{"id":31537,"date":"2019-03-20T12:07:08","date_gmt":"2019-03-20T16:07:08","guid":{"rendered":"https:\/\/www.tun.com\/blog\/?p=31537"},"modified":"2021-05-20T21:52:36","modified_gmt":"2021-05-21T01:52:36","slug":"clean-up-your-cyber-hygiene-6-changes-to-make-in-the-new-year","status":"publish","type":"post","link":"https:\/\/www.tun.com\/blog\/clean-up-your-cyber-hygiene-6-changes-to-make-in-the-new-year\/","title":{"rendered":"Clean Up Your Cyber-Hygiene \u2013 6 Changes to Make in the New Year"},"content":{"rendered":"<p><a href=\"https:\/\/www.fastcompany.com\/90272858\/how-our-data-got-hacked-scandalized-and-abused-in-2018\">Data breaches<\/a>, <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/unseen-threats-imminent-losses\">widespread malware attacks<\/a> and <a href=\"https:\/\/www.nytimes.com\/2018\/08\/16\/technology\/facebook-microtargeting-advertising.html\">microtargeted personalized advertising<\/a> were lowlights of digital life in 2018.<\/p>\n<p>As technologies change, <a href=\"https:\/\/www.cnet.com\/news\/father-of-passwords-bill-burr-regrets-the-advice-he-gave\/\">so does the advice<\/a> security experts give for how to best stay safe. As 2019 begins, <a href=\"https:\/\/scholar.google.com\/citations?user=MKZBcasAAAAJ&amp;hl=en\">I\u2019ve pulled together<\/a> a short list of suggestions for keeping your digital life secure and free of manipulative disinformation.<\/p>\n<h2>1. Set your boundaries and stick to them<\/h2>\n<p>As part of my research, I\u2019ve recently been speaking with a number of sex workers in Europe about their digital security and privacy. One consistent thing I\u2019ve heard from them is, \u201cThe best way to stay safe is to set boundaries.\u201d Decide \u2013 on your own, and in advance \u2013 what data you\u2019re willing to share with apps and online services, and stick to those limits.<\/p>\n<p>That way, when the latest new app asks you for a permission that oversteps what you\u2019re willing to share, you\u2019ll be more prepared to answer. Also set limits on the online discussions you\u2019re willing to participate in; bow out when a discussion is hurting more than helping you. It\u2019s even useful to set boundaries for how much time you\u2019re willing to spend on digital security \u2013 which could be an endless task.<\/p>\n<h2>2. Burst your filter bubble<\/h2>\n<p>People who <a href=\"http:\/\/www.pewresearch.org\/fact-tank\/2018\/12\/10\/social-media-outpaces-print-newspapers-in-the-u-s-as-a-news-source\/\">get their news primarily<\/a> \u2013 or exclusively \u2013 from social media are subjecting themselves to the <a href=\"https:\/\/theconversation.com\/social-media-companies-should-ditch-clickbait-and-compete-over-trustworthiness-88827\">whims of the algorithms<\/a> that decide what to display to each user.<\/p>\n<p>Because of how these algorithms work, those people are likely to see articles <a href=\"http:\/\/science.sciencemag.org\/content\/348\/6239\/1130\">only from news sources they already like<\/a> and tend to agree with. This isolation from people with other views, and from evidence that might challenge particular perspectives, contributes to <a href=\"https:\/\/arxiv.org\/abs\/1808.09218\">unprecedented levels of partisanship and disagreement<\/a> in modern society.<\/p>\n<p>Free online tools like <a href=\"https:\/\/www.allsides.com\/\">AllSides<\/a> and <a href=\"https:\/\/twitter-app.mpi-sws.org\/purple-feed\/app-tweet.php?query=All%20High%20Consensus\">Purple Feed<\/a> are some places that show news reports and social media posts from differing political perspectives, and identify information that\u2019s generally agreed upon across the political spectrum.<\/p>\n<h2>3. Manage your passwords<\/h2>\n<p>The biggest threat to password security is no longer the <a href=\"https:\/\/gizmodo.com\/the-25-most-popular-passwords-of-2018-will-make-you-fee-1831052705\">strength of your passwords<\/a> but the fact that many people <a href=\"http:\/\/dx.doi.org\/10.14722\/ndss.2014.23357\">reuse the same passwords<\/a> for all, or many, of their accounts. Researchers are busy designing notifications to tell you when one of these reused passwords has been <a href=\"https:\/\/doi.org\/10.1145\/3243734.3243767\">leaked to the world<\/a>, but it\u2019s safer to use different passwords, especially for your most valuable accounts.