from commenting, liking, or sharing on social media to any mention of your name online.
-
5 tips for social media security and privacy
Read MoreSocial media accounts are powerful tools in the wrong hands. Weve recently seen hackers take over the Twitter accounts of media outlets and large corporations, using them for anything from basic spam...
-
9 ways to help keep your personal data safe during vacation
Read MoreVacations can be an exciting, happy time for people to get away and avoid the everyday worries of home. But fun can come to a halt if your personal data is compromised while traveling.
-
Is your DNA info safe from data breaches, and what are the privacy concerns?
Read MoreIs your DNA info safe from data breaches? Probably not, but privacy concerns may be more important
-
Setting up a VPN on your router
Read MoreConnecting to the internet through a VPN provides greater privacy and anonymity. Learn how to set up a VPN on your router at home.
-
Cyber Safety gift guide 2019: 5 great device-security and online-privacy gifts
Read MoreIf you’re concerned about online security and privacy, here are some gift ideas that can help keep you safer.
-
VPN leaks: What they are and how to test your VPN security
Read MoreA VPN can hide information to help protect your online privacy, but here’s the thing: Some VPNs can leak.
-
What is encryption and how does it protect your data?
Read MoreEncryption is the process that scrambles readable text and helps provide data security for sensitive information. Learn more.
-
Is the dark web illegal?
Read MoreThe dark web attracts plenty of illicit activity, but is it illegal? We took a deep dive into the dark web and its legal implications. Here’s what we found.
-
Sensitive data exposure: What is it and how it’s different from a data breach
Read MoreYour personal information can be exposed in different ways. Sensitive data exposure is one way. A data breach is another.
-
Is Your Personal Data Leaking from Your “Digital Exhaust”?
Read MoreAs you switch between devices, our calendars, emails, and other information follow us – always keeping us up-to-date. However, synchronization services may put your personal data at risk in ways you may not realize.
-
Cloud Security: How Secure is Cloud Data?
Read MoreThe positives of storing data and files in the cloud are many, but you may have questions about security. Find answers here.
-
Cyber safety guide: Tips to Own IT. Secure IT. Protect IT.
Read MoreLearn how your actions can impact online privacy and device security. Here’s help during National Cyber Safety Awareness Month and beyond.
-
Tips for protecting your social media privacy
Read MoreIn a world where companies can collect your online information, learn tips for protecting your social media privacy.
-
Is personal data really gone when it is deleted?
Read MoreEver wonder what happens when you drag old emails into the trash or delete personal records to free up space on a hard drive? You might be surprised to learn that your data may not really be gone.
-
What is a security breach?
Read MoreVPNs with no logs protect your privacy by not keeping logs of where you go or what you do online.
-
What are some of the laws regarding internet and data security?
Read MoreNumerous laws in the U.S. cover Internet, data security, and privacy in the United States, with the 1974 Privacy Act (link is external) arguably being the foundation for it all. The Privacy Act passed to establish control over the collection, maintenance, use, and dissemination of personal information by agencies in the executive branch of the U.S. government.
-
What is a data breach?
Read MoreData breaches are security incidents where information is accessed, stolen, and used by a cybercriminal without authorization. Data breaches impact individuals and organizations every day. Learn how a data breach occurs and how to protect your personal information.
-
How does incognito mode work?
Read MoreMajor web browsers allow you to go “incognito” by activating private browsing modes. Here’s how incognito mode works.
-
10 benefits of VPN you might not know about
Read MoreHere are some of the benefits you may be missing out on even if you’ve already got a VPN service.
-
Social media giant’s $5 billion fine and your privacy: What should you do now?
Read MoreLessons from the Facebook investigation and settlement — and steps you can take to help protect your privacy on social media.
-
Online privacy: 3 surprising things you should know
Read MoreOnline-privacy concerns and Internet distrust have increased around the world. The reasons why may surprise you.
-
Does the Do Not Call Registry work?
Read MoreDon’t expect the Do Not Call Registry to shield you from every unwanted call. Here’s why.
-
What is private browsing and how do I use it?
Read MoreMajor web browsers offer private browsing or incognito modes. But what does “private” really mean? Find out here.
-
Internet privacy: A guide to online privacy
Read MoreTake steps to boost your privacy online. Here’s what to do and why it’s important.
-
Norton Privacy Manager: Help manage and control what personal information you share online
Read MoreSafeguard your privacy in the digital world. Learn how to protect your online privacy.
