Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Skip to content
A diverse group of people showcasing a padlock and a shield, illustrating the concept of security and defense.

Common online privacy issues you should know (and staying one step ahead)

While data breaches and high-profile hacks grab headlines as the main online privacy issues, there are other subtler ways that can expose our data. We’ve all experienced casual browsing, shopping and searching and soon enough, related ads are following us everywhere online. Who exactly has this information about us, and what else are they using it for besides targeted advertising?

Over 60% of Australians see the protection of their personal information as a major concern in their lives, 82% care enough about protecting their personal information to do something about it; however, 57% do not know what to do to ensure it’s protected (source).

Let’s look at how we can take control of our online privacy protection.

Invisible spies. Understanding tracking technologies

When we’re browsing online, digital detectives can tail us if we’re not adequately protecting ourselves. Websites and apps use cookies and tracking pixels —tiny code to monitor and record our activity. Companies also embed codes, known as third-party trackers on websites, which follow our browsing activity across the internet. These mechanisms build a comprehensive profile (called data points); interests, location, demographics, browsing and purchase history —data companies can sell. If these sites experience a security breach, it could expose your personal information. 

The potential misuses of data by third-party trackers include:

  • Price discrimination: Algorithms can lead to users seeing higher prices based on their perceived willingness to pay
  • Spam & scams: Companies sending unwanted emails or cybercriminals sending targeted phishing attacks
  • Identity theft: Stolen or leaked data collected by trackers can provide a fuller picture for cyber criminals to steal your identity more easily.

Websites operating in regions with strong privacy regulations (like the EU’s GDPR), are required to disclose cookie and tracker use. You may have seen this on sites where users can accept, change, or reject these before using the site.

Location services tailoring our reality

Combining data from GPS, Wi-Fi networks, and cell phone towers, smartphones and devices can accurately and easily locate us. Even if we’re not connected to one, devices can still detect nearby Wi-Fi networks. In detecting the unique identifiers of these networks (called MAC addresses), location services can estimate a location based on a database of known Wi-Fi network locations.

With location services enabled, apps can also access this data. Very convenient for us as users for weather updates or finding nearby restaurants. Most companies use location data for hyper-targeted advertising, but they can also misuse it like we outlined above.

The hidden risks in social connectivity

Cyber criminals can use the information we share on social media to create data profiles on us for identity fraud. Social media platforms also know lots about us based on our activity, interests, online habits, and even beliefs. In using the platform and agreeing to their terms of service (which can be lengthy and dense), we’re implicitly consenting to some level of data sharing.

Social media platforms can share data with third-party applications. These are apps that integrate with the platform, like quizzes or games. When you connect a third-party app, it may also ask for access to certain profile information, even private messages, in order to use it.

Tips for boosting your online privacy protection

  • Use a Virtual Private Network (VPN) to encrypt your browsing and mask your IP address
  • Get Sapher Shield, which detects risky and phoney websites and links, and alerts you before they can infiltrate
  • Activate browser privacy settings that block third-party cookies and trackers
  • Regularly clear cookies and browsing data
  • Be cautious with social media sharing
  • Regularly check and manage the app permissions you’ve granted regarding location services and personal data access
  • Use a password manager to create and store complex, unique passwords
  • Use Two-Factor Authentication (2FA) wherever possible for an extra layer of account security
  • Before connecting third-party apps via social media, review their privacy policy and requested permissions to see what data they access as a condition of use
  • For sensitive communications, use end-to-end encrypted messaging apps like Signal or WhatsApp
  • Regularly update your software to benefit from the latest security patches
  • Opt out of data sharing agreements with service providers and on social media platforms where possible.
  • Stay informed about common phishing techniques to avoid falling victim to identity theft attempts via email or fraudulent websites.

While this blog post has highlighted the numerous ways our data is collected online, Sapher helps protect you from both subtle and intrusive practices that typical security can miss. With its real-time threat analysis and protection features, Sapher alerts users to hidden trackers, malicious websites, and data-grabbing attempts.

Secure your digital life: Get Sapher Shield.

Back To Top