Deleting your personal data, like web searches, can be a daunting activity. You need to take it seriously. If you do not, then other people have the potential to find that data. Below, we break down how to better delete your personal data.
We have all been here, you're selling an old phone or tablet, or donating it to someone or some place. Regardless, the device is will no longer be in your possession. Because of this you want to be 100% sure everything is gone from said device. No body wants to find out their Facebook account was accessed from an old device being used by someone else.
Thankfully, most smartphones have made it relatively easy to securely wipe data from them. As long as your data has been encrypted, your data is protected. Most Android and iOS devices are encrypted right out of the box. Because your data is encrypted, factory resets make it almost impossible for any data to be recovered. Here's how your factory reset your devices:
Note: For either device, make sure you have all of your photos, music, or anything else backed up and securely stored somewhere.
Windows and macOS make securely wiping your pc or laptop easier, and more secure, than it used to be. By default, Windows 10 does not encrypt your data. The upside, Windows 10 can securely erase your files during a reset. Meaning that recovery programs will not be able to grab any data after the reset.
By default, OS X Yosemite and newer will encrypt Mac's with a tool called FileVault. Make sure this feature is running via Apple > System Preferences >Security & Privacy > FileVault. Enable this encryption if it is not already enabled. Once encrypted your data will be impossible to recover after a full reset.
Going through every web account and how to delete it is an impossible task. Therefore, we can provide you with some general guidelines on what you should do though. Most websites will maintain your data, post delete, for 90 or more days.
Google maintains a lot of data about you. Thankfully they provide you that data via your My Activity page. From this page you can adjust various data logging levels by clicking Activiy Controls. Lastly, clicking Delete Activity will take you a page where you can choose what data you want deleted from your account. If you choose to delete everything, make sure to get a copy of your data from Google Takeout.
Apple also makes things pretty painless for deleting your data they have collected. Simply go online, sign into your Apple ID account, click Request to Delete Your Account, read through the disclaimer, and confirm your choice to delete the account.
PCs, laptops, phones, tablets, and social media accounts are not the only areas that have collected personal data from you. For example, smart home speakers, like Amazon Echo or Google Home, collect data on you as well. The data Google Home collects can delete be delete from the same My Activity page we wrote about earlier. Amazon will allow you to delete your Echo's voice recordings from your Amazon Devices page.
Cloud Storage services, like Dropbox, will probably keep copies of deleted files in case you need them at some point in the future. Features like this are great when you need to recover something you realize you still need. However, this feature is not great if someone gains access to your account, because they can easily go digging around and recover those files as well. In the end, if you have something sensitive that you need to delete, especially from cloud storage, you need to make sure it's actually deleted.
Unlike Dropbox, Google Drive allows you to permanently delete multiple files or all of your deleted files.
Empty your entire trash
Delete an individual file forever
OneDrive, like many cloud storage services, will store deleted files in a Recycle Bin. From there you can restore files, if you need to. You can select Recycle bin in the OneDrive left side navigation
Regardless of the device or web account or service, it is always a good idea to make sure your data is deleted properly. We have only listed a handful of examples and how to delete your data properly. A simple web search should help you figure out the best route for deleting your data from whatever device, account, or service you use. If anything, you will learn more about the data you leave behind, something you do with out realizing it. Trust us, it's worth the extra effort to protect yourself and your data from leaking out into the wrong hands.
No matter the reason, having people gather around your laptop or computer to show off a video or photos can be a pain. Below are six ways to get your laptop or computer displayed on your TV. The best part? Minimal effort, hardware, and cash required.
By far the easiest option is using Google's Chromecast. Any tab from Google Chrome can be cast to your TV. And you have three ways to accomplish this too:
Note: You can continue to browse the internet by using another Chrome tab. Casting will only occur from the tab you start the cast from.
Casting from the browser can result in some lag on certain websites. With this option, we recommend casting just websites and photos over videos.
