Contact Us! 469-272-0777

LiveZilla Live Help
 

AspireTech Blog

AspireTech has been serving the Mansfield area since 1999 , providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Adjust Windows 10’s Privacy Settings to Keep Your Information Secure

b2ap3_thumbnail_windows_10_privacy_400.jpgIt would be prudent to begin by saying that Windows 10 is far and away the most refined version of Windows ever created. In a lot of ways, it's like using a souped-up version of Windows 7, with a sprinkling of Windows 8/8.1 metro on top. Beneath the surface, however, is a vast information-collecting infrastructure that has many users left worried about their privacy. There are even conspiracy theories suggesting that Windows 10 is a vessel used by the NSA in order to collect all the information on every user.

Anyone that is familiar with the fallout of Edward Snowden’s whistleblowing campaign knows that government agencies don’t need Microsoft's software engineers to syphon as much information as they want, but that doesn’t mean there aren’t some potential privacy issues with the new OS. In fact, it could be said that the default settings of Windows 10 violate user privacy. Here are some of the ways they do so.

Advertising ID
The first privacy issue users are having with Windows 10 is that each user is automatically assigned an ID based on the email address they use to sign in. By capturing information using this ID, Windows 10 will tailor the advertisements that users see when surfing the web or uses certain applications.

Cortana
In order to get the most comprehensive user experience available, the Cortana application collects data; and not just essential data, but seemingly everything. In attempting to make the best personal assistant application on the market, Microsoft has made it a point to capture every piece of information they can. This presents privacy issues for some, but they’re likely no more intrusive than Cortana’s competitors: Apple’s Siri and Google’s Google Now.

Windows Modern Apps
Windows Modern or Universal Apps are also at the center of the perceived controversy. Each of these apps collects your location, which is no different than their Windows 8.1 versions. The situation that is presenting problems for users’ privacy is the advanced reporting these apps do to the central Microsoft servers. For example, when using the very useful OneNote app, the content of the notes are synced with the Microsoft servers.

Many users will not mind receiving better services in return for computing information, but many users are up in arms on Windows 10 policy of deliberately sharing all captured information with their “partners”; a series of third-party vendors that can use this information to improve their sales and marketing tactics. For the purposes of user privacy, however, there are actions that can be taken to limit the ability for Windows 10 to report user computing performance.

First, you need to access the privacy menu, which can be found in the start menu. Simply open the start menu, then click on Settings and select Privacy from the pop-up.

privacy ib 1
One thing that can be said for Windows 10 is that there are a lot of options. Each one of the privacy settings above represents the ability for Windows 10 to work for the user, albeit by the user sacrificing their privacy. The first suggestion we have, if you are one of the many users that feel as if Microsoft doesn’t need to know every movement you make on your home PC, is to disable the targeted advertising ID.

privacy ib 2From this screen users can also turn off SmartScreen Filter if you are worried about the Windows Store syphoning links to Store items. Many users will choose to leave this option on, but will want to turn the other two off. “Send Microsoft info about how I write..” is basically a keylogger, and its practical application is to provide information for Cortana and language settings that give regional information to Microsoft.

privacy ib 3
From there, clicking on Location will take you to a list of applications that use your location. Services like weather, traffic, news, and Cortana utilize your current location to provide you the best representation of relevant information for your situation. If you are using a desktop computer, there is little value one way or the other, but on mobile, turning off applications that don’t need your location won’t hurt the perception of privacy.

It is best to leave your Camera and Microphone options toggled on if you want to use Skype or another video communications application.

privacy ib 4
The next tab is the Speech, inking & typing tab. These options are used primarily with Cortana. If you choose not to utilize Cortana, you can consider telling Windows 10 to stop getting to know you. The problem with this is many Windows Store-based apps require your account info, making it impossible for you to turn off this option.

