Why it is crucial to have internet security studies

In the web world, security refers to the precautionary steps taken to safeguard computing resources against hackers. The main goal of internet security is to prevent cyberattackers from gaining access to your personal information. For children, the internet seems to be an extremely useful tool for making friends, entertainment, and new learning. However, the lack of proper internet security studies in schools can place the kids at great risk of facing abuse or getting involved in illegal activities. It can be anything from fraud and bullying to something more serious. While it’s extremely important for kids to understand the common internet security threats, it also pays to teach them ways to protect themselves like using a VPN client whenever they connect to the internet. Using a VPN service can protect them in an all-around manner including in case of:

  • Identity theft: It can be highly tempting for kids to provide more and more information on the internet but personal information like phone number, postal address, any banking information etc can lead to huge consequences. This may include stealing money, committing crimes that the kids could land up into trouble for, and committing crimes that might put them in danger, amongst others.
  • Viruses: This destructive software can run on the pc without the kids’ knowing about them. Viruses can trigger damage by deleting important files, allowing hackers to monitor the pc and even letting them steal personal information.
  • Botnets: This is a network of malicious computers used together that can be controlled remotely. Cyber attackers can have access to those computers and use them for illegal activities like sending spam. All this may be done without the users knowing what is happening.
  • Loss of intellectual property: Intellectual property refers to the ownership of individual’s production or ideas. This may include artwork, movies, music etc that are protected by law. Hackers often try to steal these properties and either sell them or use them in unauthorized manners.

Apart from using a VPN client always, there’re various safety measures that kids should maintain while using the internet such as

  • Making sure they have a proper firewall in place.
  • Updating the operating system regularly.
  • Only using secure websites.
  • Using the latest antivirus software.
  • Using strong passwords.
  • Not opening email attachments coming from unknown people.
  • Maintaining security when downloading the software and sharing files as they may contain spy-ware and easily spread viruses.

In today’s continually changing scenario, cyberattackers are continuously trying to get their hands on whatever personal information they can access. They mainly depend on the users being uneducated, which make the children pretty vulnerable to these people with malicious intent. Yet, by ensuring the children have a good understanding of internet security, most of such attacks and threats can be prevented and data privacy can be maintained.

 

Email viruses: How spam can ruin people’s lives

 

virus evolutionSince the evolution of mankind, Viruses have been an impediment to human development. This is what some witty computer programmers copied and translated the properties into computer programs. The intent of any virus is to replicate itself and destroy the host system. The most common way a virus can enter a computer system is through an email.

So what is the difference between a spam and a virus? Basically, a spam is a form of commercial advertising which is deemed economical due to the cost effective medium being used to reach potential buyers. Spammers get recipient addresses from publicly accessible sources and use dictionaries to guess common names of the recipient.

Viruses, on the other hand, are malicious programs used to destroy or corrupt information. These small programs are usually sent attached to spam emails. They are very detrimental to your information since once they are run on your computer they replicate and start damaging your data.

 

What are the effects of spam?

spamApart from the junk in your inbox, spam emails have indirect and serious effects on email servers. Many spammers use specially designed software to create false email headers and using various server names and domains confuse domain admins, email service providers and finally the victims of the spam email sent.

 

Hijacking

Hijacking: There are instances where real user accounts have been hijacked and it all begun from spam emails. With millions of spam sent daily, many email users have been affected by falsified messages which claim that they are from the administrators. They claim that the account is closed and the users need to reopen the account. With such messages, users need to ignore the message and delete them.

PhishingPhishing: another common effect of spamming is phishing. These emails appear to be sent from a legitimate source with the main aim of tricking recipients into giving out sensitive information on fraudulent websites.

 

Complete destruction of data: one of the most common effects of opening a spam email is that it

destruction of data

may be a virus, either in the email itself or the attachment. These emails are always executable having a .exe, .com, .bin, .bat file extension. If it is sent as an attachment, spammers may try and disguise the extensions by having two extensions consecutively. These types of messages must be deleted immediately.

Once you open an executable file, then you do not have control over what happens next as you have wreaked havoc inside your device. But there is no need to worry because there are many antivirus software available in the market. There are also many other options such as VPNs which help mask your data while on a public network. With such resources available, plus email servers spam filters, then you will have minimized the chances of being one of the victims of spamming.

In conclusion, the last defense against an attack is definitely you. You need to be careful about which email you open plus the level of protection you have on your device. Utilize the various resources available such as anti-virus software, VPNs, and email spam filters so as to protect your data.