All Roku devices come with the ability to Miracast. With this option, you will find it easiest to mirror Window devices vs Mac. Using miracast through Roku is very similar to Chromecast.
From your Windows device:
Roku will prompt you for approval of any device that is attempting to connect and mirror content to it. You can learn more about approved devices here.
AirPlay is Apple's version of casting/mirroring. You will need an Apple TV to accomplish this as well. All things considered, this is the best solution for Apple users.
Configure your AirPlay device and ensure the Apple device you wish to mirror is connected to the same WI-FI as your AirPlay device. If everything is configured properly then you will see the AirPlay button in your menu bar. From the AirPlay menu, select the device you which to mirror your screen to.
Plex does not actually have any mirroring capabilities, it is a media server. All videos, music, and photos on your computer can be served to your TV via Plex. Plex is a great solution for many people because of support for so many streaming devices.
In order to get yourself up and running, you need to download and install Plex on your computer (Windows or Mac). Thankfully, the team behind Plex have this handy guide to get your up and running. Once you have everything setup, anything you tell Plex to index on your computer should be available on your TV.
AirParrot 2 requires an Apple TV or Chromecast device in order to work. You will also have to pay for the software, though there is a free trial available. I would recommend giving it a try before you purchase a license.
Once you have the software installed on your computer, it will find all available devices that support mirroring. You also have the option to steam videos, music, and photos to your TV. And you can do so without the need to see the whole computer screen, similar to Plex.
The biggest draw to AirParrot 2 is the ability to mirror to multiple devices at once, high quality streaming, and you can mix and match streaming devices. So, your Windows PC can now stream to your Apple TV or your Mac can stream to your Chromecast.
This is the easiest solution for most people. Take an HDMI cable and connect your laptop or PC to your TV directly. The connection is fast and stable, guaranteed. Once you connect your computer to your TV, your computer should prompt you, almost immediately, with an option on how you want to use your TV. Treat the TV as an additional monitor? Check. Duplicate your computer's screen to you TV? Check.
Both of the above options are available for Windows and Macs. If you have any issues or would like to switch between extending to your TV or duplicating your computer screen, just look below:
One thing to note is that many ultra thin and small laptops will have limited or no HDMI ports. If that is the case, then you will need to buy an adapter for your USB/Lighting port. In the end, if you need to keep the lag between what you see on your computer and your TV low, then this is the best option.
Connected devices in our home is common place, and the number of those connected devices in our home is growing. This means there are a growing number of opportunities for someone to access your home network and your devices on that network. Because of this we want to take a moment to go over some steps you can take to help make your home's smart devices safer and more secure.
Please keep in mind there is an ever growing array of smart home devices, we cannot go over specifics for each gadget. One general rule of thumb is to go through the device's documentation for initial security precautions. If your device does not have a guide, double check the manufacture's website.
Windows and macOS do a great job and downloading and installing updates. Most smart home gadgets do not. There are many reason why this could be or by default the devices does not need internet access, just access to devices on your home network.
This, ultimately, means it is on you to keep track of devices updates. This can be a pain when you have a lot of devices to deal with, but it is worth it in the end in order to safe guard your home network and the devices connected to it. Checking for updates for your smart devices can happen through the smartphone app for the device, if there is one, or by checking the manufacturer's website.
For a lot of smart home devices, updates will not release on a regular basis, unless a security exploit crops up. So, setup a schedule to sit down and run through checking for updates on all your devices. Doing this, at least, once a month is a good starting point.
If your smart home device does have an update, it could take a few steps to install. Some devices require you to connect it to your computer, which are usually for devices that do not have access to the internet. Other devices will allow you to update them via Bluetooth with an application on your phone.
An update routine extends to all of your electronics in your home, not just smart devices. Check for updates for you computers, phones, TVs, sound bars, and especially routers. Routers these days are doing better at alerting you an update is available, provided you log into their admin page. Most manufacture websites will tell you if there are updates and how you can update your devices.
