• Home
  • Products
  • Purchase
  • Support
  • Company

CompuClever Blog

How to Protect Your Privacy & Identity on Facebook – Part 2

April 18, 2018 by Andy Thompson

In our Part 1 article we covered news related to the Facebook privacy scandal. In Part 2, we will emphasize what you can do.  We’ll provided three best-practice recommendation for protecting your identity and privacy.

Our Private Data

As Facebook users we accept the privacy policies when we sign on.  For the most part we don’t even read over the extensive policy pages.  Instead we set up our account and enter data related to our personal lives.  We understand in the process this information gets recorded and stored.

Take Action:

We recommend that you get a clear idea of how much and what kind of data Facebook collects on you.  Check out the “Data In” section of our previous article for directions on accessing the data Facebook has collected from you.

Facebook is a free service and we can expect that they make revenue by providing our data to advertisers.  What many of us are not aware of is that they pass on our data to third party developers and organizations.

This is why we can sign on to a new app or online service using our Facebook login.  Right away they can access our data so that it is easier for us to create a new account with the third party app rather than having to enter all the personal information they require once again.

But what kinds of control are in place once our data leaves the hands of Facebook?  What kind of regulations are there to protect our privacy and information?  This is what Facebook’s Mark Zuckerberg has to address.

Facebook Updates

In the past Facebook has revised its privacy policies.  However, these previous revisions have been toward openness and sharing rather than protection of privacy.  Unfortunately, “…they were optimizing for profitability rather than security and privacy of their members” says David Kirkpatrick author of the Facebook Effect.[1]

Zuckerberg’s promise at the beginning of this year was to fix Facebook in 2018 – this is no small task.  In fact, he has stated that fixing the company’s problems will take years.

Presently, users are informing users in their News Feed if they’re among the millions of people whose data was improperly harvested by Cambridge Analytica.

Other changes we can expect in the near future: [2]

  • Users will receive notice of all apps they use and what data is shared with those apps.  They then have a chance to delete apps they no longer want.
  • Facebook will restrict access to certain data that applications can acquire.
  • The option to search for users by entering a phone number or an email address will be removed.
  • Facebook will set out to delete all logs after a year and only time of calls will be collected.
  • New policy will also make users aware that WhatsApp and Instagram are part of Facebook and that the companies share information about users.  WhatsApp will still have a separate policy while Facebook and Instagram continue to share one.

Free

Whenever something is offered for free we need to ask: how is this business generating revenue?  Some companies offer a trial license for their software as a means to test drive the service.  Others rely on donation.

In the case of Facebook, it is free to users but there are associated costs.  Not only does Facebook sell data to advertisers who then place ads that are targeted to meet our purchasing preferences, they also harvests our data for app developers as well.

Surveillance Capitalism:

One term being used in many news sources related to this Facebook scandal is “surveillance capitalism”.  Shoshana Zuboff, Harvard Business School professor states that it drives much of the internet.

It’s behind most of the “free” services, and many of the paid ones as well.  It utilizes psychological manipulation in the form of personalized advertising to persuade you to buy something or do something, like vote for a candidate.

“…while Facebook is one of the biggest players in this space, there are thousands of other companies that spy on and manipulate us for profit.” [3]

We need lawmakers to force these companies into the public spotlight and to enforce lawful conduct.

Regulation

Although Facebook is in the process of change and updates we need to ask: how is it possible to keep private data secure after it’s sold to third parties?  Facebook has admitted that it is impossible to monitor what these third parties do with the data once it is out of their hands.  However, Mark Zuckerberg has said that his industry should be regulated.

At present he is facing Congress and has delivered an apology and is answering questions.  But what will be the outcome of this?  What about past regulation?  Zuckerberg has stated they regularly testify before Congress on a number of topics.

In 2011, Facebook offered privacy assurances in a settlement with the FTC (Federal Trade Commission).  Allowing Cambridge Analytica to harvest data could be a violation of that settlement.  The ability to transfer the data of users’ friends should have been banned with the 2011 consent.  But what is the FTC going to do to enforce existing regulations?

Turning Up The Heat:

In 2016, the European Union passed the comprehensive General Data Protection Regulation, or GDPR.  One mandate restricts collection of personal data of EU citizens to be only saved for “specific, explicit, and legitimate purposes” and only with user consent.

This means, consent cannot be buried in the terms and conditions.

This law will take effect in May and companies worldwide are paying attention.  It is expected that this will expose the industry like nothing else.  In preparation for this law, PayPal published a list of companies it might share your personal data with – over 600 companies.

 Best Practices – Privacy at Stake

There is no doubt that privacy of information is at stake.

It’s essential that we throttle back on what information we make available online and what data is stored on our PC.  Here are our recommendations.

