Do You Know What is Internet Literacy and Data Privacy?

Internet and technology are now part of everyone’s life, and it is significantly important for us. So there are certain rules and good practices to follow just like we do for tools and Yes, the Internet is also a kind of tool. We can use the tool safely and we can get more out of it if we know certain basics. So you may be thinking is it really that important. This article is all about this.

Is Internet Literacy and Data Privacy really that important?

Ok, for the first part internet literacy as I mentioned above, internet and technology are like tools without any manual. So you must search for a manual to use efficiently and avoid any downsides of it. Internet is a network and you as a user is part of that network so your action affects the whole network.

For the latter part, is Data Privacy important? Hell yeah. That’s why we have data privacy day on 28 January. Well, You may think I don’t have any confidential data to hide but data privacy is not only about that. Think in this term would you like to be monitored 24/7 by someone even if it is a bot.

So this was from my side conveying you the importance of Internet Literacy and Data Privacy. If you want more information on this, there are hundreds of articles and videos on the internet explaining the same.

Do you need to have much technical knowledge for this?

This article is aimed at beginners and the things will be explained in layman terms so you can easily follow this guide. We will not go into many technical details of things.

Here are the top internet safety and you should follow.

1. Review your browser extensions

Browser extensions can easily read the data on web pages you visit so they can also see your personal details that you enter webpages. That’s why it wise to not install any random browser extension from some unknown or non-reputed site. Make sure the extensions are from reputed sources and you trust them. After all, the browser is where we use most of the internet

2. Install Anti-Tracker

Some many hidden websites and trackers track your activity when browsing the internet. They can collect information related to webpages you visit, how much time you spend on websites, and your browsing activity. This information is even shared with third parties. You can simply avoid this by installing anti-trackers in your browser. These trackers not only protect your data but also loads webpages faster by disabling the third parties trackers.

One such popular and free Anti-Tacker is Disconnect.

Image Credit: Disconnect.me

Apart, If you want to surf websites privately and more securely then you must need a VPN. Check out the NordVPN.

3. Password Management

Try to make your password lengthier rather than small and complex. The longer the password the harder it is to crack (see the picture below). Your passwords should be at least 12 in length. It is not wise to store the password in plain form on your device as it can be accessed by other applications. If managing too many passwords becomes difficult it is good to use password managers.

password protection
Image Credit: xkcd.com

Some good password managers are LastPass, Google Password Manager.

4. Enable Two-Factor Authentication (2FA)

This is a very important safety feature everyone should absolutely know about this. Two-Factor authentication is just like a double lock to your digital asset. In the Two-Factor authentication method, the first factor is your password which is ‘something you know’ and the second factor is some random code (usually 6-digit numbers) which is generally sent to your phone via SMS or email that is ‘something you have’. Even Credit cards work on two-factor authentication system banks identifies you with ‘something you have’ (i.e. the card) and ‘something you know’ (i.e. the pin).

Therefore enable Two-Factor authentication just now at least for your important accounts like your personal email, and social media.

2 factor security

5. Beware of Phishing on the Internet.

Phishing is a cyber-attack in which the attackers impersonate themselves as a trustworthy entity or authorized organization. Lures the victim by sending links to their fake phishing website, usually via emails or messenger. These Phishing Websites are bogus and look-a-like of a legitimate website that asks for personal details, like username, password, and other sensitive information for which attack may be intended.

What is phishing | Attack techniques & scam examples | Imperva
This is an example of a phishing link sent through email. So never open such links from an email sent by any unauthorized person or if the email seems unusual.
The fake phishing website has unusual, weird, or unfamiliar domain names or URL links, but the content of the website will be similar in looks to that of the original one.

6. Staying Safe on Social Media.

If you spend your major chunk of time on social media then there’s a good reason to consider social media safety.

  • Don’t share too much of your personal information on social media. Like your phone number, address, full name, etc.
  • Review your privacy settings on social media to see with whom your information is shared.
  • Keep your account private. A public account means your profile, photos, and status updates are visible to anyone on the internet.
  • Learn to detect fake accounts and spam.
  • Avoid Quizzes and Games that request access to your profile information. Most of these are spam.

You should learn more about this

7. Use your time wisely on the Internet.

Gone are the old days when the internet was pure and used for information sharing. Now the Internet is just about your time and attention. Websites and applications are now being deliberately designed to seek your time and attention. Time and attention are your resources and it is limited so use them wisely. The content creation on the internet is being done at mass and you can never get enough of the internet.

  • Learn how to use the internet productively.
  • Learn skills from the internet.
  • Limit entertainment on the internet.
  • Comment section debates are pointless and needless.

For Guest Blog Submission, Contact at : [email protected]

What do you think?

Written by Saurabh Dubey

Saurabh Dubey is an admirer of Technology, a Novice in Computer Science and a proficient netizen.