Basic Tips For Photographers On How To Protect Your Images Online

Basic Tips For Photographers On How To Protect Your Images Online

Basic Tips For Photographers On How To Protect Your Images Online 

Participating in social media and taking advantage of the cloud computing and the web in general is a great way for photographers to gain exposure, make friends, get new creative ideas and promote their hobby or work. All this positivity is too good to be true and is tarnished by the dangers of online image theft.

images-security

(Image Source: Shutterstock)

This can happen at two levels:

  1. Breach of security, usually by password guessing. This means that everything in your account can be used or misused.
  2. Theft of individual images.

The first case is a catastrophic scenario that can easily wipe out professional lives and should be avoided at all costs. The second case is far less severe and can cause anything from a small irritation to serious drain of income. Images, like any data, can never be a hundred percent safe online, however there are simple measures that help.

Protect Your Password

There is a whole online community with dedicated forums on how to guess or predict passwords, it is therefore vital to follow some simple rules:

  • Never use single words as a complete password.
  • Do not include all or parts of your name, surname, birth date, pet name or data that can be found on online profiles.
  • Do not use your password as a hint.
  • Try to mix upper and lower case characters, numbers and symbols in the same password. The more unpredictable the order the better.
  • Avoid passwords that coincide with collection and gallery names. If necessary, make galleries unlisted so that only you can access them and then give access to who you want via links.
  • It might be overkill, but never use passwords of the 123456 or abcdef type. This way you are becoming a sitting duck waiting to be shot.

Protect Your Images

comic-strip-5 copy

Once an image is posted online, it is automatically pushed out in the wild jungle. Protecting individual images is in many ways an impossible task and believe it or not more difficult to achieve than keeping your passwords and accounts safe. Some measures are:

  • Disable right clicks on your website. It is the very first thing tried on images.
  • Use watermarks. These can vary from a signature in one corner of the image to heavy watermarking over the whole image surface. For the images I really care about, I prefer a combination of the two, with tiled small watermarks all over the image surface. The key here is to avoid making your shots repulsive and destroying the worthiness of otherwise good work. Making watermarks opaque and barely detectable visually is very important. If you find them annoying then resorting to a signature watermark is enough for you.
  • Resort to professional watermarking like that provided by Digimarc that includes an owner ID and tracking across the Internet. I find it hyperbole because the aim is to prevent theft in the first place.

I would say that there are ways to minimize rather than prevent damage. Once a photographer is aware of online dangers, it is at their discretion to choose appropriate measures. The whole idea is that there is many people with few moral inhibitions and very bad intentions. Therefore, spending time to protect your visual creations is time very well spent.

By Dimitrios Matsoulis

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…