    1. We recommend the privacy functionality associated with PC Cleaner. By using the available functionality you can see all the personal and private data you have on your PC which could be accessed by illegitimate means.
    1. When on a public Wi-Fi network, we highly recommend not sharing out any sensitive data. Even downloading records online from a public location or terminal can leave your data vulnerable to hacks.
  1. If you decide to delete your Facebook account, consider the following:
    • You will need to sever all ties with Facebook including Messenger, WhatsApp, and Instagram. Your data can be shared with these apps and policies are similar or, as with Facebook and Instagram, shared.
    • Any apps that you “log in using Facebook“ will no longer work and you will have to enter your log in credentials for these.
    • Delete all Facebook instances from all devices including your mobile ones. Make sure you delete and not deactivate.  Use this link from Facebook.
    • Do not even attempt to log in to Facebook for at least two weeks or you will cancel the account deletion process.

Last Comment

We started out this two part series asking a question of what to do as a Facebook user.  Undoubtedly, the data breach has been the final straw for some and these users are choosing to delete.

Do we throw the baby out with the bath water?

We need to acknowledge that there are positive online developments, and we need to take an active role in shaping it.

With respect to the baby / bath water analogy – we certainly can agree the bath water is dirty!

As for the baby – in the case of social media technology – we need to closely examine if it’s being overfed.

“…the thing we need to understand now,” Shoshana Zuboff states, “is that the online world, which used to be our world, is now where capitalism is developing in new ways.”

[1] http://money.cnn.com/2018/04/09/technology/

[2] https://www.ctvnews.ca/sci-tech/

[3] https://www.schneier.com/

Filed Under: Blog, online security, Online Share, Windows tips Tagged With: Facebook, online identity, online security, privacy, security breach

How to Protect Your Computer from Ransomware

April 29, 2016 by Charles Edward

Ransomware is the latest threat to afflict millions of computer users worldwide. What’s really startling is that even police departments are being affected. Let’s take a look at what ransomware is, and how you can protect yourself against it.

Cyber-criminals have so far collected more than $200 million in the first three months of 2016, and are on track to steal $1 billion by the end of the year.

How?

By tricking regular people, as well as businesses and institutions, to download “ransomware” that takes control of computers and servers. If you want to unlock your computer data, you have to pay the crooks.

It’s a lucrative scam and no one is safe: hospitals, school boards and even police departments have all been blackmailed by ransomware criminals so far this year.

You Don’t Even Have to Download Ransomware to Infect Your Computer

Most recently, Game of Thrones fans were targeted by ransomware just by visiting the Pirate Bay video downloading site.

What’s most frightening about this example is that the visitors to the Pirate Bay didn’t actually download any malicious files.

Instead, all they did was get secretly redirected to a webpage that exploited common security holes in their Internet browser. Ransomware was “injected” into their computer before they knew what was happening.

What is “Ransomware”?

Ransomware is a type of malware—a malicious software program—that, once installed, takes over your computer. Ransomware may prevent your computer from working properly. It can also encrypt or lock away important data, including photos and music files.

The only way to regain control of your computer is to pay off the ransomers, usually by wire transfer or some other untraceable payment method.

How Does Ransomware Get Installed In the First Place?

Sometimes ransomware is downloaded and opened by accident. You may think you are downloading a video file or a useful software program, but in reality you are installing ransomware on your computer.

Sometimes people claiming to be “MS tech support” call you up, and persuade you to download what they claim is some sort of computer utility program.

They walk you through the process, step-by-step, over the phone, to download the ransomware.

Still, what is the most common ransomware “exploit”?

Your Internet browser. Thanks to weak coding, Internet browser security vulnerabilities are being found by cyber-crooks all the time. Visit the wrong web page by mistake and ransomware is downloaded automatically onto your computer.

Once downloaded, a common ruse to complete installation of the ransomware is for a pop-up screen with an “FBI warning” to appear on your computer. Push any button on the popup and the ransomware installation process gets finished, and your computer is hijacked.

Police departments and other government agencies can’t provide much help—they are overwhelmed by other problems and simply cannot track down the cyber-criminals.

So, to get rid of the ransomware and regain control of your computer, the only thing you can do is pay off your hijacker.

Or, you can take steps to avoid downloading the ransomware in the first place.

How to Protect Your Computer from Ransomware

1) Make sure you have antivirus installed

Make sure you have a current, legitimate antivirus program installed on your computer. Antivirus continuously scans for Internet attacks and malicious web pages that try to download ransomware without you knowing it.

Did you know CompuClever offers a comprehensive Internet security solution that continuously blocks Internet attacks and malicious web pages that try to download ransomware without you knowing it?