 

hacks of yahoo

Yahoo Hacks: Everything You Need to Know

During December last year, there was an announcement by Yahoo that there was a huge data breach which was so big and worrying for so many Yahoo users considering the number of people affected by the breach and the sensitive nature of the information that was leaked.Some say that it was a disaster – hacked emails and passwords lead to financial and psychological issues. 

 

So, if you have not heard of that breach by now, here is what you should know.

Over 1 Billion Users Affected

As reported by Yahoo, the hackers stole information of over 1 billion account holders in August 2013. Yes, I know, I was also surprised to learn that it actually happened in 2013 and not in 2016 when Yahoo was reporting it.

Leakage of Sensitive Information

Yahoo was quoted saying, “The stolen user account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (using MD5) and, in some cases, encrypted or unencrypted security questions and answers.” That was the magnitude of the breach.

Luckily, the breach did not get access to users’ credit card number or bank accounts but seeing that they acquired the user’s date of birth, telephone numbers, and email addresses, the bare minimum needed to be used in identity theft and phishing scams.

Top of the list on the leakage was the fact that the hackers may have accessed information that was related to national security at risk. They might have exposed over 150, 000 United States of America government and military officials which included the FBI, the CIA, White House officials and many others who work with very sensitive information on a daily basis.

These officials found themselves in this dilemma because they gave their work email as backup emails in Yahoo in case a lockout ever happened.

 

How Do You Know if You Are Hacked?

When a hack of such magnitude happens, the company hacked is required to reach out to its users to warm them and that is exactly what Yahoo has been doing.

“We are notifying potentially affected users and posting additional information on our website. Additionally, we are taking steps to secure users’ accounts, including requiring users to change their passwords. Yahoo has also invalidated unencrypted security questions and answers to that they cannot be used to access an account,” Yahoo was quoted saying on the measures they are taking to salvage the whole thing.

It is advised not to assume an alert like this one, does not matter whether you use it all the time or not. If requested to change the password, the security questions or any other information pertaining to your Yahoo account, you should comply.

Actively Protect Yourself from Scammer

If you have been hacked, it is advisable to be on guard and ever vigilant to protect your accounts. If a message is sent to you, it will not ask you to click on a link or to download an attachment. Furthermore, your financial institution should not ask you to give your PINs, account numbers, passwords and other information via the email. If so, just know that you have been sent a shady email and you should delete it.

The “actively protecting” yourself part comes in whereby you will be required to create secure passwords and it will need you to regularly change those passwords. Always call and confirm with the company if you suspect an email or a call that has been directed to you.

One cannot stress enough the fact that you are NOT to give your personal information to strangers more so via emails.

Below are some measures you can take to at least try and protect yourself.

Change Your Passwords

For you to protect yourself, you should change your passwords to all your accounts, not only Yahoo’s, and you should do it now. When doing so, you should avoid the loopholes of using commonly used passwords like 12345, 0000, QWERTY and other stupid and very easy to hack passwords.

Make sure that your password is strong by endeavoring to combine letters, numbers, characters (if allowed) and the caps.

The changing of passwords should happen to all your accounts. And you will have to review the security questions in Yahoo as the other ones have been compromised.

Make Use of Two Factor Authentication

If you do not have the two-factor authentication feature, there is a high possibility that anyone who has your password can have access to your account. Using one password for multiple sites will make it even easier for cyber criminals to get access to most of your accounts.

Enable your two-factor authentication and you will have a little bit of security while logging into Yahoo and other sites.

Treat Strange Emails with Caution

If you receive a strange email, email that you good and well know you do not have any connection to, you need to be extra careful with them. This is whereby phishing scams have their prime time to use that opportunity to get some answers for questions left blank.

And do not be surprised, those emails are getting more sophisticated. They will lure you to click on links, download attachments or ask you to give away personal information.

Yahoo has been working day and night to rectify the damage done, both to its users and to its image. A company that has been facing a lot of strife, Yahoo will need to recuperate from such a blow and hopefully come up with something that will impress its users.

Until that time, protect your personal information vigorously and if you see any email prompting you to give your information, delete it immediately.

 

Google and Privacy: How Much Do They Know About You?

Internet Privacy: How to Survive Donald Trump

Internet Privacy: How to Survive Donald Trump

We can all agree that Donald Trump has been a loose canon since his campaign day and when it became apparent that he was taking office, the worry became a full blown concern for our safety and the safety of our country.

