Cart

  • SUGGESTED TOPICS
  • The Magazine
  • Newsletters
  • Managing Yourself
  • Managing Teams
  • Work-life Balance
  • The Big Idea
  • Data & Visuals
  • Reading Lists
  • Case Selections
  • HBR Learning
  • Topic Feeds
  • Account Settings
  • Email Preferences

You’re Not Powerless in the Face of Online Harassment

  • Viktorya Vilk

how to protect yourself online essay

Eight steps to take.

If you or someone you know is experiencing online harassment, remember that you are not powerless. There are concrete steps you can take to defend yourself and others. First, understand what’s happening to you. If you’re being critiqued or insulted, you can choose to refute it or let it go. But if you’re being abused, naming what you’re experiencing not only signals that it’s a tangible problem, but can also help you communicate with allies, employers, and law enforcement. Next, be sure to document. If you report online abuse and succeed in getting it taken down, you could lose valuable evidence. Save emails, voicemails, and texts. Take screenshots on social media and copy direct links whenever possible. Finally, assess your safety. If you’re being made to feel physically unsafe in any way — trust your instincts. While police may not always be able to stop the abuse (and not all authorities are equally well-trained in dealing with it), at the very least you are creating a record that could be useful later.

Online abuse — from impersonation accounts to hateful slurs and death threats — began with the advent of the internet itself, but the problem is pervasive and growing. A 2017 study from the Pew Research Center found that more than  40% of Americans have experienced online abuse, and more than 60% have witnessed it. People of color and LGBTQ+ people are disproportionately targeted, and women are twice as likely as men to experience sexual harassment online.

how to protect yourself online essay

  • VV Viktorya Vilk is Program Director for Digital Safety and Free Expression at PEN America, where she develops resources, including the Online Harassment Field Manual , and conducts trainings on online abuse, self-defense, and best practices for offering support.

Partner Center

  • Skip to main content
  • Keyboard shortcuts for audio player

Life Kit

  • LISTEN & FOLLOW
  • Apple Podcasts
  • Google Podcasts
  • Amazon Music

Your support helps make our show possible and unlocks access to our sponsor-free feed.

Your Technology Is Tracking You. Take These Steps For Better Online Privacy

Laurel Wamsley at NPR headquarters in Washington, D.C., November 7, 2018. (photo by Allison Shelley)

Laurel Wamsley

The steps to protect your security are more clear-cut than those for privacy.

Before I became a reporter at NPR, I worked for a few years at tech companies.

One of the companies was in the marketing technology business — the industry that's devoted in part to tracking people and merging their information, so they can be advertised to more effectively.

That tracking happens in multiple senses: physical tracking, because we carry our phones everywhere we go. And virtual tracking, of all the places we go online.

The more I understood how my information was being collected, shared and sold, the more I wanted to protect my privacy. But it's still hard to know which of my efforts is actually effective and which is a waste of time.

So I reached out to experts in digital security and privacy to find out what they do to protect their stuff – and what they recommend most to us regular folks.

Here's what they told me.

How Are Apple, Amazon, Facebook, Google Monopolies? House Report Counts The Ways

How Are Apple, Amazon, Facebook, Google Monopolies? House Report Counts The Ways

1. to protect your accounts, practice good security hygiene..

There are some steps that make sense for almost all of us, says Eva Galperin , director of cybersecurity at the Electronic Frontier Foundation. Those include using strong passwords, two-factor authentication, and downloading the latest security updates.

She and other experts make a distinction between privacy and security when it comes to your data. Security generally refers to protecting against someone trying to access your stuff — such as stealing your credit card number or hacking your accounts. Privacy is more often used to talk about keeping your movements from being tracked for purposes of advertising or surveillance.

It turns out that the steps to protect your security are more clear-cut than those for privacy — but we'll come back to that.

Edward Snowden: Why Does Online Privacy Matter?

TED Radio Hour

Edward snowden: why does online privacy matter.

Use strong passwords or passphrases for your accounts. Longer than a password, passphrases should be strong and unique for each site. Don't use 1234. Bring some randomness and special characters into it. And don't use the same password for different websites: You don't want all your accounts to be compromised just because one gets hacked.

Use a password manager to keep track of your passwords, Galperin says — then all you have to do is remember the passphrase for your password manager.

Turn on two-factor authentication for your important accounts. You've seen this: Usually you're asked to put in your mobile number so that you can receive a text with an additional number you input before you can log in.

That's the most common type of two-factor authentication — but it's not the strongest, Galperin says, because SMS messages can be intercepted by your Internet provider, law enforcement or the government.

If you want to go a step further, Galperin recommends using an application that sends the second factor to an app on your phone, such as Authy or Google Authenticator , as these are harder to intercept. (Full disclosure here: NPR receives funding from Google and Facebook.) You can also use a physical key you carry with you that plugs into your computer's USB port and serves as the second factor.

6 tips for making a career change, from someone who has done it

6 Tips For Making A Career Change, From Someone Who Has Done It

Download the latest security updates.

Those nudges you get from your computer or phone to install the latest security update? You should download those.

"Most applications, when they're compromised, are not compromised by scary zero-day bugs that nobody knows about," Galperin says. "They are compromised by problems that everybody knows exist that have been publicly reported, and that the company has fixed and they have issued a patch in their security update. But if you do not take the security update, you do not get the benefit of the work of the security engineers at that company."

How To Sign Up To Work The Polls On Election Day

How To Sign Up To Work The Polls On Election Day

2. beware of phishing..

Not all attacks on our security come through malware or hackers invisibly breaking into your account. It's common that we're tricked into handing over our passwords or personal information to bad actors.

These attempts can happen via email, text message or a phone call. And generally they're trying to get your username and password, or perhaps your Social Security number. But there are often signs that these messages aren't legit – spelling or grammar errors, links to websites other than the one it should be linking to, or the email is coming from a weird domain.

If it feels fishy, it might be phishing.

Twitter Expands Warning Labels To Slow Spread of Election Misinformation

Twitter Expands Warning Labels To Slow Spread of Election Misinformation

3. protect what matters most..

Depending on your situation, you might want to take additional precautions to safeguard your privacy and security.

To figure out what steps people should take to safeguard their stuff, Galperin suggests you make a security plan. The Electronic Frontier Foundation has a guide to doing this, which starts by asking yourself these questions:

  • What do I want to protect?
  • Whom do I want to protect it from?
  • How bad are the consequences if I don't?
  • How likely is it to need protecting?
  • And how much trouble am I willing to go through to try to protect it?

Resources For Securing Your Data

The Surveillance Self-Defense site from the Electronic Frontier Foundation is a good place to start. Here's its guide to making your own security plan and figuring out what you most want to protect.

From Tactical Tech, here are handy how-to kits for different scenarios, including securing your data , increasing your online privacy and making your phone less addictive .

You can use the answers to those questions to focus your efforts on securing the things that matter most to you.

4. Delete some apps from your phone. Use a browser instead.

Matt Mitchell is a tech fellow at the Ford Foundation, and the founder of CryptoHarlem , an organization that teaches people to protect their privacy, including from surveillance.