<\/p>\n<p>You can use <a href=\"https:\/\/theconversation.com\/using-truly-secure-passwords-6-essential-reads-84092\">password manager software<\/a>. Or, use the original low-tech method, <a href=\"https:\/\/www.vox.com\/2014\/4\/16\/5614258\/the-best-defense-against-hackers-writer-your-passwords-down-on-paper\">writing your passwords down on paper<\/a>. Believe it or not, it\u2019s much safer to write them down than reuse the same password everywhere. Of course, this is true only if you\u2019re sure the people you live with or frequent visitors to your home won\u2019t try to get into your accounts.<\/p>\n<h2>4. Turn on multi-factor authentication<\/h2>\n<p>Adding an additional step for logging in to your most important social media, email and financial accounts can add lots of protection. Multi-factor authentication systems are best known for texting you a six-digit code to type in as part of your login process. While any multi-factor authentication is better than none, text messages can fairly easily be <a href=\"https:\/\/www.theverge.com\/2017\/9\/18\/16328172\/sms-two-factor-authentication-hack-password-bitcoin\">intercepted or spied on<\/a>. An even <a href=\"https:\/\/theconversation.com\/encrypted-smartphones-secure-your-identity-not-just-your-data-91715\">safer route<\/a> is to use a special code-generating app on your phone.<\/p>\n<p>People who change phones or SIM cards often, or who want additional protection, might consider using a <a href=\"https:\/\/theconversation.com\/the-age-of-hacking-brings-a-return-to-the-physical-key-73094\">physical key<\/a> that plugs into your computer to authorize a login. They can take a bit more time to <a href=\"https:\/\/www.yubico.com\/setup\/\">set up initially<\/a>, but then work much faster than most other methods.<\/p>\n<h2>5. Delete apps you don\u2019t use<\/h2>\n<p>Smartphone apps <a href=\"https:\/\/www.nytimes.com\/interactive\/2018\/12\/10\/business\/location-data-privacy-apps.html\">track where you are<\/a> <a href=\"https:\/\/theconversation.com\/your-smartphone-apps-are-tracking-your-every-move-4-essential-reads-108586\">very closely<\/a>, and <a href=\"https:\/\/theconversation.com\/7-in-10-smartphone-apps-share-your-data-with-third-party-services-72404\">share your location data<\/a> with advertising and marketing companies.<\/p>\n<p>Just <a href=\"https:\/\/theconversation.com\/your-mobile-phone-can-give-away-your-location-even-if-you-tell-it-not-to-65443\">carrying a phone in your pocket<\/a> can give tracking companies clues to where you go and how long you stay, and technical details about your phone can <a href=\"https:\/\/doi.org\/10.1007\/978-3-319-29883-2_18\">offer clues to your identity<\/a>.<\/p>\n<p>If you don\u2019t use an app anymore, uninstall it from your phone. If you need it again, you can always reinstall it quickly \u2013 but in the meantime, it won\u2019t be tracking you around the world and around the web.<\/p>\n<h2>6. Keep the apps you do use up-to-date<\/h2>\n<p>Software companies don\u2019t always know about all the vulnerabilities in their programs \u2013 and when they issue updates users don\u2019t always know if they\u2019re <a href=\"https:\/\/www.scientificamerican.com\/article\/why-installing-software-updates-makes-us-wannacry\/\">fixing a major problem<\/a> or something minor. The top piece of advice experts give is to <a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/soups2015\/soups15-paper-ion.pdf\">keep your software up-to-date<\/a> on your computers and your mobile devices.<\/p>\n<p>Having spent 2018 worrying about how hackers, <a href=\"https:\/\/theconversation.com\/facebook-is-killing-democracy-with-its-personality-profiling-data-93611\">corporate executives<\/a> and <a href=\"https:\/\/theconversation.com\/programmers-need-ethics-when-designing-the-technologies-that-influence-peoples-lives-100802\">hurried programmers<\/a> might be trying to exploit your data and your cognitive and digital vulnerabilities, resolve to be more secure in 2019.