ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Ways to Keep Your Internet Browsing Private

b2ap3_thumbnail_anonymous_browsing_400.jpgIt turns out that the Internet isn’t as anonymous as it seems. This is a hard lesson learned by more than 37 million users of Ashley Madison, a website dedicated to cheating on one’s spouse. In July, the site was hacked by the hacker group, “The Impact Team,” and they’re currently threatening to expose the cheaters by going public with the database. In this particular case, Ashley Madison users should have known better--on two levels.

The first lesson here is to not be a cheater. When it comes to pulling stunts like this, it’s not a matter of if you’ll get caught, but when.

The next “level of duh” we see here is that these cheaters actually believed their activity on Ashley Madison to be anonymous. They bought into a lie, which is kind of ironic when you stop and think about it.

The truth about what you do on the Internet is that there are many different ways to have your activity traced back to you. And forget about the idea of a website that’s completely impregnable from hackers. The fact that, just last June, the United States federal government was hacked and the records of more than 4 million employees were compromised, should be enough to give you the virtual heebie-jeebies.

When it comes down to it, a skilled hacker who’s absolutely dedicated to finding out what you’ve been up to online will be able to. Especially if they’ve got a strong motive, like having their wedding vows trampled upon. And don’t even think about running for public office if your personal email account is connected to something along the lines of an online escort service. This kind of dirt will be uncovered so fast that you’ll think you’ve been hacked by Hoover.

All of this isn’t to say that you can’t take measures to make it more difficult for hackers to track your Internet activity. Also, we’re in no way implying that, just because you take efforts to cover your online tracks, it means that you’re up to no good. When browsing the Internet in today’s volatile world of online security, any actions you can take to make your sensitive information less visible and accessible is always a smart move, even if you’ve got nothing to hide.

Here are five common sense actions you can take to make your online activity more difficult to track.

Delete Your Browser History
Obviously, you’ll want to delete your browser history if you’ve visited sketchy websites. Although, it’s also a good idea to delete your browser history in general. After all, if a hacker were to take control of your PC, they would easily be able to know which of your online accounts they should hack next, just by viewing your browser history. Bonus tip: browsing in incognito mode for Chrome, opening a private browsing window in Firefox, and InPrivate browsing in Internet Explorer and Edge, are all ways to surf the net without your browsing data being stored locally. Just keep in mind that this doesn’t hide your browsing activity from your Internet Service Provider.

Scrap Your Real Name
Not using your real name online should be obvious, yet too many users don’t even try to come up with an alternative name when registering for online accounts. In an attempt to make users more accountable for what they post, websites like Facebook have done away with fake usernames and are instead requiring real names to be used. Still, wherever you're able to set up a fake name, be sure to do so.

Don’t Use Personal Photos
Most online accounts ask for you to upload an image for your profile. If you don’t want this account to be traced back to you, then don’t use a picture of yourself, or of any other images that are personal in nature, like your house, car, kids, etc.

Keep Your Credit Card Confidential
In addition to having to worry about a hacker stealing your credit card number for fraudulent purchases, hackers can use your transaction information to figure out what you’ve bought. This can come back to bite you if you’ve purchased something that you don’t want the world to know about. Using a cryptocurrency like Bitcoin is one anonymous way to shop online, and so too are using prepaid credit cards, which can’t be traced back to an account in your name.

Don’t Use Your Personal Email Account
Another obvious move is to not use your personal email account to register for websites that you don’t want traced back to you. Setting up a “burner” email account from a free online hosting service like Gmail or Yahoo! is easy to do and doesn’t require the use of your real name. As a bonus, by separating your email accounts like this, you’ll be safeguarding your real email account (with its valuable information) from hackers, in the event that your burner email account gets hacked.