Apps can learn a lot about you due to all the different types of data they can access via your phone. Seemingly harmless apps – like say, a flashlight app — could be selling the data they gather from you.

That's why Mitchell recommends "Marie Kondo-ing" your apps: Take a look at your smartphone and delete all the apps you don't really need. For many tasks, you can use a browser on your phone instead of an app.

Privacy-wise, browsers are preferable, because they can't access as much of your information as an app can.

I mentioned to Mitchell that even though I use Facebook and Twitter, I don't have those apps on my phone — partly so that I'll use them less, and partly for privacy reasons. I wanted to know — did I accomplish anything by not having those apps on my phone?

"You've accomplished a lot," he says. He compares it to oil companies turning crude into petrol: Your data can be turned into profit for these companies. "Every time you don't use an app, you're giving them less data, which is less money."

Mitchell says that's true even if you've been on Facebook a long time, and it feels like the company already knows everything about you. He compares it to smoking: It's never too late to cut back or quit — you'll still benefit by giving it less data to harvest.

5. To protect your chats, use an encrypted app for messaging.

If you want the contents of your messages to be secure, it's best to use an app that has end-to-end encryption, such as Signal or WhatsApp. That means you and the recipient can read the message you send — but no one in the middle.

But even though the contents of your messages are protected by encryption in apps such as Signal and WhatsApp, your metadata isn't — and someone could learn a lot about you from your metadata, Galperin warns. She compares it to what you can learn just by looking at the outside of an envelope in the mail: who sent it to whom, when and where it was sent from.

And WhatsApp is owned by Facebook — so when you share your contacts with WhatsApp, Facebook is getting that info, though it can't read the contents of your messages.

If you're on an iPhone, iMessages are encrypted when you're messaging another iOS device — but not when you're messaging an Android phone. Signal offers encrypted messaging on both Android and iPhone.

What about Facebook Messenger? Jen King , director of privacy at Stanford Law School's Center for Internet and Society, advises against using the Messenger app.

The app "has access to far more info on your phone than using Facebook through a browser," she says, recommending something such as WhatsApp or regular SMS texting instead.

And if encryption matters to you, be careful about backing up your chats to the cloud. If you back up your WhatsApp messages to iCloud or Google Drive , for example, they're no longer encrypted.

"That backup is just a database. And that database is easy for someone to open and read," Mitchell says, if they were able to access your cloud account. To keep your messages from prying eyes, turn off cloud backups and delete existing WhatsApp backups from iCloud or Google Drive.

California Rings In The New Year With A New Data Privacy Law

California Rings In The New Year With A New Data Privacy Law

6. turn off ad personalization..

Whenever possible, Mitchell recommends going into your settings and turning off ad personalization, which often gives companies permission to do invasive tracking.

Opting Out Of Ad Personalization On Some Major Platforms

Google and Android

Here's a link to limit ad personalization on Google and Android.

This page shows you how to opt out of ad personalization on Apple. As of this writing, it hasn't been updated for iOS 14. If you have updated to iOS 14, go to Settings > Privacy > Apple Advertising > turn off Personalized Ads.

  • On this page , you can go to the ad settings tab and toggle the settings to not allowed.
  • This page has steps to disconnect your activity off Facebook that is shared with Facebook, and clear that history.
  • On the Off-Facebook activity page , under What You Can Do, you can click on More Options > Manage Future Activity > and toggle it to off. ( This page has those steps.)

This page explains how to opt out of ad personalization.

He also recommends going to myactivity.google.com and deleting everything you can. On the left, there's a tab that says "Delete activity by." Select "All time." On your My Google Activity page, you can turn off Web & App Activity, Location History and YouTube History.

"It will show you every search term and everything you've ever done, every YouTube video you've ever looked at, all that stuff," he says. "It'll say, are you sure you want to delete this? 'Cause if you delete this, it might affect some stuff." Mitchell says: Delete it.

7. It's difficult to protect your privacy online if there aren't laws to protect your privacy online.

Tighter privacy settings only get you so far without laws that protect your privacy, says Ashkan Soltani , the former chief technologist for the Federal Trade Commission and one of the architects of the 2018 California Consumer Privacy Act .

Activist Aims To Strengthen California's Consumer Privacy Act

There are laws around health information and credit and financial information, he explains, and some states have Internet privacy-related laws .

But nationally, the U.S. doesn't have a universal data privacy law safeguarding everyday online privacy.

Soltani says he rarely recommends steps such as using ad blockers or VPNs for most people. They require too much attention and persistence to deliver on privacy, and even then they are limited in their effectiveness.

"The incentives are so high on the other side," Soltani says, "to uniquely identify people and track them that [users] will never have enough motivation and incentive to do it to the degree of this multibillion dollar ad tech industry."

So how do you protect your privacy? Get involved and call your congressperson, he says — tell the policymakers that you care about online privacy.

8. Start small and take it one step at a time.

Faced with this landscape, getting a tighter hold on your digital privacy and security can feel daunting. But Galperin has this sound advice: Just do a little bit at a time.

You don't need to make a list of all of your accounts to integrate into a password manager — you can just do each account as you log into it.

Even just doing the basics — strengthening your passwords, turning on two-factor authentication and watching out for scammers — can make your accounts a lot more secure. Then keep going: There are a lot of other steps you might want to take, depending on your needs.

We're going to be on the Internet for a long time. The more each of us understands how our data are collected and used — and how to keep private what we want to keep private — the better, safer and healthier our digital lives will be.

The podcast portion of this episode was produced by Audrey Nguyen. She also contributed research.

We'd love to hear from you. Leave us a voicemail at 202-216-9823, or email us at [email protected] .

For more Life Kit, subscribe to our newsletter .

  • Life Kit: Life Skills

Home » Internet Service

How to Stay Safe Online

10 easy tips for creating passwords, installing antivirus software, and using a VPN to keep you safe online.

Catherine McNally

We may earn money when you click our links.

It’s no secret that the internet is home to some shady characters, but staying safe online doesn’t require you to turn your internet off. Instead, stay mindful and take a look at these 10 easy tips for internet safety:

  • Don’t share personal information.
  • Double-check and verify links.
  • Use secure public Wi-Fi.
  • Only log into sites that start with https://.
  • Be careful who you chat with.
  • Turn off your Bluetooth.
  • Use antivirus software.
  • Use secure passwords.
  • Backup your data.

Read on to learn more about each tip, plus find out about resources that can help you and your family stay safe while surfing the web.

1. Don’t share your personal information

When it comes to online safety, it goes without saying that you should never share your passwords, banking information, social media account access, or address online. And keep in mind that identity theft isn't the only risk with of a lack of cyber security, so some details are riskier to share than you'd expect. Other information, like details about your relationship, could be used to figure out answers to your security questions or even give hackers a tip-off when it comes to guessing your password.

You should also be aware that anything you post on social media (or anywhere) may continue to exist online even after you delete it. We’ve had prospective employers ask about content from our high school blog—and that’s been offline for about a decade or longer now. (Cue the facepalm emoji.)

