Join Jess Stratton for an in-depth discussion in this video Protecting other people's names and locations, part of Learning Computer Security and Internet Safety.
- In addition to protecting other people's email addresses when you're going to forward something out, you can also protect their privacy on social networks like Facebook and Foursquare. For example, take this Facebook post about a concert event going on. I could tag this person, saying "I know Matt Stratton is going with me, who else?" but, because I'm directly tagging this person that means it's going to show up on his Facebook page. Now, every single person that he's friends with will know exactly when and where Matt is going to be because without his permission, I've just told everybody.
So think about next time you're going to tag somebody for a particular event or if you're just giving a friendly tag, such as, having coffee with so and so at so and so. Make sure you get their permission first. The other thing I like to do is change the way I use Foursquare. Foursquare is an app in which you can get good deals on lots of services, and also, check in when you're arriving there. You can open your mobile phone when you arrive at a certain location, press the Check In button and you'll be tagged as having been there.
You can get rewards for visiting a certain type of business, often. If you still want to get these rewards without telling everybody that's in your Foursquare network where you are physically, you can always click the Check In button right when you're getting ready to leave. That way you still get the credit for having been there. However, anybody who sees you Check In, if they try to go there, you won't be there because you checked in right before you walked out of the door. Your phone still knows you're there because you're checking in at the location.
However, it's protecting your privacy and the privacy of anybody who may be with you. So, it's always a good idea to be aware of what kinds of things you're tagging other people with. Tagging them to a photo is one thing, but tagging them to a complete place, location or time is a completely different matter and one you need their permission for, first.
- Installing updates
- Using antivirus software and protecting against viruses
- Enabling Windows Firewall
- Using password-management software
- Encrypting files that contain sensitive data
- Securing your router and protecting the SSID
- Understanding the signs of a secure website
- Checking settings for Internet Explorer, Firefox, Chrome, and Safari
- Unsubscribing from email subscriptions
- Reviewing site privacy settings
- Browsing on a public computer
- Understanding cookies
- Protecting other people's names and locations
- Fact-checking email warnings