The thing that is going on in everyone’s mind right now is how to protect themselves from Trump’s National Security Agency (NSA). He has not yet outlined his surveillance plans but already many are looking on how to protect themselves from it.

The following are some of the ways listed that can help you to protect yourself from Trump’s surveillance plans, as they say, better safe than sorry. So here goes:

Enlist the Use of Signal

While using encryption to protect the messages we sent via our phones and emails has become an easy protection measure, thanks to programs like Pretty Good Privacy (PGP) which is the ultimate program to use if you do not want any of your information intercepted.

Since its first use in 1991, PGP has been an outstanding and unbreakable encryption program, even the NSA has not come up with a way to attack it.

Another protection option is Signal which is very easy to use. This app allows users to add each other by using their phone numbers then Signal provides a QR code that can be scanned to double check and ensure that there is nobody listening in in your conversations. As soon as the QR flashes green, that means it is a go and you can have your conversation.

Other alternatives that offer end-to-end encryption are iMessage from Apple and WhatsApp from Facebook.

WeChat and Google Hangouts are unencrypted which opens you up to the possibility of being tapped into. Other apps like Google Allo and Facebook Messenger also have the “optional” encrypted mode which can leave you open to having your privacy encroached on.

When it comes to your emails and text messages, they are easy to intercept which puts you in a vulnerable position because when you look at the both of them, they are a necessity.

Make Tor Your Friend

Also known as The Onion Router, it is free software that allows one to have anonymous communication. If you are guessing that this is the technology used by those who frequent a corner of the internet known as the Dark Web, then you are right. That would be the corner of the internet that houses a lot of illegal things imaginable by human beings.

Surprisingly enough, this technology was created by the United States state department with the aim of aiding activists in tyrannical countries to have a communication line without the worry of being intercepted.

Tor works by wrapping up data and information into bundles which are encrypted several times to dictate a path through a network of volunteer computers before getting to the final destination.

When the information reaches its destination, the server will not know where the request came from. The same applies to the middle servers as they will not know the user or the destination.

For even a more secure connection, Tor Hidden Services does a wonderful job of hiding the user’s activities on the net. If someone is busy snooping, they will not even realize that the user has visited a site because the user’s request does not make it to the surface web and it cannot determine who it was that even did it.

Some of the setbacks to using Tor are:

  • Browsing will be difficult because of the nature of the network
  • Internet speed will be reduced due to the limited capacity which imposes on the bandwidth constraints
  • Some sites that are not comfortable with a user whom they cannot identify will block Tor
  • The probability of messing up while using Tor is high e.g. sending some information over an unencrypted connection by accident, providing a fingerprint that can allow someone who is snooping to identify you

Enlist the Use of a Full Disk Encryption

If you own a Mac, a full disk encryption is probably already loaded, more so on the most recent version of macOS.

We cannot forget Windows users, especially those who have Windows 10 which has a slightly harder process but it is doable. The Microsoft full disk encryption feature known as BitLocker can be turned on by searching for “encryption” from the start menu, then you click on “Change device encryption settings” after which you click on “manage BitLocker” which turns it on. This can be done for other versions of Windows up to Vista and if you have a Windows program older than Vista you will have to upgrade.

The disadvantage with the full disk encryption is that if you forget your passwords when it is turned on, your data recovery will be futile.

Have Password Manager and Two Factor Authentication

It might seem futile to have a password in a world where the NSA has the ability to overrun it but it is worthwhile.

It is so because as usual, you are expected to secure all the accounts you have online with passwords, it does not need the genius to know that.

Using the likes of 1Password, Dashlane and LastPass will give you the option of generating and storing passwords that will be difficult for anyone to guess. To be even safer, you should use a different password for each and every online account you have.

Two-factor authentications are created to protect you even if you misplace your passwords. The way two-factor authentication works is by asking you to enter a code displayed on another device or for you to approve a sign-in when logging in. Popular sites that use two-factor authentications are Facebook, Google, Apple, and Twitter.

When logging into an app or into a device, there are questions that you should ask yourself like, do you really need to give your location settings? Do you really have to give access to your contacts? Can the information I share publicly to be used against me? What about the private information I share, can it be used against me if intercepted?

These and many other questions should help you decide on the type of protection you can use for yourself in Trump’s NSA.