2. Double-check any links before you click

When checking your email or scrolling through social media, make sure you know and trust any links before you click on them.

Many cybercriminals seek to infest your computer with malware by tricking you into downloading compromised apps and software. Before you download, be sure you trust the site you’re getting your new game or app from. And just straight up avoid downloading anything that looks suspicious.

One way to tell if a link is safe is to mouse over it. This will show a preview of the full link in your web browser’s status bar. Check to make sure the preview link matches the site it should be from—you can verify the correct site link by googling the company name.

For example, if you get an email from Wells Fargo bank and the link preview shows “www.wells-fargo-bank.com,” it doesn’t match the correct site link that comes up in Google: “www.wellsfargo.com.”

And if you get an email that asks you to log in, it’s safer to not click the login link in the email, and instead go to the brand’s official site to sign in there. You can go to the official site either by googling the brand’s name or, if you know it by heart, typing the site address in the URL bar of your browser.

This tip includes links sent to you by friends on messaging apps. True story time: We’ve had our computer compromised by a link sent by a trusted friend over a messaging app before. The bottom line is, if it seems sketchy, play it safe and don’t click.

If you’re not sure if a link is safe, you can always Google the company to find a link to the official site. Or, if an email or site asks you to log in to your bank or other accounts, you can always call to verify the request.

3. Use secure public Wi-Fi networks

You should never use an unsecured (unlocked with no password) public Wi-Fi network unless you absolutely have to. And if you do use one, avoid logging into any of your accounts online or on apps or entering in any personal or financial information.

Hackers are known to set up fake Wi-Fi hotspots to lure unsuspecting web surfers in. Once someone logs into the fake Wi-Fi, the hacker can see basically everything they do online. Scary . 

If you’re out on the town and looking for a Wi-Fi connection, it’s safest to ask a barista or employee what the name of their Wi-Fi network is. And if the password isn’t posted where you can see it, make sure you get that info too.

4. Use a VPN with your Wi-Fi connection

A VPN , or virtual private network, securely connects your device to an internet server so that no one can monitor your activity or access your data through your internet connection. It’s a great (and legal) way to keep your connection secure at home and even while you’re out and about using public Wi-Fi.

The only downside to the increased security a VPN provides? It could slow your internet connection. This is because the VPN routes your info through another server to secure your data. You win some, you lose some, we guess.

Check out our guide on how VPNs work , plus a list of our top VPN picks.

More people are working from home lately, and that means many of us may be targeted by online criminals. One way to keep yourself protected is to use a VPN—and keep it updated, as recommended by the US Cybersecurity and Infrastructure Security Agency (CISA).

If you're looking for secure internet providers, here are some of our top picks.

5. Only log into sites that start with https://

Need to see your checking account balance? If you’re about to log into any site, make sure the address at the top of your web browser starts with https:// and not http://. You may also see a padlock symbol next to the site address.

The “S” stands for “secure,” and it means the site is encrypting your data.

Online shopping involves providing personal information such as your bank account, or credit card information. Before checking out, double-check that the site you're on is secure. Cybercriminals are always looking for ways to get ahold of credit cards and bank account information. 

6. Be careful who you and your children talk to

Cyberbullying, threats, and harassment are very real online issues. We recommend being choosy about who you talk to and engage with online. And if they cross the line, document the issue and hit that block button. No one deserves to be treated that way.

Children and teens may be cyberbullied by their peers, leaving them in a rough spot because they personally know the people involved. That’s why it’s important for you to get involved in what your kids are doing online and make sure they know what to do in case they’re bullied online .

7. Turn your Bluetooth off

A team of researchers found that Bluetooth communications can be compromised and even manipulated. 1 They were able to exploit a vulnerability in a Bluetooth connection, then listen to and change the content of nearby Bluetooth communications.

That’s not to say you should never use your Bluetooth. But if you’re not paired to another device and actively using it, it’s best to turn it off. You might even save some of your phone’s battery by doing that.

8. Use antivirus and antimalware software

You should never surf the web without protection in place. Even if you’re on a budget, you can find free and low-cost antivirus software.

Whatever the case, paying a little out of pocket for the software is worth it to avoid the headache of dealing with malware—or worse. And if you already have an antivirus or antimalware software installed, make sure you keep it up to date.

Some of our recommended antivirus and antimalware software includes the following:

  • Norton AntiVirus Plus
  • Bitdefender
  • Malwarebytes
  • SpyBot Search and Destroy

9. Create and use complex passwords

Yup, we’re gonna beat that drum: you should always use complex passwords to improve internet safety. A strong password can do a lot to deter cyber criminals. And if your password is listed in the top 200 commonly used passwords (or if it’s similar to any of these, to be honest), you should change it. Now. It also won't hurt to enable a multi-factor authentication where possible.

If you need some help coming up with a secure password, here are some tips:

  • Make it at least 15 characters long—longer, if possible.
  • Mix up letters (both lowercase and uppercase), numbers, and symbols.
  • Don’t use sequences of numbers or letters, like “qwerty.”
  • Avoid substitutions like leetspeak (where letters are replaced with similar-looking numbers and symbols).

We know, we know. Passwords are hard enough to remember on their own, let alone when you need a unique password for every site. We recommend using a reputable password manager like LastPass or 1Password .

10. Backup your data

Most Macs and PCs have an option to let you backup your data, and it’s worthwhile taking the time to do it every so often. Data backups can be a lifesaver if your computer gets infected with a virus: you should be able to restore your computer to its original state before it got infected.

Here are some guides for different ways to backup data on your Mac, iOS devices, or PC:

  • iCloud (iOS devices)
  • Time Machine (Mac)
  • Windows 8.1 (PC)
  • Windows 10 (PC)
  • KNOB Attack, “ About the KNOB Attack ”

Related Articles

Football field at the 50-yard line

Our Methodology

Go to Reviews.org AU edition

Internet in your area

Internet in Los Angeles

Internet in New York City

Internet in Atlanta

Internet in Houston

Stay updated on the latest products and services anytime, anywhere.

By signing up, you agree to our  Terms of Use  and  Privacy Policy .

All content © 2023 Reviews.org. All rights reserved. Disclaimer

how to protect yourself online essay

How To Protect Your Personal Information & Privacy Online

More of your personal information is available online than you think. Here’s how to regain control of your online privacy.

how to protect yourself online essay

Yaniv Masjedi

Contributing Cybersecurity Writer

Yaniv Masjedi is the CMO at Nextiva, a provider of cloud-based, unified communication services. Previously, he headed the marketing department at Aura. Yaniv studied Political Science and History at UCLA. Follow him on Twitter: @YanivMasjedi.

how to protect yourself online essay

Jory MacKay

Aura Cybersecurity Editor

Jory MacKay is a writer and award-winning editor with over a decade of experience for online and print publications. He has a bachelor's degree in journalism from the University of Victoria and a passion for helping people identify and avoid fraud.

Illustration of an open laptop with a keyhole on its back

Aura’s app keeps you safe from scams, fraud, and identity theft. Try Aura for free.

In this article:

how to protect yourself online essay

Aura’s digital security app keeps your family safe from scams, fraud, and identity theft.