Technology today is very much set it and forget. It is very nice to get up and running with new devices and then never have to worry about them. But, often some of the default settings can be too relaxed on security. We recommend that if your device has a settings menu, that you go through each option. If there are settings you are not familiar with, then check the manufactures websites for a better explanation on what the setting does.
Some key settings to look out for:
Once again, this routine should extend to all of your household devices. If the device or account to access your device offers two-step verification, enabled it. Also, if your device sends you notifications, like a security camera, to an email account, make sure you have a strong password for that email account. If a hacker gains access to your email, they could potentially see security snapshots and be able to determine when you are home or not.
Sticking with bigger name companies for your smart home gear does have it's benefits, even though they cost more. Samsung and LG can still be hacked just as the next company, but they at least have the resources to fix flaws in their devices if one is found. Newer or smaller companies, though having cheaper devices, may not ever fix found flaws or support could hard to work with when you run into issues. Devices that do not have a clear way of getting a hold of support is usually a sign that they probably will not fix security flaws in their devices.
In this day and age, we see many innovating smart devices, thanks to sites like Kickstarter and Indiegogo. Always do your research when buying into these products. Look into the company and see what security measures they have in place for the device you are thinking of purchasing.
Keep in mind many new companies have a habit of starting out with a bang but then disappearing just as fast as they exploded onto the market. The last thing you want is a smart lock or voice-activated device, that does not function anymore.
Because of the reasons stated above, it is best to get devices that all fall under the same umbrella. By limiting the number of smart home platforms you install in your home, you limit your exposure to attacks. Some smart home umbrellas include:
Once you have picked a system, we recommend you find products that work within that system. Some systems, like Samsung SmartThings and Google Home, will work with each other. But, that is not always the case.
Now, if you already have a miss mash of smart home devices, trying to get your setup under one or two umbrella's could prove difficult. Luckily, BullGuard’s Internet of Things Scanner is handy at helping to determine if any of your smart home devices are on the Shodan site. Shodan is a search site that scans the internet for any network device that is publicly accessible. Basically, if you find one of your devices is listed on that site, then someone could hack into it, so disconnect that device from the internet immediately. Then, check for updates and your security setting for that device.
The router in your home is the gate keeper to everything connected to the internet in your home. Smart devices, computers, mobile phones, game systems. Keeping it secure is the key to improving your home network security. The big three things you need to do are:
For example, you have a Roku plugged into your TV. The TV may have smart features as well, but they will not be as useful as the Roku is. Because of this, your TV does not need to be connected to the internet, at least not all of the TV. Remember today's TVs will get firmware updates that might fix issues, so it's good to have it connect to the internet every now and then to check for updates.
One special note about all devices that need internet access, be cautious about devices that prompt you to automatically configure your router for you. They do not need access to do that, so do not give that device the username and password to your router's settings menu. Additionally, most router's these days have a list of devices that are connected to your router, which you can control internet access too or block from your network.
Router's are getting better at keeping themselves up-to-date, but you still have to do some manual work. But, if you find that your router is not getting updates or the last update is already years old, it might be time upgrade. Today, many routers are built with smart home security in mind. Many will monitor your device's network traffic and will block common routes used by hackers and malware. Some will even go as far as blocking devices that appear to have poor security settings. Two routers we recommend, that have these features, are the Asus Blue Cave ($170) or the Luma Whole Home WiFi (3-Pack) ($135). If you rent a router from your Internet Service Provider, make sure to ask them for an upgraded router. But really, you're better off using your own router.
There are also devices you can purchase that are dedicated to just monitoring your smart home for vulnerabilities. These are nice options if you do not want to upgrade your router. Some of these devices are:
We will note that a lot of these devices have not ample third party testing. So, the claims made by the manufacture are just that, with no solid user proof to back them up. You are more then welcome to try them out, bu do so with caution. If you are using a device listed above, then leave some comments below on your experiences.
In the end, the best protection of your devices is to keep them up to date. Check for software/firmware updates, password protect them, if available, and make sure they are hard passwords.