 

How to improve your privacy on Android

How to improve your privacy on Android

We do a lot of things using our mobile devices. For that to be possible, we are required to put in a lot of our personal information in our phones. That information might be quite detrimental to our safety if someone intentionally tries to get for malicious intent.

For that reason alone, it is important to safeguard our information stored on our smartphones. Below are ways that one can do that if they use an Android phone.

  1. Lock Your Screen

This is the simplest form of protection that one can undertake to wade off peeping toms. It comes as no surprise that a lot of people who use Android phones do not use this simple measure to protect their information in their phones. Thieves and malicious people could simply go in and get the information they want which they can use to blackmail or threaten you with. Use your lock screen option fully.

  1. Encrypt Your Device

Those who are quite nifty with phones and computers are able to penetrate your phone even if you have locked it to get information. This is when one is advised to encrypt their device to keep them from getting information. Device encryption is whereby all your information in your phone is stored in a format that cannot be understood till the correct password or key is used to decrypt it.

  1. Be Clever With Your Passwords

Ok, so using passwords like 12345, QWERTY, 0000 and other very obvious passwords will do nothing but make it easy for people to go on your phone. When choosing a password, it is generally advised to combine cases, numbers and special characters to create an unbreakable password.

  1. Make Use of Virtual Private Networks (VPNs)

VPNs make it hard for the bad people to track your internet usage by routing your traffic through different servers thus making it hard for your IP address and your device is connected to one end service. As helpful as they are, they do not keep you completely invisible. If you want to go dark, you will have to forego the free VPN services and fork out a little to get faster internet service and better privacy.

  1. Reign in Your Apps

Apps are both a blessing and a curse. They make life easier for our daily use but in doing so, they have become one of the major information collectors via our mobile devices. Before installing any app on your phone read through the permissions required by the app and evaluate the relevance of the requests. If you see no need for search permissions, uninstall that app. Rather protect your information than having apps collecting your information to sell to advertising sites.

  1. Anti-Virus Apps

Protecting your phone from viruses should be one of the first things you do when you get a new phone. A lot of applications created for malicious purposes are rightfully kept out by the Play Store but to help the store to do so, additional security is required.

Free anti-virus options will definitely be collecting and storing your information to sell to advertisers, which we do not want because of our endeavor to preserve our privacy. But there are other versions that are reasonably priced and offer the best anti-virus options that even offer anti-theft features.

Features like remote phone locking and wiping are what one can get from the priced anti-virus app. It can also protect your phone from viruses sent via your email.

The above are some of the things you can do to protect yourself from malicious attacks via your Android phone. Protecting yourself and your loved ones from blackmail, identity theft, threats on your life and others and money being stolen can be achieved by simply following some of the guidelines given above.

Ultimately, change how you use your phone now and again. Most phones have location settings that can basically give away all your movements from morning to evening, and when you think about it, you do not want to make it that easy for people to find you, especially people who do not want any good to happen to you. Limit or disable the location app if you can.

If you have apps that you do not use, you can disable them or uninstall them to stop them from collecting and selling your information to sites that advertise. Before installing or updating your apps, read carefully and understand the permissions you will be according to the app, if they are not to your benefit, opt out.

Finally, change your password on a regular basis and make sure you mix up the cases and characters to make it difficult for someone to guess it.

Doing so will give you some decorum of security.

How to enhance your privacy on iOS 10

How to enhance your privacy on iOS 10

If you have ever had your privacy breached in any way or form, you sure do know that it made you feel vulnerable, targeted and basically naked.

Having your privacy is a right that is valued by everyone, more so in these times where computers and mobile devices have taken over communication making it easy for one’s personal information to be found. We should endeavor to protect ourselves from having our identities, information, and data from being stolen or meddled with.

The following are 10 measures one can take to protect their privacy on iOS:

Limit or Disable Location Services

Information on your device that tells your location is the number one way one’s privacy gets taken away from them. Advantageous as it may be, one needs to be careful to give too many apps or services access to their location or how it is being used. You can always configure your location settings to only allow the apps or services that you want to know your location, if not, you can simply disable it.

Configure the Settings for Safari

When using Safari, it may be easy for someone to have a peek of your information. This is because information is tracked automatically and the websites opened might give away your information. Settings like private browsing and other settings that can be configured are offered by Safari to enhance privacy.