How Secure is Your Private Information Online?

By all accounts, 2023 was the worst year ever for online privacy. In just the first six months of the year, 1,393 data breaches leaked private and personal data from over 156 million Americans [ * ].

In one of the worst examples, the MOVEit data transfer breach gave hackers access to private healthcare data from millions of patients in Missouri, Oregon, and more [ * ].

While having your private healthcare information made public would be a nightmare for most people, less extreme data leaks and compromises happen on a daily basis.

Keeping your personal and private information safe is a critical part of online safety.

The more personal details scammers and fraudsters have about you, the easier it is for them to hack your accounts, steal your identity, and scam you.  

While it’s getting harder to live a “private life” online, it’s not impossible. With a few steps and additional security measures, you can learn how to protect your privacy, fend off identity thieves and hackers, and take back control of your personal data.

{{show-toc}}

How Strong Is Your Online Privacy?

Online privacy refers to both your ability and right to keep private information to yourself. While half of the equation has to do with what you post online and how the services you use share your information, the rest of it is made up by laws and policies that are meant to protect consumers.

Unfortunately, few regions have strict rules in place around how tech companies, advertisers, and online services protect your online privacy. And even when online privacy laws exist, not all companies follow them — such as when Cambridge Analytica leveraged Facebook to collect millions of data points on U.S. voters [ * ].

This is what makes online privacy so complicated:

Even if you do everything you can to protect your personal information online, companies can get hacked, collect more data than necessary, or use what they know about you for questionable or even fraudulent purposes.

This brings up a third aspect of online privacy: internet security .

Internet privacy and internet security are different but closely related. Privacy usually deals with legal data collection (like what you post on Instagram, Snapchat , and other social media), while cybersecurity focuses on illegal data collection (like protecting your accounts from hackers or cyberattacks).

In the end, there’s a lot of overlap between the two. Good security enhances privacy, and enhanced privacy helps maintain good security. By taking some simple steps, you can improve both.

How To Protect Your Privacy and Personal Information Online

Follow these 12 steps if you’re concerned about how much personal information is available about you online.

1. Share less information with apps and services

The best step you can take to protect your information from people trying to scam you online is to share less of it. The best place to start is with social networks — but you should also be aware of the data collection policies for any app or service you use.

All social media platforms and apps collect data about who you are, your interests, and what you do online. All of these shares and data points make up your online footprint (which scammers can use to get access to your sensitive information).

Unfortunately, they’re rarely as careful with your data as you’d like.

Some recent examples include when Zoom connected its user accounts to LinkedIn profiles, revealing names and professions (even for “anonymous” users) [ * ]; or when Facebook kept hundreds of millions of account passwords in a searchable, employee-accessible database — and didn’t notice for seven years [ * ].

How to remove your personal information from social media:

  • Share less on your profiles. Share as little as possible and skip any “optional” information, like a middle name or phone number. ‍
  • Create a throwaway email address. Email lists are often sold or rented on the Dark Web and can fall into unsafe hands. Consider making a throwaway email just for subscriptions. With Aura, you can use email aliases to protect your primary email address from scammers.
  • Limit collaborative folders, albums, or playlists. The more people who have access to your data, the more likely it could be leaked or hacked.

📌 Related: Digital Security: Your Personal Protection & Online Privacy Guide for 2023 →

2. Use strong and unique passwords with 2FA

Strong passwords are the most important — and sometimes the only — protection we have against identity theft and hackers. Just think about how much personal information could be found in your email account — such as bank account details, home addresses, or even your Social Security number (SSN).

If you don’t already have passwords or passcodes for all your devices (including guest accounts), add them now.

Here’s how to secure your accounts with stronger passwords:

  • Store passwords in a secure password manager. Make sure that you’re using strong and unique passwords on your online accounts. Since you probably have dozens of accounts, a password manager is an easier way to keep the information secure. Here's how you can view your saved passwords and add them to a password manager.
  • Enable two-factor authentication(2FA). This is secondary secure measure that can even protect you if you’ve shared your password with hackers in a phishing scam. If you’ve ever needed to type in a code sent to you via text message, you’ve used two-factor authentication before.
  • Set devices to automatically lock when not using them. Hackers can evade even a strong password if your device doesn’t automatically lock. For devices that use fast biometric authentication like fingerprint scanning or facial recognition instead of a code, the best setting is "30 seconds" or “immediately.”

3. Tighten privacy settings on your social media accounts

You don’t have to delete your social media accounts to improve online privacy. Instead, it can be enough to simply review the privacy settings on the online accounts you use regularly.

Companies make billions off collecting your personal information. In general, their default settings skew towards collecting more over protecting your data.

The best settings for you depend on what you want to share and what you want to protect. But there are a few areas where you should pay careful attention.

Pay special attention to these factors:

  • Location tracking. Consider turning off automatic geolocation data on your social media posts, photos, and comments.
  • Public information. Think carefully about what information should be public, hidden, or somewhere in-between. There are typically three levels of data: profile data, your content, and your interactions with other content.
  • Likes, shares, and comments. We usually think about limiting what we share, but your “likes” and comments on other posts are usually public as well. Profile pictures, names, and comments on other posts often show up in search results, even for “private” accounts.

📌 Related: How To Properly Set Up Your iPhone's Privacy Settings →

4. Remove unused mobile apps and browser extensions

Apps and browser extensions can change their security and privacy policies at any moment. If you’re not actively using a tool, it’s best to delete or remove it.

For example, Unroll.me is a free app that summarizes newsletters and subscription emails. But after an FTC investigation , their revenue model became clear: they scanned emails and sold the contents .

If you don’t understand how an app makes money, user data might be the answer.

Here’s what to do:

  • Only download apps and extensions from reputable app stores. Scammers and hackers create free apps and tools that hide malware or tracking software. To stay safe, stick with official app stores that are more likely to only approve legitimate apps.
  • Be suspicious of every app. Your device should warn you about the permissions an app or tool is asking for before you install it. Read through these carefully and make sure the tool isn’t asking for more than it needs.
  • Remove extensions from your browser. Eight popular Chrome and Firefox extensions turned out to include code that tracked all browser activity. The data included tax returns, medical data (which could lead to medical identity theft ), and secret developments at companies like Tesla and Apple.

Pro tip: If you use Chrome, you can see all extensions by typing chrome://extensions/ in your search bar. It’s good to delete — not just disable — any extensions that you’re not using.

📌 Related: How To Delete Your Digital Footprint →

5. Stop search engines from tracking you

Your search engine collects a huge amount of personal data about you. And for 92% of us, that search engine is Google [ * ].

The owners of the two largest search engines — Google and Bing — also operate the popular browsers Chrome and Edge, respectively. (So, they track a lot of data.)

The first step to improving search engine privacy is deleting your data.

  • For Google : Go to the My Activity dashboard and delete everything.
  • For Microsoft: You’ll need to clear data separately from Microsoft Edge and Bing .
  • For Yahoo: You can delete data from search history management .

