Protecting Your Information Online

| 0

As our lives become increasingly entangled in the digital world, we face many challenges and risks when protecting our personal information. Data breaches, identity theft, phishing, malware, and cyberattacks are common threats that can compromise the privacy and security of consumers’ data. We all need to be aware of the best practices and tools that can help us safeguard our information online.

Below are several of the best practices that you can follow to protect your information online:

Use strong and unique passwords for different accounts and devices. A strong password should be at least twelve characters long, include a mix of letters, numbers, and symbols, and avoid common words or phrases. A password should not be reused with multiple accounts or devices, as this can increase the risk of hacking all the accounts using the same password.

Use two-factor authentication (2FA) whenever possible. 2FA is a security feature that requires an additional verification step, such as a code sent to a phone, app, or email, a set of security questions only you know the answer to, or a biometric scan to access an account or device. 2FA can prevent unauthorized access even if the password is compromised or stolen.

Be careful about what you share online and who you share it with. Avoid posting or sending sensitive information, such as personal details, financial information, or photos, on social media platforms, messaging apps, or email. You should also check the privacy settings and permissions of the apps and websites they use and limit the amount of data they collect or share with third parties. Set apps to share information only with friends, turn off tracking, and limit apps’ access to location data where possible.

Consider using a VPN (Virtual Private Network). VPN on your tablet, computer, or phone encrypts your internet connection and hides your location from hackers. The VPN connection makes it almost impossible for third parties to track your online activity. Using a VPN application is highly recommended to protect your privacy on public Wi-Fi networks.

Keep your applications, web browsers, and devices updated. You should set applications on your tablet, phone, or computer to update automatically.  I would also recommend checking for updates manually on a regular basis (at least monthly). This includes the operating system of the device, along with web browsers and other apps that connect online. Updates not only fix productivity issues. They provide necessary security updates. Missing updates will leave you vulnerable to threats.

Reject cookies and other trackers when possible. Websites now ask or allow you to set what cookies and information you will allow them to track. Take advantage of this opportunity to reduce the information you share with sites. You can also set your web browser to block cookies and trackers on various websites. Web browsers can also be set to send a “Do Not Track” request to the site to block some of the cookies and other trackers. Not all sites process this request, but it is worthwhile to activate this setting. To learn how to change the tracking management settings in your browser, type in “tracking prevention and the name of the web browser you use (Chrome, Firefox, Edge, Safari, or other browser).”

Install antivirus software. Antivirus software (AV) can detect, quarantine, and\or delete threats that may exploit systems or devices. AV can also warn about malicious websites and provide other services that can help protect your information online such as VPN, scanning for your information on sites that sell information on the dark web, and other features.

Avoid clicking on suspicious links or attachments in emails or messages. Be wary of phishing emails or messages that trick you into revealing personal information or downloading malicious software. Phishing emails or messages may appear from legitimate sources, such as banks, government agencies, or online services. Still, they often have spelling errors, grammatical mistakes, or urgent requests. Always verify the sender’s identity and the authenticity of the link or attachment before clicking on it by contacting the sender through an alternate means. Do not reply directly to the sent message. Look for senders’ information in your contact list or company website.

Consider purchasing identity theft insurance. In today’s environment, it is not a question of if your data will be involved in a data breach but when it will happen. You can purchase identity theft insurance through the same companies that sell your car or homeowners insurance. You can also purchase it through other companies like LifeLock or other Antivirus providers. While it does not protect you from the breach, it will help you recover your identity should your information be used to steal your identity or create loans or large purchases in your name.

Get your yearly free credit report and consider subscribing to one of the three credit monitoring services. You can get your credit reports from one of the three credit monitoring services, Experian, Equifax, and TransUnion, every year for free by going to Annual Credit Report.com and filling out a request.  You may want to consider subscribing to one of these services, which allows you to receive alerts when changes happen to your credit report, lock your credit report, and set fraud alerts to prevent others from opening lines of credit with your information.

Follow Lear, Joe K.:

Consultant for Broadband Initiatives, University of Missouri System Office of Engagement. Former Extension Regional Director in NW Missouri. Twenty years in the Information Technology field in Missouri and Kansas.

Latest posts from