{"id":408,"date":"2015-07-10T13:26:44","date_gmt":"2015-07-10T21:26:44","guid":{"rendered":"http:\/\/www.checkworks.com\/blog\/?p=408"},"modified":"2019-06-18T10:04:22","modified_gmt":"2019-06-18T18:04:22","slug":"how-much-does-the-internet-know-about-you","status":"publish","type":"post","link":"https:\/\/blog.checkworks.com\/index.php\/how-much-does-the-internet-know-about-you\/","title":{"rendered":"How Much Does The Internet Know About You?"},"content":{"rendered":"<p><a href=\"https:\/\/www.checkworks.com\/blog\/wp-content\/uploads\/2015\/07\/bigstock-Suspicious-Businesswoman-60804647.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-409 size-large\" src=\"https:\/\/www.checkworks.com\/blog\/wp-content\/uploads\/2015\/07\/bigstock-Suspicious-Businesswoman-60804647-1024x683.jpg\" alt=\"Suspicious businesswoman siting on the desk with laptop computer\" width=\"625\" height=\"417\" srcset=\"https:\/\/blog.checkworks.com\/wp-content\/uploads\/2015\/07\/bigstock-Suspicious-Businesswoman-60804647-1024x683.jpg 1024w, https:\/\/blog.checkworks.com\/wp-content\/uploads\/2015\/07\/bigstock-Suspicious-Businesswoman-60804647-300x200.jpg 300w, https:\/\/blog.checkworks.com\/wp-content\/uploads\/2015\/07\/bigstock-Suspicious-Businesswoman-60804647-624x416.jpg 624w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/a><\/p>\n<p><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Our society relies heavily on the Internet for information, commerce, communication and entertainment. Increasingly, though, logging on comes with a distinct Big Brother-style unease. Many people are worried how much the Internet knows about them and would like to limit this information, but can\u2019t find the right answers. Well, here they are. Below we\u2019ve outlined some of the most salient questions Internet users have, as well as the best ways to protect yourself.<\/span><\/span><!--more--><\/p>\n<p><strong><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">How the Internet Gathers Information<\/span><\/span><\/strong><\/p>\n<p><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Pretty much everything we do online is tracked and recorded by search engines. Every time you visit a site, perform a search, click on a link, click on an ad, tweet your thoughts, send or receive an email, launch a website, use watch a video on YouTube, translate a string of text in another language, look something up on a map, or anything else, search engines record those actions. The information is collected and stored through cookies, IP address requests, and records created when you are logged into various online accounts.<\/span><\/span><\/p>\n<p><strong><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">What the Internet Knows About Most People<\/span><\/span><\/strong><\/p>\n<p><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">The Internet \u2013 let\u2019s be honest, mainly Google \u2013 knows a whole heck of a lot about you. Among <a href=\"http:\/\/www.washingtonpost.com\/news\/the-intersect\/wp\/2014\/11\/19\/everything-google-knows-about-you-and-how-it-knows-it\/\">the most common information Google keeps track of<\/a>:<\/span><\/span><\/p>\n<ul>\n<li><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Your age and gender <\/span><\/span><\/li>\n<li><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Your frequently visited sites <\/span><\/span><\/li>\n<li><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">The number of emails you\u2019ve received in your life <\/span><\/span><\/li>\n<li><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Your interests <\/span><\/span><\/li>\n<li><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">When you last logged on to the Internet <\/span><\/span><\/li>\n<li><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">What tabs you had open when you did <\/span><\/span><\/li>\n<li><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Your behavior on <\/span><\/span><em><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">a full 88 percent of all online domains<\/span><\/span><\/em><\/li>\n<\/ul>\n<p><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Of course, this is only a small sampling of what the Internet keeps track of. Depending on your online actions, it may also have information about your finances, family, pets, career and more.<\/span><\/span><\/p>\n<p><strong><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Who Can Access This Information<\/span><\/span><\/strong><\/p>\n<p><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">The search engines, for one thing. Big names in search, such as Google, Bing and Yahoo, can access the information they\u2019ve collected on you at any time. When you aren\u2019t logged into an account online, this information tends to be slightly more anonymous. However, when you are logged in \u2013 say to your Yahoo Mail or Google account \u2013 often the info collected can be linked directly to you, across devices. Search engines often supply this information to third parties for a fee, because consumer data is a valuable way to target merchandise and services. Supposedly this data is not personalized, but it still makes many people uncomfortable.<\/span><\/span><\/p>\n<p><strong><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">How to Put Information Online Safely<\/span><\/span><\/strong><\/p>\n<p><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">If you\u2019re like most consumers, you\u2019re not going to stop using the Internet any time soon. But you can still practice safe online habits. These include:<\/span><\/span><\/p>\n<ul>\n<li><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Signing out of all accounts when using a public computer, or even a shared computer in a private space <\/span><\/span><\/li>\n<li><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Keeping your passwords in a secure place <\/span><\/span><\/li>\n<li><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Using the right accounts for the right purposes, and logging in and out accordingly <\/span><\/span><\/li>\n<li><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Using secure networks whenever sending private, financial, medical or other sensitive information <\/span><\/span><\/li>\n<li><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Locking your screen or device when not in use <\/span><\/span><\/li>\n<li><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Protecting your devices against malware <\/span><\/span><\/li>\n<li><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Research e-commerce sellers and don\u2019t use unfamiliar payment methods <\/span><\/span><\/li>\n<\/ul>\n<p><strong><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Ways to Limit Your Online Presence<\/span><\/span><\/strong><\/p>\n<p><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">You can also limit your online presence. For instance, when simply browsing or using the Internet for entertainment purposes, log out of accounts that can help search engines track your doings. Check out as a guest on e-commerce sites to avoid creating lots of accounts on lots of different platforms, not all of which may be trustworthy. If you want, you can disable cookies on your browser so your movements aren\u2019t immediately reported to search engines.<\/span><\/span><\/p>\n<p><strong><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Sites to Trust (and NOT Trust)<\/span><\/span><\/strong><\/p>\n<p><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">There is no real secret here. Don\u2019t trust sites you don\u2019t know, especially if your browser warns against them. When visiting a new site, especially if you\u2019re going to purchase something, review it beforehand. Leave sites that have obscene content, that have more ads than content, or that use a lot of popups and scammy approaches.<\/span><\/span><\/p>\n<p><strong><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">How to Deal with Disaster<\/span><\/span><\/strong><\/p>\n<p><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Sometimes you can\u2019t avoid catastrophe. If your identity or financial information is stolen, you should immediately take steps to counteract the problem. <a href=\"https:\/\/www.consumer.ftc.gov\/articles\/pdf-0009-taking-charge.pdf\">Follow this FTC Guide<\/a> to responding to identity theft to minimize the damage and reduce the chances that it will happen again later.\u00a0<\/span><\/span><\/p>\n<p><span style=\"font-family: Calibri,Arial;\"><span style=\"font-size: small;\">Online safety is hard to ensure, but there are many steps you can take. Don\u2019t wait to get started.<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our society relies heavily on the Internet for information, commerce, communication and entertainment. Increasingly, though, logging on comes with a distinct Big Brother-style unease. Many people are worried how much the Internet knows about them and would like to limit this information, but can\u2019t find the right answers. Well, here they are. Below we\u2019ve outlined [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[64],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/posts\/408"}],"collection":[{"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/comments?post=408"}],"version-history":[{"count":4,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/posts\/408\/revisions"}],"predecessor-version":[{"id":1589,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/posts\/408\/revisions\/1589"}],"wp:attachment":[{"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/media?parent=408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/categories?post=408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/tags?post=408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}