Unfortunately, there’s no way to eliminate all online trackers on Google. An alternative is to switch to an online privacy-focused search engine like DuckDuckGo.

📌 Related: How To Protect Your Identity Online in 2023 →

6. Use a VPN to hide your browsing history

Your internet service provider (ISP) and web browser — like Google Chrome, Firefox, or Safari — may also collect data on your online activities. This can be used by advertisers, sold to scammers, or even shared with the government (or your work), even if you’re using private or incognito mode.

A virtual private network ( VPN ) encrypts your internet traffic so that no one can track what you do or see where you’ve been. Using a VPN can also protect you from hackers when using public Wi-Fi networks.

Here’s how you can protect your privacy while browsing online:

  • Use a VPN when off of your home network. Scammers can intercept your data over public Wi-Fi networks (such as at a coffee shop or airport ). Be especially cautious when online shopping and submitting credit card or banking details to websites.
  • Use Safe Browsing tools to warn you of fake websites. Some websites are made to steal your personal information. Aura’s Safe Browsing tools will warn you if you’re on a lookalike or fake website.
  • Protect your Wi-Fi password. Your router handles plenty of sensitive information, from passwords to financial information. Anyone with your Wi-Fi password and nefarious intent could try to steal your information.
  • Consider using  privacy-focused browser. A further step toward ensuring online privacy is using a different browser, such as Brave . The most secure browsing option is Tor , which hides your location and history across various layers. Tor makes for a slower browsing experience but with unmatched privacy.

📌 Related: Was Your IP Address Hacked? Here's How To Tell (and What To Do!) →

7. Don't ignore software or operating system updates

Most privacy hacks don’t come about from newly-discovered bugs. Instead, they take advantage of known vulnerabilities that have already been fixed — on computers that haven’t installed the fix.

A 2021 report by Bitdefender showed that unpatched vulnerabilities were among the top reasons why Windows systems were prone to attacks [ * ].

The first and most crucial step is to set your operating system to install updates automatically.

Here’s how to set-up autoupdates on:

  • Microsoft Windows
  • Apple macOS
  • Google ChromeOS

You can also download antivirus software to protect against malware like spyware, which collects data like credit card information in the background.

8. Use a Privacy Assistant to block ad and data tracking

Most of your personal data collected online isn’t for scams or data breaches — it’s for marketing. With a few simple steps, you can disable many of these trackers.

First, when pop-ups ask if you want to share data, say no.

Whenever possible, decline cookies on websites. If you use an iPhone or other Apple mobile device, iOS versions 14.5+ let you disable cross-app tracking [ * ] .

Finally, you can disable ad customization across the apps you use, including Google search , other Google services , Apple , Facebook ad settings , third parties that use Facebook data, Twitter , Microsoft , and Amazon .

Thousands of other websites use tracking as well, but disabling these larger companies will eliminate the biggest offenders.

Aura’s privacy protection plans can block intrusive ad trackers and automatically remove your personal information from data brokers who sell it to telemarketers and scammers.

📌 Related: 7 Ways Your Digital Footprint Puts You at Risk (and What To Do) →

9. Use encryption to keep data from prying eyes

You might think computer data, texts, and emails are safe. But you could be wrong.

Encryption “scrambles” your data unless you enter a decryption key or password. Encryption can protect your data in case cybercriminals steal your hard drive, intercept your text messages, or trick you into entering information into a fake website.

  • Encrypt the data on your computer. All modern Apple and Android mobile devices use encryption by default. You can also set up encryption on Windows and Mac so the data will be meaningless to anyone without your password.
  • Use messaging apps with end-to-end encryption. WhatsApp, Telegram , or Signal, are the safest messaging options (though WhatsApp still has other privacy concerns ). Other methods without encryption, including texts and Facebook’s Messenger app, have “back doors” which allow third parties to read what you send. You can add extra privacy protection against email hackers by disabling “smart features and personalization” in Gmail and other Google Apps.
  • Wipe devices before you sell or recycle them. Delete everything and restore your devices to their factory settings before giving them away.

Pro tip: Protect your privacy on devices when in public by disabling message previews on your lock screen. If previews show up on your phone’s lock screen, a thief can learn who’s contacting you and even use two-factor authentication without needing your passcode.

📌 Related: How To Tell If An Email Is From a Scammer [With Examples] →

10. Revoke unnecessary third-party app connections

Many modern apps ask to connect to other services to share data or work together. For example, any time you “sign in with Google/Facebook” you allow that tool access to certain data that Google or Facebook has about you.

For both your online privacy and security, it’s a good idea to limit the number of third-party app connections you have in place.

Here’s how to see which third-party apps are connected to:

  • Apple (select “Sign in with Apple”)

📌 Related: What Is Cyber Hygiene? 10 Easy Habits That Will Protect You Online →

11. Request that data brokers remove your personal information

Data brokers are services that scrape the internet and public records for your personal information — and then sell it to advertisers, marketers, or even scammers.

While you can request that data brokers remove your information , the honest truth is that there are hundreds of data brokers in the U.S. alone, each with their own process for requesting a data removal. Even worse, sometimes requesting a removal can mean providing even more personal data to these companies.

To remove your personal data from data brokers you have two options:

  • Contact each data broker individually. PrivacyRights.org has a list of data brokers with instructions on how to request that they remove your data. You can go through the list and contact each company separately.
  • Use Aura to automatically remove your data. Aura will scan data broker databases and request that they remove your personal data on your behalf.

📌 Related: Is Norton Privacy Monitor Assistant Worth It? →

12. Monitor your sensitive information with identity theft protection

No matter how much information you remove from the internet, data leaks happen. When your personal data is available, it puts you at risk of scams, hacking, identity theft, or simply more spam.

Aura’s all-in-one identity theft protection solution combines powerful digital security software that protects your devices and data with 24/7 identity, account, and financial monitoring.

If your personal information is leaked or being used fraudulently by scammers, Aura will warn you in near-real time and give you the support and help you need to shut fraudsters down.

Here’s how Aura’s identity theft protection helps online privacy:

  • Monitors your most sensitive personal information 24/7. Aura can track your most sensitive personal information and warn you if it’s been leaked.
  • Automatically removes your information from data broker lists. Aura will scan data broker lists and automatically request that they remove your contact details.
  • Protects your devices and data from hackers. Aura includes antivirus software, a military-grade VPN, AI-powered scam protection, and Safe Browsing tools to protect you from hackers.
  • Securely stores your passwords and warns you if they’ve been leaked. Aura’s password manager securely stores your passwords and gives you easy access to them when you need them. Aura will also warn you if your passwords are too weak or were recently leaked in a data breach .
  • Blocks ad trackers, fake websites, and more. Aura’s Privacy Assistant stops websites and apps from tracking you and can also block fake websites that could be trying to steal or collect your personal information.

The Bottom Line: Privacy and Safety Go Hand-in-Hand

While there are a lot of steps you can take to protect your online privacy, the good news is that most of them are within your control.

While limiting what you share, and telling companies how to treat your data, is an important step, a digital security and identity theft solution can do the work for you.