-
Are VPNs legal or illegal?
Read MoreVPNs are legal to use in many countries, but you should understand what may be legal and illegal while using a VPN.
-
How to protect your privacy online
Read MoreOnline privacy is important. Take these steps to protect your financial and personal information.
-
Why antivirus may not be enough
Read MoreThe threat landscape is evolving. Protecting your identity and your data should also evolve.
-
Can smart speakers be hacked? 11 tips to help stay secure
Read MoreCan smart speakers be hacked? The answer is important, since your personal information and privacy may be at stake. Learn more.
-
-
The Norton with LifeLock Story
Read MoreThe new Norton with LifeLock helps protect your entire digital life: PCs/Macs, mobile devices, privacy, identity, family and smart home network
-
Participating in legitimate surveys: What personal data is OK to give away?
Read MoreCompanies of all sizes use online surveys to gather important market research, which they later utilize to direct product development and marketing initiatives. This critical step in the marketing...
-
Taking steps towards online safety this International Women's Day
Read MoreA major new survey titled reveals that 76 percent of Australian women under the age of 30 have experienced online harassment. This International Womens Day, lets make the online world a safer one. In...
-
6 tips to maintain your privacy while searching for jobs online
Read MoreLooking for employment today is dramatically different from how it was just two decades ago. Its rare to just walk into a business, fill out an application, and get hired within the same day; todays...
-
What personal information should you safeguard?
Read MoreSome 10 million identity thefts happen in the United States every year. Taking extra steps to protect...
-
Credit monitoring services and other anti-fraud protection
Read MoreIdentity theft is the most common complaint lodged with the Federal Trade Commission,...
-
Cyber safety for women
Read MoreAn unfortunate number of women are becoming victims of cyber crimes....
-
How ridesharing services can take your privacy for a ride
Read MoreRidesharing services require riders' information such as real-time location data and a form of payment. This could pose risks to riders' privacy.
-
Is your phone easy pickings for identity thieves?
Read MoreAll about the low-tech and high-tech methods that identity thieves use to exploit the vulnerabilities to access the data on your cell phone.
-
Do loyalty cards compromise your security?
Read MoreThere has been a lot of recent concern around loyalty cards and privacy. Cybercriminals have found ways to illegally acquire these rewards points and use them, either for themselves or in the underground economy.
-
What are some of the laws regarding Internet and data security?
Read MoreNumerous laws in the U.S. cover Internet, data security, and privacy in the United States, with the 1974 Privacy Act arguably being the foundation for...
-
Can the elections get hacked?
Read MoreThe security of electronic voting machines has been the subject of scrutiny, just before the November U.S. presidential elections. Are they secure? Are they anonymous? And if the answer is yes, how...
-
The 12 days of Norton
Read More“We’re counting down days until Christmas is here, And gifting you cool security tips to be of good cheer, And make sure this season is the best of your year.” Happy holidays from Norton!
-
Online Christmas shopping: Naughty or nice?
Read MoreNorton released results of their Online Shopping Survey just in time for the holidays, when online retailers offer sales to lure shoppers into buying presents for themselves and others.
-
Why your online privacy matters
Read MoreWe all have things to hide. It could be how much money we make, our medical records or bank account numbers. Here are twelve tips to help you protect your privacy online.
-
Why clean computing matters
Read MoreWhen you “clean” your computer, you don’t just dust off the keyboard and wipe fingerprints from the screen. You also pay attention to the state of the hard drive, updating software and removing old programs.
-
The ultimate guide to online dating
Read MoreOnline dating is as normal to life as is online shopping. Believe it or not, online dating has been around for 20 years, and as a result, cybercriminals are finding big money in people looking for love.
-
How to let go of your old tech securely and responsibly
Read MoreAccording to several studies on cost of ownership, users should replace their computer devices every four years. Not everyone will need to upgrade his or her computer every four years, but it’s a..
-
How to improve your Wi-Fi signal at home
Read MoreEvery day more of the country gets better, faster Wi-Fi coverage. But that doesn’t stop your signal at home from dropping off or grinding to a halt every now and then. Here are the latest tips from our top experts on how to get the most from your..
-
Straight talk about cyberstalking
Read MoreTechnology opens our lives up in ways that weren't possible even less than a decade ago.
-
Emerging Threats
Read MoreMalware threatens new technologies and devices every day. Stay educated on most up-to-date ways to protect yourself.