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img decoding=\"async\" style=\"border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important; text-shadow: none !important;\" src=\"https:\/\/counter.theconversation.com\/content\/108565\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" \/><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: http:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><strong>Author:<\/strong> <a href=\"https:\/\/theconversation.com\/profiles\/elissa-redmiles-337362\">Elissa Redmiles<\/a>, Ph.D. Student in Computer Science, <em><a href=\"http:\/\/theconversation.com\/institutions\/university-of-maryland-1347\">University of Maryland<\/a><\/em><\/p>\n<p>This article is republished from <a href=\"http:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/clean-up-your-cyber-hygiene-6-changes-to-make-in-the-new-year-108565\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data breaches, widespread malware attacks and microtargeted personalized advertising were lowlights of digital life in 2018. As technologies change, so does the advice security experts give for how to best stay safe. As 2019 begins, I\u2019ve pulled together a short list of suggestions for keeping your digital life secure and free of manipulative disinformation. 1. [&hellip;]<\/p>\n","protected":false},"author":117,"featured_media":31539,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_uag_custom_page_level_css":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[629,511,512,513,514,253],"tags":[],"class_list":["post-31537","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-university-of-maryland-baltimore","category-university-of-maryland-eastern-shore","category-university-of-maryland-baltimore-county","category-university-of-maryland-college-park","category-university-of-maryland-university-college"],"aioseo_notices":[],"uagb_featured_image_src":{"full":["https:\/\/www.tun.com\/blog\/wp-content\/uploads\/2019\/03\/Clean-Up-Your-Cyber-Hygiene-6-Changes-To-Make-In-The-New-Year.jpg",830,533,false],"thumbnail":["https:\/\/www.tun.com\/blog\/wp-content\/uploads\/2019\/03\/Clean-Up-Your-Cyber-Hygiene-6-Changes-To-Make-In-The-New-Year-224x144.jpg",224,144,true],"medium":["https:\/\/www.tun.com\/blog\/wp-content\/uploads\/2019\/03\/Clean-Up-Your-Cyber-Hygiene-6-Changes-To-Make-In-The-New-Year-300x193.jpg",300,193,true],"medium_large":["https:\/\/www.tun.com\/blog\/wp-content\/uploads\/2019\/03\/Clean-Up-Your-Cyber-Hygiene-6-Changes-To-Make-In-The-New-Year.jpg",830,533,false],"large":["https:\/\/www.tun.com\/blog\/wp-content\/uploads\/2019\/03\/Clean-Up-Your-Cyber-Hygiene-6-Changes-To-Make-In-The-New-Year.jpg",830,533,false],"1536x1536":["https:\/\/www.tun.com\/blog\/wp-content\/uploads\/2019\/03\/Clean-Up-Your-Cyber-Hygiene-6-Changes-To-Make-In-The-New-Year.jpg",830,533,false],"2048x2048":["https:\/\/www.tun.com\/blog\/wp-content\/uploads\/2019\/03\/Clean-Up-Your-Cyber-Hygiene-6-Changes-To-Make-In-The-New-Year.jpg",830,533,false]},"uagb_author_info":{"display_name":"Elissa Redmiles","author_link":"https:\/\/www.tun.com\/blog\/author\/elissa-redmiles\/"},"uagb_comment_info":0,"uagb_excerpt":"Data breaches, widespread malware attacks and microtargeted personalized advertising were lowlights of digital life in 2018. As technologies change, so does the advice security experts give for how to best stay safe. As 2019 begins, I\u2019ve pulled together a short list of suggestions for keeping your digital life secure and free of manipulative disinformation. 1.&hellip;","featured_media_src_url":"https:\/\/www.tun.com\/blog\/wp-content\/uploads\/2019\/03\/Clean-Up-Your-Cyber-Hygiene-6-Changes-To-Make-In-The-New-Year.jpg","_links":{"self":[{"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/posts\/31537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/users\/117"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/comments?post=31537"}],"version-history":[{"count":0,"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/posts\/31537\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/media\/31539"}],"wp:attachment":[{"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/media?parent=31537"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/categories?post=31537"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/tags?post=31537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}