Internet privacy lock

A Guide to Internet Privacy in 2021

By Nancy Driver
Share:

We often think of the earlier days of the internet as those filled with aggressive pop-ups, janky software, and spam email you would drown in if you weren’t very selective about who you handed your email address to. Most people who remember using the internet in the 2000s think today’s internet is much cleaner and safer. Surely there are far fewer privacy issues today than in the past? Unfortunately not – the data doesn’t support this. Just like the people who swear they remember Nelson Mandela dying in prison in the 1980s rather than in 2013, your memory is lying to you. Or, at least, your version of reality doesn’t live up to the facts. But why? What’s going on here?

What Is Internet Privacy?

Internet privacy is the level of protection you have while connected to the internet. But what is being protected here? Essentially, online privacy relates to how much of your personal, financial, and browsing data remains private when on the internet. Sometimes this data is personally identifiable information (PII), and sometimes it’s not. PII can be things like your real (legal) name, your address, or contact details you don’t want to be public. Non-PII data is things like your browsing activity when on a website, for example, which pages you clicked on, and for how long.

People are more invested in online privacy today than ever before for a variety of reasons. The public at large has wised up to the notion that if something is free, then you’re the product. And by you, we mean your data. Additionally, high-profile data breaches like Yahoo’s 2013 breach where 3 billion accounts were compromised, and Facebook’s 2019 breach where hackers exposed the personal details of over 540 million users, have led some people to be wary over the information they share with companies.

The Reality of Privacy in 2021

In 2009, there were a total of 12.4 million reported malware infections, but by 2018, this figure had risen to 812.67 million. Some of those reports can be chalked up to an increase in security reporting literacy – more people know how to report today than in the past, or run software that can passively report. But we can’t explain an increase of over 800 million with better reporting. The message is clear; malware infections have skyrocketed in the last decade.

Depressingly, malware infections are just one slice of the pie. Ransomware attacks surged by 150% in 2020, and what’s more, the average extortion amount doubled. The Federal Trade Commission received an eye-watering 2.2 million reports of online fraud from consumers, with total losses reaching almost $3.3 billion. And then there’s 2020’s most enormous beast, Coronavirus. Reports show that scams increased 400% in March 2020, making COVID-19 the largest-ever security threat.

Okay, so these stats are all a bit doom and gloom. We don’t mean to be alarmist, but rather highlight that internet privacy has never been more critical.

Why Does the Internet Seem Safer When in Reality, It Isn’t?

The simple answer to this question is that cybercriminals are far more sophisticated in 2021 than they were a decade ago. While you’re unlikely to click on a suspicious pop-up saying you’re Google’s one-millionth visitor and can claim a prize, you’re more likely to fall for well-crafted scams that fly under the radar. Cybercriminals have had a lot of time to perfect their techniques, and they also have more tools available to them than ever before. With the advent of artificial intelligence and machine learning combined with the plummeting cost of powerful computers, cyber attackers today are exceptionally well equipped. The rise in hacking software and the ever-decreasing price of tech has also had the effect of lowering the barrier to entry of becoming a cybercriminal. Put simply, hackers are more innovative, have more resources, and there are more of them.

Are you sufficiently scared? Well, don’t be. While the state of cyber threats in 2021 is alarming, you can protect yourself by being vigilant. With this in mind, let’s take a look at the top 11 internet privacy issues in 2021.

11 Internet Privacy Issues You Need To Be Aware of in 2021

For the purpose of this list, privacy issues are defined as weaknesses or vulnerabilities in online activities that can expose your data to cybercriminals. By reading the privacy issues on this list, you can arm yourself with the necessary knowledge to protect yourself while browsing online.

1. Not Using 2FA or MFA

We live in a world of convenience where even the slightest amount of friction in your online experience can be highly annoying. However, sometimes friction is necessary because it keeps you safe. One such example is using Two-Factor or Multi-Factor authentication (2FA/MFA). Essentially, two-factor authentication is a built-in mechanism that double-checks that you are who you say you are. It’s a second security layer when you log in to an online account. Typically it works by sending a text message to your phone with a code you have to enter into the website.

