- Are you worried that someone might be spying on you?
- Do you know how this could be possible?
- Do you know how to protect yourself?
We receive a lot of emails from our customers asking for advice on how to further protect their digital privacy. They are already using Incognito to scan for real world commercial spy tools such as mSpy, Highster Mobile, HelloSpy, SMS Tracker etc and they want to know what else they can do.
I thought it would be a good idea to share with you all the same tips and recommendations that we have given to our customers in the hopes that they will help you.
If you have any questions at all about this article please let us know. As always our support team are standing by to answer any questions you have and as always our support service is 100% free of charge.
You can email us here – firstname.lastname@example.org
Take control of your Digital Privacy
The first step in protecting your digital privacy is to understand how and where you are exposed. So many people don’t think about these things until it is too late. The good news is that once you have a hold of your ‘digital weaknesses’ it is easy to plug them. The two main things you need to look at are:
Is spyware installed on your phone?
Generally Spyware can be installed in two ways:
a. The most common way is for somebody to physically take possession of your phone and install the spyware. They only need your phone for 60 seconds to do this.
b. The second way which is a lot more difficult is to install the spyware remotely. In order to do this the person will need to get you to open a link in an email or a text message. If the message comes from someone you know you are more likely to open the link “hey honey, here is a link to the photos…”. Opening the link is only 50% of it though.. When you open the link you will need to go through an install process and you will have to allow the install of the spyware. You will be asked up to three times “are you sure you want to install this”. At the end you will have pretty much infected yourself. Magical remote infections that you see in the movies are only really reserved for the the CIA and even at that level they are not easy and not magical.
If you are worried I suggest you do the following to create a privacy baseline:
a. Reset your phone and start from the beginning. I know this is a pain to do and will take a little time but it is worth it and should be done every so often anyway as good practice. Once your phone is reset you now know that their is zero spyware on it and you are safe.
b. Put a passcode on your phone. Don’t use a passcode that can be guessed easily. Also, set your phone to auto lock after a few minutes of inactivity. You now know that if your phone is out of sight it is secure. Change your passcode every few weeks.
c. Install Incognito and scan every day. We update all the time and updates are always free. If you don’t already have Incognito installed you can get it HERE
d. Don’t let anyone use your phone who you do not trust. They only need it for a few seconds.
How secure are your online accounts?
Here are a few things that you can do to improve your overall security and to help bolster your privacy.. Simple things can be extremely effective:
1) Create your own account with your mobile phone operator. If you share an account with your partner for example they will be able to see your call logs, your text messages and even your location in some cases. Call your operator and get your own account. You are now 100% independent and you know 100% that your partner for example has no access this extremely sensitive information.
2) Change your wifi password at home. If you do not know how to do this just call your service provider and they will help you do it. Once it has been changed only you and people you give the password to will be able to get access to your home network. It is very easy to see what ‘traffic’ is transmitted over a wifi network if you have the password and the right tools. These tools are designed to keep an eye on your kids for example (what websites are they visiting, emails are they sending etc) but can also be used to keep an eye on you. If you cannot control the password you need to assume that anyone on your network can see what you are doing.
3) Make sure you have a password or passcode set for all devices that you own (see next point)
4) Make a list of all passwords that you use for ALL of your devices and change everyone of them. By doing this you will make sure that only you can access these devices:
a. Change passwords on all devices including phone, tablet, computer, kindle. If it has a password or passcode change it.
b. Change them to something that only you know
c. Don’t use an obvious word such as your dogs name or the first four digits of your phone number. Make it hard to guess.
d. Password example: ilikewhereilive (its a phrase so you won’t forget it) and make it more secure by changing the ‘e’ to ‘3’
e. Make sure each one is different (if someone guesses one of them at least they will not be able to gain access to all your devices).
f. Change your passwords on a regular basis, to be sure.
5) Make a list of all passwords that you use for all online services such as Google, Dropbox, Facebook, Twitter etc and change every one of them. Make sure you sit down and list off all of them. Follow the above password guidelines to to make them secure.
6) If you use Facebook or similar service turn on the privacy controls so that only your friends can see your status. You would be surprised at how many people do not do this and are wide open to be tracked and followed by anyone at all.
I hope this information has been helpful to you. These are small steps but if you add them all together you will make massive advances in terms of protecting your digital privacy.
Please let me know if you need anything else at all. All product updates and customer support will always be free of charge.
Incognito Customer Support.
Incognito: Detecting the Undetectable
Download for Android Now:
Any questions for our help desk? email@example.com