How to Minimise the Risks of Geo-Location Tagging (2024)

How to Minimise the Risks of Geo-Location Tagging (1)

Home>Blog>How to Minimise the Risks of Geo-Location Tagging

Industry Insights • 10 MIN READ

by Beverley Obukohwo, Eleanor Barlow • Apr 2021

Do you know what and who is tracking your location? Do you know why people/websites and businesses want this information? Geo-location is the identification of the geographic location of a user or computing device via an array of data collection processes (Device/Server based and Combined data collection). The most commonly used Geo-location service is a GPS device to determine a precise location of a person. For example, if a company you visit online wants to know where their users are located around the world, they will usegeo-location data to find this out.

Websites can also ask for a user’s location, usually presented as questions such as “This website uses cookies to store information about your visit (including your location).”

Many people do not mind a website knowing their location. It can, however, be problematic and make individuals more vulnerable to security threats if used unnecessarily. Any data that does not need to be shared online, should not be entered. So, if you want to make sure your geo-location tagging is not being tracked, here are some options.

  • Use Virtual Private Network (VPNs). A VPN is the best solution to shield your location. A VPN essentially encrypts your data and sends it through secure remote servers. This transmission masks your real IP address.
  • Clear and Turn off cookies.
  • Stay away from Google tracking. Most people who surf the web, interact with Google in some way, either to search for data or websites.
  • Use antitracking solutions. There are various types of software with anti-tracking features. Normally this would identify websites that are attempting to track you. Not only does it identify them, but it usually has the capability to remember them and block repeated efforts.
  • Social networks. Avoid social networks if you can. Only include the minimum amount of information about you (including location – to prevent geolocation tracking, and secure your portable devices). Please avert from using any geo-tag feature.
  • Turn off geo-tracking or the transfer of data about your location. Block the function from your device, including browsers, phones, operating systems and even applications. You should be able to ‘disable location services’ and enable ‘do not track’ feature.
  • Monitor DNS-Leakage: Regularly check your DNS service for the leakage of personal data. Domain Name Server is a system in which local device addresses turn into IP addresses that other servers and routers can use to send and receive information. You can google “DNS leak testing” and you will get a lot of services that will help you.
  • Managing Plugins: Browser plugins are weak points in many security systems that can allow data to be lost even if other important security measures are taken. Hostile plugins track the scope of your interests. To maintain a high level of privacy, it is recommended avoiding plugins. If this is not possible, you can configure your system so that it always requests permissions to launch the plugin or run it in a sandbox for additional security.
  • Turn off JavaScript: JavaScript can deliver detailed information about you/your device to any server in the world. The practical solution would be to use a software that will check the list of domains that can run JavaScript. These are sites that you often visit. You can also create a whitelist of domains in your browser.
  • Disable the WebRTC: Real-time communication allows a web browser to request real-time information from other servers or browsers. To disable it, all you need to do is double-click anywhere on the row and change the value to “false.” If you need to enable WebRTC at any time, just repeat the process. But remember to set the value as “false” again once you are no longer using a direct, peer-to-peer connection.
  • Know the basics when on social media. Geotags are often automatically embedded within a picture, when taken on a smart device. People forget this, and often give away their location by simply uploading an image online.
  • Educate your staff on security protocols. Security Awareness is not just for those interested in cyber security. It is a crucial element that all employees must be aware of. But once employees are cyber security aware, have a checklist in place, are able to recognise cyber threats, the impact of a cyber-attack, and know the steps to prevent cyber threats from attacking and infiltrating their systems, businesses improve their security posture significantly. View this checklist here.

For more information, speak to one of our experts here.

  • SIGN UP FOR OUR NEWSLETTER

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

  • LATEST STORIES


    • Jun 2024
    • May 2024 Threat Advisory – Top 5
      May 2024
    • April 2024 Threat Advisory – Top 5
      Apr 2024
    • Warning to Comply – NYDFS Requirements Announced
      Apr 2024
  • CATEGORIES

    • Business Culture
    • Cloud Security
    • Crypto
    • Industry Insights
    • Infographics
    • Monthly Advisory
    • MSSP Advancements
    • Notes from the Field
    • SecurityHQ Update
  • Related Content

    View All

    How to Minimise the Risks of Geo-Location Tagging (8)

    blog

    The Do’s and Don’ts of Securing Your Portable Devices

    Portable devices contain sensitive and private information. Information that needs to be safeguarded to protect the safety and security of organisations, clients, and employees. Which is why, on top of standard security measures, it is important to secure all devices such as mobile phones and laptops, both commercial and private, to maintain security protocols and […]

    press release

    SecurityHQ Release New Mobile App

    LONDON, February 23 , 2021 — SecurityHQ, the leading provider in managed security services, launch their new Mobile App, SecurityHQ Response. Cyber never sleeps. Survival demands agility and response demands collaboration, visibility, and action. Which is why SecurityHQ is now part of the few MSSPs that offers an app for clients to handle and respond […]

    webinars

    Securing the Remote Worker

    How to Minimise the Risks of Geo-Location Tagging (2024)
    Top Articles
    Latest Posts
    Article information

    Author: Nicola Considine CPA

    Last Updated:

    Views: 6131

    Rating: 4.9 / 5 (49 voted)

    Reviews: 80% of readers found this page helpful

    Author information

    Name: Nicola Considine CPA

    Birthday: 1993-02-26

    Address: 3809 Clinton Inlet, East Aleisha, UT 46318-2392

    Phone: +2681424145499

    Job: Government Technician

    Hobby: Calligraphy, Lego building, Worldbuilding, Shooting, Bird watching, Shopping, Cooking

    Introduction: My name is Nicola Considine CPA, I am a determined, witty, powerful, brainy, open, smiling, proud person who loves writing and wants to share my knowledge and understanding with you.