 

Use Touch ID

This tool is the best thing on iPhone which allows you access to your phone by using your fingerprint. It is very easy, fast and secure. It also allows you to access your App Store and specific applications that require maximum security like PayPal. For one, your fingerprint is not accessible in any way as it is stored in a “Secure Enclave”. Secondly, it is not stored as an image but in a mathematical form. One should use Touch ID for everything they do.

Limit or Disable ad Tracking

Driven by market growth, some apps used on iPhones support ads. Apple uses ad tracking which gives access to iAds which bring up advertisements that are configured to your interests after accessing your information. What one can do is to limit or disable iAds ability to track your information to stop those ads from popping up.

Set Your Auto Lock

Setting your auto lock will always dim your iPhone or iPad when not in use or when the battery is low. It prevents any snoopy person from going into your device when unlocked and accessing all your private information which includes messages, social media and pictures to name a few.

Use VPN

A Virtual Private Network (VPN) can be used especially if one accesses public networks. How it works is by tunneling your internet information to a remote server which cuts off anyone who tries to access your information. VPN providers like betternet and TunnelBear can be used or one can opt to pay for such services or make their own VPN at home.

Decrease Diagnostic Data Sending

Every time you come across a problem, you are prompted to send information which tells Apple that a certain program has a problem. Doing so also allows Apple to access your information which in hindsight they use to improve their product. To be safe, it is advisable to disable that feature.

Disable iCloud Photo Diary and My Photo Stream

I do not know about you but there is just some unease in having all my photos, videos and information out in some cloud that can be accessed by some malicious person with bad intentions if they really wanted to. If you do not want your pictures accessed, you should disable the iCloud and Photo Stream features which keep your fond memories of the internet.

Hide Notifications from Lock Screen

Simply put, whenever a message or any type of notification pops up, it can be seen on your screen. This makes it easy for a snoopy person to see what the messages are all about. One can stop that from happening by disabling the Show Previews option.

All in all, you should strive to protect yourself and your loved ones from malicious people out there. Take advantage of all the features provided by Apple to protect yourself as your privacy and security depend on your proactivity to do so.

Privacy Leak

How a Privacy Leak Killed AshleyMadison.com

When Ashley Madison users logged into the dating website, they were confident that their information was secure but much to their chagrin, their particulars were leaked off to the public thanks to lax security safeguards used by Ashley Madison.

AshleyMadison.com came under the umbrella of Avid Life Media Inc. (ALM) which went through a data breach whereby information of about 36 million account holders at the dating site was leaked in 2015.

Causing an uproar around the world, the leakage destroyed the lives of many people considering the fact that the dating site encouraged infidelity or rather it was a platform for married people to look for a partner to cheat with.

How Security Was Easy to Breach

An investigation was done to determine how the security breach could occur and the findings were mind-boggling, especially considering the kind of site it was.

Some of the findings were that the security framework at ALM did not have the following components:

  • It lacked a record of information on its security policies or practices which would have created an environment where security was an important factor as they ensure that training, resourcing, and management were imperative to the security of their users.
  • ALM lacked a backup management process which would look at possible threats to the site, assess the security measures taken by ALM to ensure that they were strong and could resist an attack.
  • The staff at ALM did not have the required training to enforce the process of making sure that the privacy and security of Ashley Madison were not breached.

All in all, ALM took a lackluster approach to protecting the privacy and the personal information of the millions of users of AshleyMadison.com.

The lack of an active risk management process that would safeguard the personal information of the many users of a site was the downfall of AshleyMadison.com.

The lack of proper training, setting up proper policies, documentation, oversight, and lack of authority to make decisions caused this whole thing to unravel. In general, ALL business should be able to protect themselves fully for something like this not to happen and for ALM; they basically took a back sit on security and privacy.

As much as they did have some sort of security measures, those measures were not adequate enough for an onslaught of this magnitude. The people who set it up and approved it did not pay attention to the kind of risks that they could come across. These put them on a lull and they could not anticipate a breach that basically killed the business, a risk that a business of this magnitude could not afford to take.

The lack of a strong security framework was not the only reason the security and privacy of ALM were breached. It’s laughable single factor authentication and poor key and password management practices led to its fall.

Lawsuits from the Users

Apart from the very lax security measures undertaken by ALM and their very inactive approach to protecting the users who were logged into AshleyMadison.com that will cause them to lose a lot of money, ALM will also have to deal with lawsuits from the millions of users whose information and profiles were laid out on the table for the world to see.

All the users had their reputation tarnished (go figure) and ALM will have to pay up if they will not be able to sufficiently prove that there was no harm was done, which will be very hard considering.