Aura protects your private and personal information with award-winning identity theft protection, three-bureau credit monitoring, automatic data broker removal, digital security tools, and more.

Keep your online life private (and safe). Try Aura's privacy-first plans .

Award-winning identity theft protection with AI-powered digital security tools, 24/7 White Glove support, and more. Try Aura for free.

Related Articles

Illustration of a fedora and a pair of sunglasses

The Dark Web Explained: How It Works & Why It's So Dangerous

See how cybercriminals profit from your personal information on the Dark Web. Learn how to protect your data from financial fraud and identity theft.

how to reduce your online footprint

How To Reduce Your Digital Footprint & Protect Yourself Online

Every site you visit, link you click, and search you make is part of your online footprint. Learn how to minimize your digital footprint today.

Try Aura—14 Days Free

Start your free trial today**

Staying Safe Online: 6 Threats, 9 Tips, & 1 Infographic

Before the current pandemic, we used the Internet to do a lot of things. Now, however, with everyone confined to their homes, we have been doing almost everything online. We’re not only talking about shopping. People from all around the world can connect via video calls. They can even work or study online. The Internet has become an essential tool to participate in modern life. However, it’s important to remember that online connection comes with a price.

The picture contains the statistics from Internet Crime Report by FBI: the number of cybercrimes almost doubled in 2020 compared to the previous year.

“Stay home, stay safe” is the current motto. But the more time you spend online, the greater the risk of cyber threats. During the pandemic, the frequency of online crimes has risen exponentially. According to an FBI report of 2020, the number of instances has doubled compared to previous years. Since we can’t stop using the Internet entirely, how can we protect ourselves?

This article:

  • examines the six main threats you face online
  • provides a list of nine effective tips on how to stay safe
  • contains an infographic that is easy to print out
  • Top 6 Cybersecurity Threats

9 Internet Safety Tips

  • Internet Safety Infographic

Top 6 Cybersecurity Threats in 2024

The FBI released a report created by the Internet Crime Complaint Center. It revealed that in 2020 the number of registered cybercrimes almost doubled compared to the previous year. Victims have lost large quantities of money due to different types of online scams. What caused such a drastic rise in online crimes?

One theory is that those who have been left unemployed have begun to make money as cybercriminals. These job seekers are so desperate that they agree to work for organized groups of criminals who scam Internet users. Unfortunately, this is the new reality that the high unemployment rates from the pandemic have created.

The picture describes the top cybersecurity threats of 2021.

Online frauds are becoming more and more sophisticated. Now, successful hackers also use tactics from human psychology and social engineering . Cybercriminals find weaknesses by applying psychological tricks. They blackmail people through social media or their phones. To keep yourself and your money safe, you need to be aware of all the online threats described below.

  • Phishing Attacks Phishing is one of the most popular types of cyber-attacks. The method works by sending out personalized messages to people and inviting them to click a link. These links damage the victim’s operating system by installing harmful software or even compromising the victim’s safety through the exposure of private information. Since most people are aware of such attacks, cybercriminals have had to develop new methods to trick users. Now, they use machine learning to create even more convincing messages. The main goal is to fool employees into disclosing sensitive information , such as passwords to the organization’s systems or credit card data.
  • Scareware Like phishing, this type of cybercrime is based on social engineering. Scareware describes all software that tricks users into visiting websites that contain viruses. These can be especially dangerous because they can mimic notifications from antivirus software . They show up in the form of pop-up messages that claim to have detected a virus on your computer. Such notifications look authentic. Users don’t think twice before paying for the installation of the software that can fix the supposed problem. However, what they receive instead is malware that intends to steal private data. Often, scareware saves your credit card information so that cybercriminals can use it for identity theft.
  • Third-Party Apps Even though third-party apps may have some benefits, they still carry potential risks to your privacy. Such apps ask for your permission to access your accounts. For example, some post on your social media accounts via other apps. This saves time and seems handy, right? Not so fast! There have been many cases where third-party apps have spammed and posted messages on people’s accounts. However, that’s not the worst thing they can do. Those apps can potentially hand your personal data over to other parties . Your security and privacy are undermined with third-party apps.
  • DDoS Attacks Distributed denial-of-service (DDoS) attacks are usually aimed at websites or online services. These attacks try to overwhelm a website with so much traffic that the server can’t withstand the assault. This can be in the form of an enormous number of requests or incoming messages. As a result, the website crashes and fails to operate normally. Sometimes, these attacks are mild or demand that you transfer money. However, with attacks powerful enough, hackers can take control of huge international services, such as Amazon, Netflix, or even Visa. Another way cybercriminals use DDoS attacks is to initiate them as a distraction. While the company or organization is trying to get things under control, the criminal steals data or installs malicious software.
  • Cloud Threats The idea behind cloud threats is simple – hackers use cloud services to retrieve personal data stored there. Sometimes accessing cloud data is just a first step in their plan to perform a DDoS attack or blackmail the users. Many companies and organizations have been the victims of these attacks. In 2020, the situation worsened. Individual users and big organizations have been reporting more and more cases of data loss through cloud attacks. Sometimes, cybercriminals remain unnoticed in the cloud system until much later. The time they spend preparing the attacks helps them evade security measures.
  • Work-from-Home Threats Since the start of the pandemic, many people have started working from home, which means that they receive less protection from their employers in regards to cybersecurity. The risks have increased for employees, which has IT specialists pretty worried. In addition to all the threats described above, users are exposed to the risks of using public Wi-Fi . Those who work from home are suffering from more phishing attacks as well. In part, this is due to the more active use of email and messaging apps.

All of these threats seem quite dangerous to your privacy, don’t they? What can you do to protect yourself from cyber-attacks? You don’t have to become an IT expert. Just following a few simple rules is enough.

Here are our main tips on how to keep cybercriminals away:

  • Capital letters
  • Unique signs

There are tools that can make this process easier. For example, password generators provide you with solid and secure passwords in just a few seconds.