So why do you need 2FA? If your username and password are exposed in a data leak, you might only realize when it’s already too late. That is when a cybercriminal uses your credentials to hijack your account, steal your data, or make purchases on your credit card. A cyber attacker might be able to access your username and password, but they’re highly unlikely to also have control of your phone. By enabling MFA, you can stop a cyber attack in its tracks.

2. Bad Passwords

Advice on how to construct your password has changed over time, and it can be challenging to keep up with the latest advice. Here are our top tips on creating a strong password in 2021:

Password Length

Increasing the length of your password dramatically increases the time it takes to crack it. While most websites only require you to create an 8 character password, it’s important to remember this is a minimum. The longer your password, the better. In fact, most websites will accept passwords up to 64 characters.

Complexity

Ideally, you should introduce complexity into your password by using numbers and special characters. Avoid using “1” after your password or just capitalizing the first letter of the password – hackers are well aware of this tactic. However, there is a caveat to complexity. If you believe adding complexity will increase your likelihood of reusing that password, it’s better to pick a long but easy-to-remember password. For example, you could choose a string of 4 random dictionary words. The National Institute of Standards and Technology (NIST), a cybersecurity industry leader, recently removed all password complexity requirements from its guidelines. Why? Because research found that as complexity rises, as do the rates of password reuse, reusing passwords is worse than having a slightly less secure password.

Off Limits

Don’t use any names or information personal to you in your passwords. This includes the name of the street you grew up on, the name of your favorite sports team, the name of your first pet, and so on.

3. Reusing Passwords

Reusing passwords is dangerous and insecure, and we know you do it. Okay, so we don’t know that you do it, but we do know that 72% of people reuse passwords. Staggeringly, one survey found that 45% of information security professionals also reuse passwords.

Okay, we get it; you might have over 100 digital accounts, and remembering a unique password for each one is stretching the limits of your memory capabilities. Reusing passwords seems like a natural solution. But just how bad is it to reuse passwords?

Passwords have a habit of getting stolen. Some websites have poor database and server security, and these sites are an attractive target to cybercriminals. If you use the same password on a random website as you do for your social accounts, you could just be giving hackers access to your social accounts.

4. Not Using a Password Manager

Okay, so if you need to create long and (ideally) complex passwords that you can never reuse, what do you do? Wait for transhumanism to kick in so you can upgrade your brainpower? There’s a more straightforward (but less exciting) solution – a password manager. Password managers store the usernames and passwords to all of your online accounts and automatically input the credentials after you pass the security check. They can also generate robust passwords for you. With a password manager, you don’t even have to know the password yourself.

But are password managers secure? What if a hacker managed to break into your password manager? While it is possible, it’s improbable. Password managers are encrypted using AES 256-bit encryption, encryption so strong the military uses it.

5. Sharing Personally Identifiable Information

Be aware of oversharing on social media, particularly if you have public social media accounts. While it might seem harmless to share your life updates, there are situations where it can lead to your downfall. For example, let’s say your password is the name of your first pet. If you share an old photo of this pet with the caption “I really miss you, Snuggles. I hope you’re chasing your tail in heaven,”. A hacker might take note of this information. Although it’s considered bad password hygiene, plenty of people do include the names of people, animals, or teams important to them in their passwords.

Have you ever seen those posts on social media that say something like, “To find out your stage name, take the name of the street you grew up on and your mothers maiden name. Comment yours below”. The comment section on these posts is like a goldmine for cybercriminals. They are hoping they can use the data you post to answer the security questions on your account.

6. Posting Holiday Photos While You’re Away

Let’s set the scene. You’re enjoying an all-inclusive vacation in Mexico. You have a margarita in hand at 10 am on a Monday, and you get the itch to share a snap with all of your friends and colleagues back home with the Monday blues. You hit the post button, and your cocktail almost tastes sweeter.

Well, you essentially just announced to the internet that your home is empty and your valuables are up for grabs.

7. Having Public Social Media Accounts

A lot of social media accounts are public by default unless you’re under a certain age. It’s worth taking the extra time to check your security settings to understand who can really see what you’re posting. Facebook allows you to do this at a fairly granular level. You can choose which types of posts are public, which can only be seen by friends, which should only be visible to a pre-designed group.