Check out CompuClever Antivirus PLUS, an innovative security software. CompuClever Antivirus PLUS has received a full mark with a rating of “SOLID” from the prestigious VB100 antivirus testing lab.

2) Hang up the phone on “Microsoft tech support”

Microsoft or any other software company never, ever phones (or emails), offering to help fix a problem they have identified on your computer. If someone claiming to be from tech support phones you up, hang up the phone immediately.

3) Backup your files on an external disk

Make sure important such as photos, music and videos are stored on an external backup drive. Backing up data is easy to do, thanks to cheap USB drives that now have more storage space than some laptops.

If you do download ransomware, before paying the cyber-crooks a single cent, ask a computer-savvy friend for help or obtain professional tech support.

There are many reputable programs and utilities that can help you gain control of your computer.

Have a request for Tech Corner? Email me at newsletter@compuclever.com.

Filed Under: Blog, online security Tagged With: computer scam, hacking, how to, malware, online identity, pc tips

Protect your online identity

December 12, 2011 by Charles Edward

protect your online identityIt’s the Christmas season, and more and more people are doing shopping online in order to save time and to stick to a budget. If you’re doing a lot of online holiday shopping, are you taking basic steps to protect your online identity?

You might be surprised by the amount of personal information that is stored on your computer – everything from passwords to, in some cases, banking and credit card information.

If you happen to download malware such as a Trojan or a virus, it may be possible for someone to learn and use your personal information – after you’ve been using your credit card to buy Christmas presents, for example – which can become a nightmare to fix.

So, to save you some worry, here are 2 tips for protecting your privacy online:

1. Scan your computer for cookies, passwords, chat email history, web search term history

Every time you use the internet, your browser stores “cookies” that remember personal information about the websites you’ve visited – personal information such as passwords for your online banking, your birthday, or even your mother’s maiden name, for example.

Your internet browser also saves the specific search terms you’ve been using to find things on the internet. Your internet chat program is also storing the records of every hat you’ve ever had.

Add these three different kinds of personal information together, and it’s possible to learn a lot about your private information, which can have serious consequences if the wrong person has the chance to snoop through your computer.

So, one way to protect your privacy online is to scan your computer for cookies, passwords, chat email history, and web search term history, and delete unneeded information.

2. Delete temporary files

Your web browser regularly creates temporary or “temp” files of the websites you visit to help speed up the browsing process. This means anyone with access to your computer can see any web page you’ve ever visited.

So, if you’re worried about online privacy, it’s always a good idea to periodically remove temp files. As an added bonus, removing temp files can sometimes speed up your computer.

More next time

That’s all for now. If you’re interested in using a powerful tool that will help improve computer performance, why not give PC Tuneup Maestro a try? PC Clean Maestro can help you easily remove speed up Windows.

 

Filed Under: Blog, computer fixes Tagged With: hacking, malware, online identity

Don't miss out

Get a copy of "5 Tips for a Fast PC" when you sign up for our free "PC Tips" newsletter.

Subscribe Now
Archive Newsletter

Recent Posts

  • Ultra File Opener 5.7 Release Note

    Ultra File Opener 5.7 Release Note

    July 24, 2018
  • How Blue Light Affects Your Health and What to Do About It

    How Blue Light Affects Your Health and What to Do About It

    May 11, 2018
  • How to Protect Your Privacy & Identity on Facebook – Part 2

    How to Protect Your Privacy & Identity on Facebook – Part 2

    April 18, 2018
  • Facing the Truth – Facebook & Privacy

    Facing the Truth – Facebook & Privacy

    April 7, 2018
  • Spectre and Meltdown:  Massive Security Holes Impacting All Mac and PC devices

    Spectre and Meltdown: Massive Security Holes Impacting All Mac and PC devices

    January 12, 2018
  • How to Fix Computer Sound Problems

    How to Fix Computer Sound Problems

    December 19, 2017
  • Correct Ergonomics Sitting at a Computer Desk

    Correct Ergonomics Sitting at a Computer Desk

    November 17, 2017
  • Five Useful Tips and Tricks for Windows 10

    Five Useful Tips and Tricks for Windows 10

    August 27, 2017
  • Going Incognito – Browse Web in Privacy Mode

    Going Incognito – Browse Web in Privacy Mode

    August 4, 2017
  • Don’t be Held at Ransomeware

    Don’t be Held at Ransomeware

    July 14, 2017
Contact Us | Privacy Statement | Terms of Use | EULA | Partner With Us | Uninstall | Blog
CompuClever© Systems Inc. 2023 All rights reserved.
Microsoft is a trademark of the Microsoft group of companies. All other trademarks are the property of their respective owners.