  • Don’t share personal data on your social media accounts. Sharing pictures of major life events or everyday moments on social media may seem fairly innocent. However, you should probably be more careful. Everyone has access to that information. Skilled cybercriminals have no trouble tracking down your relationships and other details about your life. They may use what they find to trick your friends into giving up sensitive information. It’s not hard to find out dates of birth, email addresses, interests, and details about family members, which makes it even easier for hackers to break into your account (see the first tip to avoid this!).
  • Visit only secure websites. Sometimes, website content may seem too appealing not to visit. You might even go ahead and create a profile, sharing your personal information. You should be careful, though, because not all websites are safe places. Who knows what malicious programs and scams are hidden there? Before doing anything, make sure you check the website address. URLs beginning with “https” are safer than ones with “http” because the letter “s” stands for security. Another thing to look out for is a small lock sign near the URL . Nowadays, web browsers are able to recognize safe websites and mark them as secure with this sign.
  • Use legitimate software. Yes, we understand that it carries a high price tag, but do you really want to take risks? Going to unsafe websites and using third parties to get free software is not the best idea nor the most ethical practice. Whenever you want to get an app or a program, you should do it through an official provider’s website, whether or not you pay. This ensures the authenticity of the software. Otherwise, you risk downloading a virus or malicious program instead. Don’t forget to keep everything updated!
  • Be careful when using credit cards. It is estimated that for every $100 spent by credit card users, about $10 is lost due to fraud . There are many dangers in using your cards for online shopping, but these tips will help you avoid those traps. First of all, try not to use debit cards that are directly linked to your bank account, and use only one card to purchase things online. Another thing to consider is adding a second layer of protection, which is usually offered by your bank. For example, not only will you be asked to put in a password, but a code sent to your email or phone will be required. Lastly, don’t forget to check if the website is safe.
  • Use two-step verification. It’s easy for hackers to guess your password and steal your personal data unless they have to verify that they are the rightful owners. How is this done? The most common solution is a process called two-step verification. For example, Google offers this option to all of its users. Instead of simply typing in your password, you also need to enter a code that is sent to your phone in order to log in to your account. Many websites and services offer these security measures (such as banks, which we highlighted in the previous tip).
  • Steer clear of phishing scams. Chances are that at least once in your life, you have received a message with questionable content. Keep an eye out for similar ones and never respond or click on any links! Typically, the message contains some irresistible offer or could allegedly be sent from a website you trust. Sometimes, they can appear as notifications about an issue, calling for you to take some action. It is essential to recognize whether the sender of these messages is someone you actually know. Always remember to follow the tips described above, such as using two-step verification and legitimate software.
  • After getting a router from your provider, make sure you change its name and password . It is not hard to do by yourself, and such a measure can provide additional security.
  • It is also a good idea to see whether your new router has the most recent security protocols since these make it harder for cybercriminals to hack into it.
  • Don’t forget to log out. The convenience of staying logged in to your favorite websites is high, but it is dangerous for the security of your personal information. Not only can online services keep you logged in at all times, but they can also save all of your data. Sometimes, websites don’t even ask if you want them to remember passwords. We know that it is more difficult to enter long passwords every time you enter a website, especially from your phone, but this provides additional security. Think about these issues carefully and determine your priorities. We are only here to help you.

Credit, Loans, and Debt

Learn about getting and using credit, borrowing money, and managing debt.

View Credit, Loans, and Debt

Jobs and Making Money

What to know when you're looking for a job or more education, or considering a money-making opportunity or investment.

View Jobs and Making Money

Unwanted Calls, Emails, and Texts

What to do about unwanted calls, emails, and text messages that can be annoying, might be illegal, and are probably scams.

View Unwanted Calls, Emails, and Texts

Identity Theft and Online Security

How to protect your personal information and privacy, stay safe online, and help your kids do the same.

View Identity Theft and Online Security

  • Search Show/hide Search menu items Items per page 20 50 100 Filters Fulltext search

Your guide to protecting your privacy online

Facebook

The things we do throughout the course of our day give businesses access to information about our habits, tastes, and activities. Some might use it to deliver targeted ads to you, or to give you content based on your location, like stores nearby or the weather forecast. Others might sell or share that information.

Whether you use a computer, tablet, or mobile phone to go online, there are things you can do to protect your privacy. Check out ftc.gov/yourprivacy , your guide to protecting your privacy online. Here’s what it covers:

Online Tracking

Learn how online tracking works and what you can do about it. Plus:

  • How to change your privacy settings on your browser, your internet-connected TV, and your phone
  • How to opt out of target ads
  • What to know about ad blockers
  • How to opt out of data broker sites that sell your personal information
  • What to know about privacy and mobile apps

How To Secure Your Devices

Find out how to secure your internet-connected devices, starting with your router — it’s the key to privacy at home and in your small business. Plus:

  • How to know when your voice assistant is listening and ways to protect your privacy
  • Important security features for smartwatches
  • Using internet-connected (IP) cameras safely
  • Why it’s important to remove your personal data before you sell your car
  • What to do if you’re selling a home and leaving behind a smart thermostat, refrigerator, or other device

What To Know About Online Abuse and Harassment

Did you know some apps let people track you through your phone without your permission? Learn about stalking apps, how to tell if there is one on your phone, and what to do if there is.

If someone took or shared an intimate image of you without your consent, that’s considered non-consensual pornography. And that’s not OK. If that’s happened to you or someone you know, learn what steps you can take.

Your Guide to Protecting Your Privacy Online ftc.gov/yourprivacy

Read Our Privacy Act Statement

It is your choice whether to submit a comment. If you do, you must create a user name, or we will not post your comment. The Federal Trade Commission Act authorizes this information collection for purposes of managing online comments. Comments and user names are part of the Federal Trade Commission’s (FTC) public records system, and user names also are part of the FTC’s  computer user records  system. We may routinely use these records as described in the FTC’s  Privacy Act system notices . For more information on how the FTC handles information that we collect, please read our privacy policy .

Read Our Comment Policy

The purpose of this blog and its comments section is to inform readers about Federal Trade Commission activity, and share information to help them avoid, report, and recover from fraud, scams, and bad business practices. Your thoughts, ideas, and concerns are welcome, and we encourage comments. But keep in mind, this is a moderated blog. We review all comments before they are posted, and we won’t post comments that don’t comply with our commenting policy. We expect commenters to treat each other and the blog writers with respect.

  • We won’t post off-topic comments, repeated identical comments, or comments that include sales pitches or promotions.
  • We won’t post comments that include vulgar messages, personal attacks by name, or offensive terms that target specific people or groups.
  • We won’t post threats, defamatory statements, or suggestions or encouragement of illegal activity.
  • We won’t post comments that include personal information, like Social Security numbers, account numbers, home addresses, and email addresses. To file a detailed report about a scam, go to ReportFraud.ftc.gov.

We don't edit comments to remove objectionable content, so please ensure that your comment contains none of the above. The comments posted on this blog become part of the public domain. To protect your privacy and the privacy of other people, please do not include personal information. Opinions in comments that appear in this blog belong to the individuals who expressed them. They do not belong to or represent views of the Federal Trade Commission.

afbp1951 June 02, 2021 great stuff :)

B.S. in Cybersecurity

  • Career Outlook
  • Admission Requirements

Top 10 Ways to Protect Your Identity Online

November 25, 2019  |  6 Min Read

As the percentage of the population using the internet increases, so do the security risks.

Cyberthreats have become so widespread that the U.S. federal government has implemented a research and development department designed to formulate a plan to develop technology and create policies that minimize the potential risks in cyberspace.

With the rise in use of social media sites and networks, people are making more personal information available to the online world, making it more difficult to protect valuable data. Fortunately, there are a variety of ways to protect your own online identity and personal information.

Here are the top 10 ways you can protect yourself online:

1. Use Strong Passwords

The most common way to protect your online identity is to focus on creating strong passwords. When creating a password, choose something that will not be easily cracked or decoded. Never use a word or number that someone can associate with you such as a first, middle, or last name, a spouse or child’s name, address, phone numbers, employers, or other identifying letters or numbers. Mix up the letters and numbers used in your password and use symbols and a combination of upper and lowercase numbers when possible in order to  protect yourself from online security breaches . Additionally, it is important to never share your password with anyone. It might be necessary to change your passwords a few times each year.