There will also be lawsuits from the people who had paid Ashley Madison to have their names removed from the website but it turned out that the company’s “full delete” feature is just that, a feature. Those peoples credit card information was still in the system, exposing them as well.

Lawsuits of false claim could be filed and ALM might get slapped with a deceptive trade charge.

Complications Facing ALM

The above lawsuits are most likely to be filed in the United States of America. But it is a site that was used worldwide, many lawsuits will be coming from different countries around the world. Different laws will have to be considered, some of which are more stringent than others.

Legal Fees

To handle a case of this magnitude, which will move across the globe, considering that a lot of the users came from outside the United States might have quite an effect on the legal fees.

Holding on to the information of the tens of thousands of people who had paid to have their user profiles and personal information scrubbed from their system was should not have happened at all.

It is things like that that will get a company sued but ALM and especially Ashley Madison did not pay much attention to that factor. They did not undertake very good data protection measures that would have saved them a lot of trouble and money.

All in all, this is a lesson to all businesses out there. As we watched Ashley Madison go down because of bad security measures and very bad data policies, many wondered whether there will be another Ashley Madison and whether the new one would be able to withstand the kind of storm Ashley Madison and its umbrella company is going through.

However the case goes, it is quite definite that this hack and security breach has rattled the web and it will take a while before the same kind of site is up again. Because if it does come that a newer Ashley Madison type website comes up, they will have to have a strong security lock and unbreakable data policies. They will also have to have a very good team of staff that is well versed in securing a site of that magnitude from such attacks.

Google Privacy

Google and Privacy: How Much Do They Know About You?

Have you ever wondered to yourself how much information Google has on you?

Being one of the top providers of internet services like Gmail, Google Drive, and Google Hangouts, services that are free to use, a big chunk of Google’s revenue comes from the information it collects from the billions of users it has. This information it gathers is then used for advertisements.

How does that work, you may ask? Well, you may have noticed that when you use Google to search for something, let us say, your search for a restaurant in your area, you will notice that every time you are on Google, there will be restaurant advertisements appearing in every link you click on.

So, should we be worried that Google knows a lot about us?

Web History 

The trail you live online when you visit Google is tracked using the Google Web History. The Web History works in such a way that it uses your past searches to put together preferable future search results for you. Those results are used by marketers to advertise their goods and services.

If getting those advertisements irritates you, you can visit Google Ad Settings and change your preferences or you can simply choose not to have advertisements whenever you are using Google.

Another site that checks out your search and viewing history is YouTube. It keeps track of all your subscriptions and your searches so that it helps Google know what it is that you like searching. Just go to your Google Dashboard and everything will be laid out to you, which can be a little scary.

If you thought going incognito on Google Chrome would preserve your privacy, you are wrong. You will have to take extreme measures like getting VPNs and Tor network to get some privacy when on Google.

How to Find Out What Google Knows About You

If you would like to know what Google has gathered on you and you want to change that fact and keep yourself safe,  check out how to below:

  1. Information Gathered

As mentioned earlier, Google will gather information according to your search history so that it can send you adverts that fit your preferences. To be able to stop that from happening, you can simply go to http://www.google.com/settings/ads/ to change your settings or opt out.

  1. Location History

Google collects your location history especially if you are using an Android phone. Imagine if someone had access to that information if they really needed it? To erase that probability you can visit https://maps.google.com/locationhistory to change the settings.

  1. Erase Entire Google History

If you would not like anyone to see what you have been searching, even that embarrassing search on that itch, you can to https://www.google.com/history/ delete all your searches.

4 Receive a Security Report Monthly

To monitor how secure you have been when using Google, you can have a monthly report sent to you on a monthly basis. To enable that option go to https://www.google.com/settings/dashboard.

  1. What Else Accesses Your Information?

There are other devices and apps that access your information via Google. To stop that from happening, you can go to https://security.google.com/settings/security/permissions to deny those apps and extensions permission to use your information.

It is scary how much Google has on a person. It shockingly has information that is undeniably complete, one cannot contest it. As usual, Google’s defense is that it does not use that information for anything else other than giving you advertisements.

To protect yourself, it is advisable to educate yourself on how you can privatize your Google account. Many people do not know that their privacy is being invaded, harmless as it may seem.

Do what you can to at least not make it easy for hostile access to your information. Visit the Google Dashboard or follow the links above to make some adjustments and protect yourself.