Privacy is a major consideration for most users on the Internet, especially in lieu of many companies’ strategy of selling off user information. These are only a couple of options that you can consider to keep your personal information personal. At AspireTech we understand why privacy and security are important for users. Our certified technicians can present you with options and best practices that will allow you to remain private and secure while online. Call us today at 469-272-0777 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 09 August 2020
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Network Security Hosted Solutions Privacy Productivity Hackers Email Innovation Efficiency Malware Backup Internet Mobile Devices Data VoIP Google Business Workplace Tips Data Backup Microsoft Data Recovery Hardware IT Services IT Support communications Software Disaster Recovery User Tips Outsourced IT Managed IT Services Cybersecurity Smartphones Business Continuity Phishing Productivity Computer Internet of Things Small Business Cloud Computing Communication Collaboration Upgrade Network Android Saving Money Miscellaneous Managed IT Services Server Browser Gadgets Business Management Smartphone BDR Tech Term Windows Mobile Device IT Support Save Money Artificial Intelligence Ransomware Automation Windows 10 Social Media Cybercrime Users Chrome Office Passwords Windows 10 Quick Tips Microsoft Office BYOD Virtualization Holiday Computers Bandwidth Managed Service Facebook Mobility Managed IT Employer-Employee Relationship Mobile Device Management Training Networking Office 365 Social Engineering Spam Windows 7 Information Telephone Systems Encryption Recovery Information Technology Data Security Avoiding Downtime Mobile Office Managed Service Provider Wi-Fi Remote Monitoring Operating System Blockchain Router How To Mobile Computing Remote Work Applications Two-factor Authentication Wireless Compliance Data Breach History Firewall Access Control Government App Settings Big Data Software as a Service Vendor Management Proactive IT Redundancy Private Cloud Website Apps Paperless Office Human Resources Application Health Business Technology Meetings Patch Management Data Storage Alert Mouse Budget Money Hacking Business Intelligence Telephone System Help Desk Word Data Protection Servers Gmail VPN The Internet of Things WiFi Display Law Enforcement HIPAA Marketing Analysis Hacker Employee/Employer Relationship Connectivity File Sharing Apple Data Management Education Voice over Internet Protocol Identity Theft Downtime Remote Computing User Error Vulnerability Bring Your Own Device Machine Learning Risk Management Manufacturing Managed Services Provider Infrastructure Office Tips Biometrics IT Management Document Management Google Drive Staff Virtual Private Network Sports Lithium-ion battery Retail Project Management Hard Drive Work/Life Balance OneNote SaaS Safety Fax Server Cryptocurrency Telephony USB CES Update Keyboard Data loss YouTube HaaS Cables Environment Black Market Augmented Reality Humor Network Congestion Google Docs Spam Blocking Cleaning Content Filtering Solid State Drive Wireless Technology eWaste Streaming Media IT solutions Virtual Reality Healthcare Smart Tech Digital Signage Virtual Assistant Credit Cards GDPR Entertainment Professional Services Data storage Saving Time Shadow IT Social Scam Value Windows Server 2008 Fraud Running Cable Audit Covid-19 Procurement Content Management Password Business Owner Regulations Workers Going Green DDoS Printers Botnet Hard Drives Internet Exlporer Comparison Robot IT Plan Processor Save Time Unsupported Software Public Cloud Vendor Evernote Knowledge Flash Emails Multiple Versions Shopping Touchpad Remote Monitoring and Maintenance OLED Best Practice Recycling Wireless Internet Programming SMS Software Tips Policy PDF Remote Workers NIST Antivirus Millennials Strategy Customer Service Wireless Charging Authentication IT Consultant Sync Instant Messaging Webinar Restore Data Social Network Line of Business Cabling Warranty Azure Bluetooth Criminal Wire IT service Root Cause Analysis AI Physical Security Procedure Security Cameras Managed IT Service Workforce IaaS Fiber-Optic Nanotechnology Leadership Analyitcs IT solutions Backup and Disaster Recovery Printing MSP Default App Contracts iPhone Printer RMM Smart Office Domains Charger FinTech Business Analytics Safe Mode Telecommuting Accountants Proactive Maintenance Skype Cryptomining Personal Remote Files Administrator Smart Devices Uninterrupted Power Supply Hosted Solution Screen Mirroring Unified Threat Management HBO Smartwatch Using Data NarrowBand Remote Worker Remote Maintenance Unified Communications Devices webinar Start Menu Business Cost Science Video Conferencing Colocation Microchip Virtual Machine Students Cast IoT Virtual Desktop Computer Care Frequently Asked Questions Employee Window 10 Database Wiring IT Infrastructure Theft Thought Leadership Conferencing Mobile Windows 10s Digitize Windows 8 Supply Chain Management Computing Infrastructure Search Engine Hypervisor Tech Support Multi-Factor Security Samsung Tip of the week Operations Chromecast Distribution Investment WIndows 7 Cortana Content Filter Bloatware IT Assessment Tablet Managed Services Bing Electronic Health Records Trending Insurance Google Search Projects Logistics Wearable Technology E-Commerce ROI Google Apps Storage Tools Entrepreneur OneDrive Outlook End of Support Lifestyle Transportation Data Warehousing Practices Maintenance Net Neutrality Computing Consultant Amazon Camera Twitter Computer Fan Copiers Monitor Tablets Peripheral Internet exploMicrosoft Shortcuts Employee/Employer Relationships HVAC Social Networking Hosted Computing Legal ISP Fiber Optics Biometric Security Best Available Amazon Web Services Windows Server 2008 R2 User Notifications Password Manager Addiction FENG Development Quick Tip Advertising eCommerce Bitcoin Enterprise Content Management SharePoint Online Shopping Inventory Shortcut Current Events File Versioning Trend Micro Laptop Excel Proactive 5G Distributed Denial of Service Managing Stress Business Mangement Cache Travel Messaging Relocation Memory Electronic Medical Records PCI DSS Batteries Password Management Specifications Digital Signature Customer Relationship Management