2. Look for Encryption

Before making any sort of financial transaction online, look for signs that show whether the website is encrypted or not. To do this, look for two things: the trusted security lock symbols and the extra “s” at the end of http in the URL or web address bar. When you are on the page that’s asking for your credit card information, the “http” changes to “https” when it is a secure site. At the same time, a lock symbol will also appear on the right side of the address bar or at the bottom left of your browser window. These two signals show that the site is encrypted, which means nobody will be able to see information as it’s sent to the website owner. This keeps your name, phone number, address, credit card number and other sensitive information from being seen by anyone else.

3. Install Security Suites

Security suites are security programs that keep dishonest people and programs from infecting your computer and stealing information and data from you. This includes blocking harmful software such as spyware, viruses, and phishing scams that can be installed secretly when you are online. Some of the popular security suites include Norton Antivirus, McAfee Virus Protection, Ad-Aware Pro Security, and AVG Internet Security. Be sure to purchase and install one of these suites to protect your personal information online.

4. Turn on Web Browser Blacklisting

The lack of internet security is partially due to the internet browser being used. Many web browsers have additional security options such as blacklisting. This allows you to set the criteria for sites you will be navigating; only secure, trusted sites will be available to visit.

5. Avoid Phishing Scams

Phishing scams use a variety of methods to obtain your personal information and steal your identity. There are many different phishing scams out there, but they can be avoided by educating yourself on how to recognize them. To avoid being the victim of a phishing scam never open emails or attachments when the sender is unknown and don’t click on unsecure links from strange emails. Additionally, avoid anyone offering money, unfamiliar job opportunities or requests for donations to charities as this might be a plot to obtain your personal information and online identity.

6. Get Private Data Protection

Another way to protect your online identity and sensitive information when sharing it online is to get private data protection. This type of security suite will protect any private data that is included in emails, private messenger programs, social media sites, or in various blogs. By employing a  private data protection  suite, you can further prevent hackers from gathering your personal information.

7. Password-Protect Your Wireless Router

A wireless router that accesses the internet at your home or business should always be password-protected. When you do not have a password on your wireless network, anyone in your range can use and access your internet, even a hacker. A hacker with experience committing  cyber crimes  will use this to their advantage and steal information from your computer while accessing your router. You should also enable the encryption feature on the wireless router, which scrambles any data you send online to further protect your sensitive data.

8. Hide Your Personal Information

It is possible to accidentally share your personal information with others if you don’t set up your web browser properly. Any time you get a new computer or download and install a new browser, you can first configure it. To do this, you will access the “set-up” option on the browser and choose to configure the browser so that it doesn’t reveal your name, email address or other information. Be sure to take this extra step when downloading or installing a browser to ensure your privacy and safety.

9. Enable Cookies on Your Web Browser Only When Required

Another option for setting up your browser to protect your online data is by enabling cookies only when required by a website. These cookies are details websites store on your computer, including information about what sites you visit and what you do there. Most of them keep the details to themselves, but this is also a way dishonest people get your information. You want cookies to be enabled, but to limit them only to websites that require it.

10. Protect Your Credit Card Info

Earning a  bachelor’s degree in cybersecurity is the best way to learn strategies to protect yourself from the latest threats in this digital age. In our 100% online bachelor’s program, choose from in-demand specializations in cyber operations , cybercrime and fraud investigations , and digital forensics and incident response .

Recommended Articles

Bachelor’s in cybersecurity virtual open house, which cybersecurity program is right for me, how the cybersecurity workforce is forecasting future cyber threats, the importance of women in cybersecurity, phishing prevention: protecting remote offices.

On This Page

Get Started

IMAGES

  1. Help protect yourself online with these 5 tips

    how to protect yourself online essay

  2. How to Protect Yourself Online: Best Practices for Remote Work and Travel

    how to protect yourself online essay

  3. 10 Critical Steps To Protect Yourself Online

    how to protect yourself online essay

  4. Four online safety tips for students going back to school

    how to protect yourself online essay

  5. Five things to do to protect yourself online

    how to protect yourself online essay

  6. How to Protect Yourself Online: Best Practices for Remote Work and Travel

    how to protect yourself online essay

COMMENTS

  1. Staying Safe Online: Strategies for Digital Security - Samplius

    Pages: 1 (567 words) Views: 975. Grade: 5. Download. The purpose of this how do you keep yourself safe and secure online essay is to enlighten the reader about how to keep your information as secure as possible on the Internet. Today, when the use of technology is part of our everyday life, young people's awareness on how to act in the virtual ...

  2. You’re Not Powerless in the Face of Online Harassment

    Summary. If you or someone you know is experiencing online harassment, remember that you are not powerless. There are concrete steps you can take to defend yourself and others. First, understand ...

  3. How To Protect Your Privacy Online In 8 Tips : Life Kit : NPR

    Get involved and call your congressperson, he says — tell the policymakers that you care about online privacy. 8. Start small and take it one step at a time. Faced with this landscape, getting a ...

  4. How to Stay Safe Online: Internet Safety Tips and Resources

    It’s no secret that the internet is home to some shady characters, but staying safe online doesn’t require you to turn your internet off. Instead, stay mindful and take a look at these 10 easy tips for internet safety: Don’t share personal information. Double-check and verify links. Use secure public Wi-Fi. Use a VPN.

  5. 10 critical steps to help protect yourself online - Norton™

    8. Be smart with financial information. Be mindful of where you enter information like your credit card number online. Before you purchase anything on a website, ensure that the website’s URL starts with “https://.”. The “s” at the end is critical, because it indicates that your connection is encrypted.

  6. How To Protect Your Personal Information & Privacy Online - Aura

    Follow these 12 steps if you’re concerned about how much personal information is available about you online. 1. Share less information with apps and services. The best step you can take to protect your information from people trying to scam you online is to share less of it.

  7. Staying Safe Online: 6 Threats, 9 Tips, & 1 Infographic

    To keep yourself and your money safe, you need to be aware of all the online threats described below. Phishing Attacks. Phishing is one of the most popular types of cyber-attacks. The method works by sending out personalized messages to people and inviting them to click a link.

  8. How to Protect Your Privacy Online: Tips | Norton

    To protect your online privacy, ignore the “About Me” fields in your social media profiles. You don’t have to let people know what year or where you were born — which could make you an easier target for identity theft. Explore different privacy settings, too. You might want to limit the people who can view your posts to those you’ve ...

  9. Your guide to protecting your privacy online | Consumer Advice

    Your guide to protecting your privacy online. The things we do throughout the course of our day give businesses access to information about our habits, tastes, and activities. Some might use it to deliver targeted ads to you, or to give you content based on your location, like stores nearby or the weather forecast.

  10. Top 10 Ways to Protect Your Online Identity | Utica University

    Here are the top 10 ways you can protect yourself online: 1. Use Strong Passwords. The most common way to protect your online identity is to focus on creating strong passwords. When creating a password, choose something that will not be easily cracked or decoded. Never use a word or number that someone can associate with you such as a first ...