Do you know what and who is tracking your location? Do you know why people/websites and businesses want this information?
Geo-location is the identification of the geographic location of a user or computing device via an array of data collection processes (device/server based and combined data collection). The most used geo-location service is a GPS device to determine a precise location of a person. For example, if a company you visit online wants to know where its users are located around the world, it will use geo-location data.
Many people do not mind a website knowing their location. It can, however, be problematic and make individuals more vulnerable to security threats if used unnecessarily. Any data that does not need to be shared online, should not be entered.
If you want to make sure your geo-location tagging is not being tracked, here are some options, provided by SecurityHQ:
- Use Virtual Private Network (VPNs). A VPN is the best solution to shield your location. A VPN can encrypt your data and sends it through secure remote servers. This transmission masks your real IP address.
- Clear and Turn off cookies.
- Stay away from Google tracking. Most people who surf the web, interact with Google in some way, either to search for data or websites.
- Use antitracking solutions. There are various types of software with anti-tracking features. Normally this would identify websites that are attempting to track you. Not only does it identify them, but it usually has the capability to remember them and block repeated efforts.
- Social networks. Avoid social networks if you can. Only include the minimum amount of information about you (including location – to prevent geolocation tracking, and secure your portable devices). Please avoid using any geo-tag feature.
- Turn off geo-tracking or the transfer of data about your location. Block the function from your device, including browsers, phones, operating systems and even applications. You should be able to ‘disable location services’ and enable ‘do not track’ feature.
- Monitor DNS-Leakage: Regularly check your DNS service for the leakage of personal data. Domain Name Server is a system in which local device addresses turn into IP addresses that other servers and routers can use to send and receive information. You can google “DNS leak testing” and you will get a lot of services that will help you.
- Managing Plugins: Browser plugins are weak points in many security systems that can allow data to be lost even if other important security measures are taken. Hostile plugins track the scope of your interests. To maintain a high level of privacy, it is recommended to avoid plugins. If this is not possible, you can configure your system so that it always requests permissions to launch the plugin or run it in a sandbox for additional security.
- Disable the WebRTC: Real-time communication allows a web browser to request real-time information from other servers or browsers. To disable it, all you need to do is double-click anywhere on the row and change the value to “false.” If you need to enable WebRTC at any time, just repeat the process. But remember to set the value as “false” again once you are no longer using a direct, peer-to-peer connection.
- Know the basics when on social media. Geotags are often automatically embedded within a picture, when taken on a smart device. People forget this, and often give away their location by simply uploading an image online.
- Educate your staff on security protocols. Security Awareness is not just for those interested in cybersecurity. It is a crucial element that all employees must be aware of. But once employees are cybersecurity aware, have a checklist in place, are able to recognise cyber threats, the impact of a cyber-attack, and know the steps to prevent cyber threats from attacking and infiltrating their systems, businesses improve their security posture significantly. View this checklist here.