• Call Now 08 9200 6030
  • info@core-it.com
FacebookMail
Core IT Solutions
Core IT Solutions
IT Support Perth – IT Services
  • Company
  • Expertise
    • Managed IT Support
      • Managed IT Services
      • Helpdesk & Onsite Support
      • Small Business IT Support
      • Network and Server Monitoring
      • Server and Workstation Maintenance
      • Backup and Disaster Recovery
      • Offsite Backup Replication
      • Asset Management
      • Mobile Device Management
      • Network Security
      • VMware
      • Microsoft Office 365
    • Cloud Services
      • Infrastructure as a Service (IaaS)
        • Private Cloud
        • Hybrid Cloud
        • Email Archiving
        • Desktop as a Service
      • Software as a Service
      • VoIP
      • Security Services
        • Network Firewall
        • Virtual Private Network
        • Anti-Spam / Anti-Virus / Anti-Malware
    • Project Services
      • Network and System Upgrades
      • Server Virtualisation
      • Relocation
      • Wireless Solutions
    • IT Consulting
    • Managed Printing
    • Vessel Management
    • Hardware as a Service (HaaS)
  • Our Work
  • Contact Us
  • FAQ
MENU CLOSE back  

Since its release nearly two years ago, Microsoft’s Windows 10 has been a huge success with the buying public.

However, the full extent of Windows 10’s data sharing has also been in the spotlight ever since its release – as everyone who installs the programme is automatically subject to the full range of personal data sharing that is built into Windows 10.

Privacy advocates have argued that Windows 10 sends back location, text input, voice input, touch input, websites you visit, and other telemetry data to Microsoft.

And in the past year or so, Microsoft has been forced to reveal some of what it does with the personal information it receives through Windows 10.

This newfound transparency is a response to governments worried that Windows 10 is intruding on your privacy.

For example, French regulators believe the software’s data collection has gone too far by tracking non-essential information like app running times – while the European Union (EU) is concerned that improvements in the ‘Creators Update’ are not good enough.

Fortunately, there is a way to prevent your computer being subjected to Microsoft’s scrutiny – as the computer giant does give you the option to ‘opt-out’ of any features you think may be invading your privacy.

So for those users or businesses worried about their privacy – here are some steps to prevent Windows 10 ‘spying’ on you:

 

1: Go to ‘Settings’ -> ‘Privacy’. From there you need to go through 13 different selection screens, turning everything that may concern you to ‘off’. These selections range from whether you want specific Windows apps to access your messages, camera and calendar, to several other areas. There are also some other important settings listed under the ‘General’ section.

 

2: You may wish to change Microsoft 10’s ‘Cortana’ settings by turning every option to ‘off’; especially if you do not find this feature useful.

 

3: At www.choice.microsoft.com/en-gb/opt-out there are two selections: ‘Personalized ads in this browser’ and ‘Personalised ads wherever I use my Microsoft account’. Both of these should be turned ‘off’. At the same time, it is also recommended that users wishing to protect their privacy opt out of all Microsoft ‘ad preferences’.

 

4: Finally, for those seeking better privacy, you may also wish to remove your Microsoft account completely from Windows 10, and instead use a local account. This will however, remove features like ‘synchronisation’ across other devices such as ‘OneDrive’ and ‘Windows Store’.

To remove your Microsoft account, go to ‘Settings’ -> ‘Accounts’ -> ‘Your Account within Windows 10’.

 

Lastly, for those people who may still be uncertain about how much of your personal information Microsoft 10 can access, here is a list of areas:

 

  1. Anything you type – as Windows 10 includes an embedded key logger
  2. Any credentials, including logins and passwords to websites, social networks and data storage
  3. Your current GPS coordinates (AGPS or approximate IP-based coordinates)
  4. Your entire web browsing history and search queries
  5. Wi-Fi access points and their passwords
  6. A list of installed apps
  7. Your address book, calendar entries, events and meetings
  8. The contents of emails and chats (encrypted messengers like Telegram are also vulnerable)
  9. Your content preferences – including the names of audio tracks and videos you may be playing.

 

(Courtesy TechGenix)

With Mike Peeters Media

About the author

The benefits of VMware for your businessAzure or AWS – who do you trust for your cloud storage?

Related posts

Backup of Cloud
Using the Cloud and the importance of back up
November 13, 2017
Accountability
Network Firewall solutions offer unrivalled data protection
October 9, 2017
Mobile Phone Virus Alert
Antivirus software for your mobile – is it necessary?
September 4, 2017
save-money.jpg.pagespeed.ce.jsZCp3wpVP
How technology can save your business time and money
August 7, 2017
laptop out of service
What is downtime really costing your business?
July 13, 2017
Budget
Preparing your IT budget – some tips
June 20, 2017
Contact Us Today
  • This field is for validation purposes and should be left unchanged.

Our Work
crane-corp ourworkkwinanacs ourworkmurffjpeg3 Bonfire Logo irp_logo fugro
Latest News
  • Using the Cloud and the importance of back up
    November 13, 2017
  • Network Firewall solutions offer unrivalled data protection
    October 9, 2017
  • Antivirus software for your mobile – is it necessary?
    September 4, 2017
Get in touch!
  • This field is for validation purposes and should be left unchanged.

Core IT Solutions

Copyright © 2023 Core IT | Website by Bonfire