• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Security   »   Protecting Your Privacy – A Key to Online Security

Protecting Your Privacy – A Key to Online Security

  • Posted on:October 9, 2014
  • Posted in:Security
  • Posted by:
    Richard Medugno
0

Let’s face it, folks. Maintaining your online privacy is really hard to do today. Even though it’s difficult, you should try to keep as much of your personal stuff under wraps as possible.

There is a new identity fraud victim in the U.S. every three seconds.  Identity thieves don’t just look through your garbage for old mail, they dig through your social networks to see what they can find to help them steal your money.

Beyond theft, we frequently hear in the news about how careless posting of opinions, photos, and private information can lead to damaged reputations, or worse, not getting the job you wanted or getting into your dream school.

Minimizing your digital footprint

High-tech entrepreneur and billionaire Mark Cuban recently said, “To minimize our digital footprint is critical when a single out-of-context social media post can ruin a career or even be far worse.”1

There are many examples where TMI (too-much-information) sharing online has led to very unfortunate outcomes for the individual that over-shares. They include the famous and not-so-famous (later infamous):

  • A high-tech executive mentions “undisclosed details” about his company’s plans on his LinkedIn profile
  • The restaurant worker who criticized a boss who was a “friend of a friend” and saw the Facebook post, leading to her dismissal
  • The teenaged girl who tweeted about being home alone and then being attacked

Giving your “friends” TMI 

If you go online to do anything beyond browsing websites, you are potentially revealing personal and private information to anyone who has Internet access. For instance, let’s say you go on a social network like Facebook, Twitter, or LinkedIn and start posting about how your Yorkshire terrier “Bootsie” is expected to take best-in-show at the next Westminster Dog Show.

You may be providing  “friends” or friends of “friends” in your network with all the information they need to crack your financial or other sensitive account password.

Chances are you’ve created a password that includes a reference to your dog like “Bootsie123” or “Bootsie#1.” And even if your “friend” can’t figure out your password on their own, there’s always some password cracking software that could be used to help get it. At the very least, your “friend” will know that you’re not going be home while the dog show competition is going on and have an opportune time to burglarize your place.

Tools to help maintain the delicate balance

Trend Micro has enhanced Security 2015 software to help provide comprehensive privacy and protection anytime, anywhere, and on any device. Trend Micro Security 2015 solutions work across a range of the most popular digital platforms, including your PC, Mac, and mobile devices (Android™ and Apple iOS). In short, this new version of Trend Micro Security will help protect against all threats, regardless of your device or operating system.

To maintain an appropriate level of privacy online, yet make use of all the advantages the web has to offer, you have to accept a certain amount of risk. You’ll need to balance the loss of privacy and the chance of your information being used against you versus the convenience and speed you get from doing tasks online. If you need help maintaining this delicate balance, Trend Micro Internet Security 2015 can provide you with the necessary tools and features, including:

Dangerous Website Blocking

  • Protects against threats by identifying and blocking dangerous links on websites and in social networks, emails, and instant messages 

Social Network Privacy Scanner

  • Identifies privacy settings on four major social sites (Facebook, Google+, Twitter, and LinkedIn) that may expose your personal information and lead to identity theft

Phishing Email Blocker

  • Helps prevent identity theft by blocking phishing emails

Password Manager

  • Manages and encrypts all your website login IDs (user names and passwords) in one secure location, so you only need to remember one password

Secure Browser

  • Provides a safe place for online banking

Mobile Apps

  • Helps protect Android and iOS devices

Managing your online privacy and security in this highly-connected world is something that can no longer be overlooked. Trend Micro Security 2015 will help you keep your private information safe.

Learn more about how you can enjoy your digital life safely and confidently by visiting our website: Trend Micro Security 2015.

1 5 Questions with Mark Cuban about Online Privacy http://www.huffingtonpost.com/john-p-david/5-questions-with-mark-cub_b_5825682.html?utm_hp_ref=business&ir=Business

Related posts:

  1. PROTECTING YOUR PRIVACY – Part 1: The Privacy Risks of Social Networks and Online Browsing
  2. Using Trend Micro Security’s Privacy Scanner – Part 1: Social Network Privacy
  3. 10 Suggestions for Your 2014 Online Security Resolutions
  4. PROTECTING YOUR PRIVACY – Part 2: How to Maximize Your Privacy on Social Media and in Your Browser

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Digital Transformation is Growing but May Be Insecure for Many
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.