How To Internet Explorer Privacy and Security Settings

Protect your identity and sensitive information by becoming invisible on any public WiFi network

byJared Howe January 24, 2016

Internet Explorer has security measures in place to help protect you as you browse the web.

Follow these steps to adjust these settings:

. The Internet Options window appears.

tab. This tab has a section at the top that lists the various security zones that Internet Explorer uses. For each of these zones, you can select a custom level of protection.

. A second window appears that allows you to select various security settings for that zone. The Internet zone is where all sites initially start out. You should apply the

security setting for this zone. By selecting the

security setting, several features including ActiveX, Active scripting, and Java are disabled. Then click

, and drag the slider control up to

to set security zone for sites that you think are safe to visit.

To add or remove sites from this zone, click

. A secondary window appears listing the sites that you trust, where you can add or remove them. You may also require that only verified sites (HTTPS) can be included in this zone. You should set the security level for the trusted sites zone to Medium-high (or Medium for Internet Explorer 6 and earlier). If you trust that the site will not contain malicious content, you can add it to the list of sites in the Trusted sites zone. Once a site is added to this zone, features such as ActiveX and Active scripting are enabled for the site.

. The Advanced Privacy Settings window appears.

radio button for both first and third-party cookies. This prompts you each time a site tries to place a cookie on your machine. If the number of cookie prompts is too excessive, you can select the option to

. This allows non-persistent cookies to be accepted without user interaction.

For more information about cookies, see theManaging Browser Cookieshow to article.

on the Privacy tab to specify which websites are always or never allowed to use cookies. You can add or remove sites, and change the current settings for existing sites.

tab to manage settings that apply to all of the security zones.

Enable third-party browser extensions

checkbox. This option includes tool bars and Browser Helper Objects (BHOs). While some add-ons can be useful, they also have the ability to violate your privacy. Internationalized Domain Names (IDN) can be abused to allow spoofing of web page addresses, which can allow phishing attacks to be more convincing.

To protect against IDN spoofing, select the

checkbox. Sounds in web pages may introduce security risks by having the browser process additional untrusted data.

Jared Howe is PRIVATE WiFis Senior Manager, Product Marketing Communications. Working in high tech for over 15 years, Jared currently lives in Seattle with his wife, daughter, and their two cats.

Private Communications Corp. Partners with FreedomPops UNREAL MOBILE, the first MVNO to automatically include VPN, Data Compression and Ad Blocking Services

Private Communications Corporation and Trinity Mobile Networks Announce Partnership To Provide Seamless WiFi and Cellular Connectivity to Wireless Operators and Consumers

6 ways to stay safe this holiday season while shopping online

The future of privacy and VPNs are intertwined

Is your hotel decrypting your encrypted data?

KRACK bug targets secure WiFi networks

Three ways a VPN helps you (that you probably didnt know about)

Millennials Need to Care More about Internet Security

Why English Soccer Players Wont Use Public WiFi

WiFi Pineapple Redux: Hacking Toy Offers No Legitimate Use, Tricks Hotspot Users

Ask the Expert: Am I Safe Using My Laptop in My Hotel Room?

Ask the Expert: What You Should Know About Googles Privacy Policies

Ask the Expert: Can a VPN Protect You From Government Surveillance?

Privacy on Facebook Takes Two Huge Hits

The Perils of using Facebook on Public WiFi

Why Your Facebook Chats are Being Monitored

Information Security: Whos Looking Over Your Shoulder?

For all school upgrade, and other hack jobs, we are the…

If you are going to claim adultery as the reason for…

if you ever require the service of a professional to consult…

The thing is sometimes you do not need a robust platform…

I am not much of a network user. I do use…

Ironically your self advertising article ends with your own software being…

I arrived at this article BECAUSE I was just a victim…

Informative blog post , I loved the points , Does someone…

I use PureVPN. It would be good for protection for people…

Maybe you can help me. I am looking for an…

Health Insurance Exchange Online Safety

Ask the Expert: What Are Supercookies? Do They Affect My Online Privacy?

Ask the Expert: Is the Government Really Trying to Get Access to Websites for Surveillance Purposes?

Cyber Security Training Just As Important at C-Level

Data Brokers, Transparency, and the Future of our Private Identities: Part 1 of 2

Online Privacy QA With Robert Vamosi, Author of When Gadgets Betray Us

The Dangers of Geotagging and What You Can Do to Protect Yourself