8. Using Public WiFi Without a VPN

Using public WiFi without a VPN can make your device vulnerable to attackers. Hackers can intercept the traffic between the WiFi router and your device to steal your data, including your usernames and passwords and your online activity. Additionally, then can push malicious software onto your device. With a VPN, your traffic is sent through an encrypted tunnel, making it inaccessible to hackers.

9. Clicking on Suspicious Links in Emails

Phishing emails, a type of scam where a hacker impersonates a trusted individual or company, have been on the rise in recent years. Not only are phishing emails rife, but they can often be very convincing. Sometimes the link will be to a website where you’re asked to put in your login credentials. This website will look remarkably like a legitimate site you already have an account with, like Google, but it’s actually a fake. Other times clicking the link will automatically install malicious software onto your computer. This software could be anything from a simple keylogger that captures your keystrokes to ransomware that locks you out of your computer and demands your money.

But how do you know if a link is suspicious?

  • Be wary of emails asking for personal information. If you have doubts about the email’s authenticity, make your way to the website yourself or contact the company’s customer support.
  • Check the URL of the link. Suspicious URLs are usually very long or very short and contain random characters or unusual domain extensions. For example, the extensions .ga (country code for Gabon), .tk (country-code for Tokelau), and .cf (country-code for The Central African Republic) were listed in the top extensions used in phishing attacks.
  • Check for incorrect spelling and grammar in the email.

10. Not Updating Your OS

Hackers create malware and viruses for known vulnerabilities in operating system code. When the OS provider, for example, Microsoft, Apple, or Google, becomes aware of these vulnerabilities, they patch them up. Hackers love it when you don’t update your OS because it means more ways to get into your system. Don’t give them what they want!

11. Not Cleaning Out Your Old Files

If you keep your computer files organized, you’re much more likely to notice malicious files that are dragging your computer down. Sometimes, we unknowingly download viruses from the internet, and these viruses can tick away in the background for a long time. You may never notice them at all, and it’ll keep collecting your data and sending it to some remote server. Having a vast amount of storage is no excuse for a cluttered computer!

Frequently Asked Questions About Online Privacy

Why is Internet Privacy Important?

If a hacker gains access to your accounts, they could carry out various nefarious activities. In some cases, they can commit identity fraud, wipe your financial accounts clean, or steal potentially sensitive or embarrassing information and threaten to release it unless you pay up. Additionally, it’s not wise to put all your trust in companies to protect your data, and this is why having unique passwords is so critical. Websites get hacked, and data is exposed all the time, so it’s a good idea to limit how valuable that data is to hackers. An exposed password doesn’t hold much power if it’s not used anywhere else. 

Am I Sharing Too Much of My Data With Companies?

Sometimes sharing your data can be a good thing. For example, by allowing Google to collect your preferences, you get more relevant ads. However, in general, it’s a good idea not to share more data than is necessary to use your accounts the way you want. A common example is apps that overreach with permissions. For example, a game app that wants access to your photos, contacts, and location history.

How Do I Know if My Username and Password Was Exposed in a Data Leak?

Have I Been Pwned allows internet users to search previous data breaches to see if their data has been exposed.

Additionally, many countries have laws that require businesses to declare any data breach they have experienced publicly. They also have to inform any affected users.

How Can I Get the Most Out of Being Online Without Sharing Too Many Personal Details?

Take internet privacy into your own hands. This means being deliberate with the data you share but also taking extra steps to protect your information. This includes using 2FA, using a VPN and locking down your social media accounts.

Final Thoughts

Online privacy is more critical in 2021 than in any prior year. Data breaches continue to happen seemingly every week, and hackers continue to look for ways to hijack your accounts and use your data to make themselves richer.

In the coming months and years, we expect to see more companies adopting pro-privacy policies to calm growing consumer fears over privacy issues. However, we also expect to see a higher level of literacy around privacy issues in the public. That is the purpose of this post – to educate internet users about privacy. We hope that our readers come away armed with the necessary information to take control of their online accounts. Remember, your data belongs to you, so make sure it stays that way!