The Internet isn’t the unregulated Wild West that it used to be. Today, there are prying eyes behind every page, which means that you need to know how to navigate the web in a way that keeps your private data safe. For more tips and tools on how to protect your identity from the worst of the web, give ClearView IT a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Small Business Upgrade Smartphones Microsoft Office Mobile Devices Network Data Recovery Managed IT Services Communication Quick Tips Productivity Users Social Media VoIP Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Disaster Recovery Covid-19 Passwords Holiday Apps IT Support Managed Service Browser Windows 10 Miscellaneous Cloud Computing Outsourced IT Data Management Internet of Things Remote Work Managed Service Provider Government Saving Money Operating System Artificial Intelligence Managed IT services Gadgets Networking Windows Workplace Strategy Business Technology Blockchain Bandwidth Encryption Server Mobile Device Management Information Remote App WiFi Virtualization Spam History Budget Gmail Employee/Employer Relationship Office Apple Two-factor Authentication Information Technology Office 365 Cybercrime Wi-Fi Health Conferencing Access Control Analytics Data Security Big Data BDR Document Management Voice over Internet Protocol Hacker IT Management Save Money Training Employer-Employee Relationship Compliance Remote Computing Help Desk Patch Management Hacking Cost Management Vendor Remote Monitoring Data storage Mobile Office Money Search... Customer Service Unified Threat Management Managed Services Best Practice Firewall Data loss Retail Augmented Reality Word Alert BYOD IBM Hiring/Firing Website Computing Outlook Vendor Management Hard Drive Password Applications Project Management Vulnerabilities Legal Mobile Computing Windows 11 Healthcare Websites Remote Workers Meetings Mobility Marketing Windows 7 Running Cable Social Free Resource Sports Travel SaaS DDoS Virtual Reality Google Maps Social Engineering Scam Cryptocurrency Storage Black Market How To iPhone Cleaning Education Cortana VPN Robot Content Filtering Update User Router Data Breach Paperless Office The Internet of Things Antivirus YouTube Chrome Twitter Maintenance Law Enforcement Laptop End of Support Monitoring Printer Computer Care Downtime Downloads Presentation Specifications Safety Identity Theft Hack IT Consultant Notifications Vulnerability Saving Time Unified Communications Software as a Service Managed Services Provider Virtual Desktop Bitcoin Experience Customer Relationship Management Google Docs Data Protection Computers Virtual Private Network Co-Managed IT Bluetooth Distributed Denial of Service Entertainment Telephone Office Tips Memory Current Events Private Cloud Excel Solutions Disaster Integration Politics Tech Terms Images 101 Settings Lithium-ion battery Display Machine Learning Managed IT Virtual Assistant HIPAA Digital Solid State Drive Processors Employees Taxes Avoiding Downtime Chromebook Drones Holidays Processor Automobile Cooperation Physical Security Video Conferencing How To Wireless Technology Microchip Virtual Machines eWaste Flexibility PowerPoint Computer Repair Administration Multi-factor Authentication Start Menu Professional Services Vendor Mangement Service Level Agreement Internet Service Provider Environment Computing Infrastructure Azure Reliable Computing Business Communications Heating/Cooling Writing Management Regulations Compliance Social Networking Samsung Device security Managed IT Service Windows XP Webcam Microsoft Excel Phone System Uninterrupted Power Supply Wireless Headphones Memes Business Mangement Going Green Net Neutrality Supply Chain Business Cards Scalability Tech Human Resources Text Messaging Error Financial Data Proactive IT Tablets Administrator Bring Your Own Device Bookmark Risk Management IT Download Workplace Supercomputer Piracy Google Calendar Term Google Apps Virus Telework Computer Accessories Music HTML Motion Sickness Microsoft 365 Staffing Browsers Smartwatch Nanotechnology Communitications IP Address Google Drive Upload Procurement Scams Software License Comparison Google Play Botnet Social Network FinTech Rental Service Knowledge Data Analysis CES Micrsooft Corporate Profile Screen Reader IT Assessment Flash Telephony Trends Supply Chain Management Cables Employer Employee Relationship Mobile Technology Value Television Security Cameras Telephone Systems Customer Resource management Organization Business Growth Cabling Devices Cyber security G Suite Tip of the week Recovery Fileless Malware Competition Tablet Smart Devices Troubleshooting VoIP Gamification Remote Working Point of Sale Tracking Company Culture Mouse LiFi Banking Telephone System AI Entrepreneur Google Wallet Regulations Trend Micro Shortcuts Web Server Transportation Documents Messenger Directions Digital Security Cameras Application Deep Learning Backup and Disaster Recovery Electronic Health Records Content Business Intelligence Digital Payment Desktop Wasting Time SharePoint Business Metrics Electronic Medical Records Hosted Solution Worker Accountants eCommerce Modem Be Proactive Securty Books Videos Access Database Surveillance Business Owner Domains Language Time Management Society Public Cloud Managing Costs Health IT Equifax SSID Visible Light Communication Workplace Strategies Hard Drive Disposal Employer/Employee Relationships Reading Audit Media Monitors Spyware Tactics Development Username Windows 8 File Sharing Virtual Machine Redundancy Reviews Startup Optimization Freedom of Information Advertising email scam Teamwork Relocation Navigation 2FA Public Speaking Displays Cache Addiction Inbound Marketing Work/Life Balance Unified Threat Management Data Storage Tech Support Workers Mobile Security Hypervisor Streaming Media User Tip Shopping Keyboard Legislation News Medical IT Smart Technology CCTV SQL Server Printing Evernote Paperless Hard Drives Network Management Touchscreen PCI DSS intranet Licensing In Internet of Things Electronic Payment Wireless Hacks Emergency Proxy Server Gig Economy Shortcut Network Congestion Emails Humor Computer Malfunction Fake News

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?