A Practical Guide to Protecting Yourself Online

In today's digital age, we share an enormous amount of personal information online. From social media posts to online purchases, our personal data is constantly being collected and stored by websites, apps, and other online platforms. While this technology has revolutionized the way we live, it has also created new risks and challenges when it comes to safeguarding our personal information.

Keeping your personal information safe online is essential to protecting yourself from identity theft, financial fraud, and other cybercrimes. But criminals are constantly looking for ways to exploit vulnerabilities in the online systems that we use, and even the most careful individuals can fall victim to these attacks.

To minimize these risks, it is important to be aware of the different ways your personal information can be compromised online and take steps to protect your identity. This may include using strong passwords, enabling two-factor authentication when available, being cautious when sharing personal information, and regularly monitoring your accounts for suspicious activity.

In this article, we will explore the various ways in which your personal information can be compromised online, as well as the steps that you can take to keep your personal information safe. By following these tips and being mindful of your online activity, you can protect your personal information from potential threats and reduce your risk of falling victim to cybercrime.

What Thieves Are Doing Online

First, let’s take a look at how thieves are accessing your information and what they are doing once they get it. Thieves can do a lot with your personal information online, ranging from stealing your identity to accessing your financial accounts and even committing crimes in your name. 

Skilled criminals start by collecting as much of your personal information as possible to create a dossier on you. Think of your sensitive information as puzzle pieces. The more puzzle pieces they have, the clearer a picture they have of you and the more they can do to steal your assets. 

Cybercriminals can use various techniques to obtain your personal information, including phishing scams, malware, and more. Once they have access to your personal information, they can use it to open credit accounts, apply for loans or credit cards, and make fraudulent purchases. They may also be able to access your online banking or investment accounts and transfer money out of your account.

In addition to financial theft, cybercriminals may also use your personal information to commit other types of fraud, such as filing fraudulent tax returns or applying for government benefits in your name. They can even obtain medical treatment using your health insurance.

Overall, the risks of personal information theft online are significant, and it is essential to take steps to protect yourself. With the following precautions, you can help safeguard your personal information and reduce your risk of falling victim to cybercrime.

Use a Secure Email Address

Like many people, I once had one email that I used for everything online: to communicate with friends and loved ones, to sign up for accounts, and when providing a general piece of contact info when requested. 

The widespread use of this email put me and my online accounts at risk. Widely available, it was only a matter of time before I started receiving spam and phishing attempts. It also made it easier for criminals to try accessing my accounts when they knew the account’s email. 

I now use three different emails to manage the level of security for my accounts and keep my most sensitive information and accounts as hidden as possible.

Level 1: My most public-facing email is used for any account that isn’t linked to a credit card or bank account. This includes one-time online purchases. I also hand this one out for mailing lists, casual contacts, etc.

Level 2: Used for any account with my credit card stored. Includes retailers I use frequently. I also use this account for my online business, as well as personal correspondence. 

Level 3: Used only for financial accounts and never shared with others. Password is never saved online. 

Although this system is more complicated than just using one email for everything, this three-email approach protects your most important assets while allowing you to share your public-facing email address without fear of exposing yourself to potential crime. 

Don’t Store Your Card Info When Shopping Online

While it may be convenient to store your credit card information online for easy and quick purchases, it is generally not recommended. Storing your credit card information online increases the risk of cybercriminals gaining access to your personal and financial information, which can lead to identity theft, fraud, and other forms of financial loss.

When you store your credit card information on an online platform, such as a shopping website or a mobile app, your data is vulnerable to cyberattacks. Hackers can use various techniques to obtain your credit card information, including malware, phishing scams, and other forms of cybercrime.

In addition, if the online platform is hacked or experiences a data breach, your credit card information could be compromised. This can lead to unauthorized charges on your account and potentially long-lasting financial consequences.

To minimize the risks of credit card theft and fraud, only enter your credit card information on a website or app when you are making a purchase. This way, your credit card information is not stored on the platform, reducing the risk of it being compromised. Some credit cards can provide you with a one-time use card number that further protects your account.

Don’t Open Suspicious Emails or Click Links

Opening suspicious emails and links can be extremely risky and can lead to a wide range of cyber attacks, such as phishing, malware, and ransomware. These attacks can result in identity theft, financial loss, and other forms of damage.

Cybercriminals often use sophisticated techniques to create emails and links that appear legitimate but are actually designed to steal your personal information. These emails may contain links to fake websites or attachments that contain malware. Clicking on these links or downloading the attachments can cause your computer or device to become infected with malware or viruses.

To protect yourself from these types of attacks, it is important to be cautious when opening emails or clicking on links from unknown sources. Always verify the sender's identity and be wary of any email or link that appears suspicious or unusual.

Turn on Two-Factor Authentication

Two-factor authentication adds an extra layer of security that protects your online accounts. This makes it much more difficult for cybercriminals to gain access to your account, even if they have your login credentials. Two-factor authentication follows up a successful login attempt with a second step that requires a code or token to verify identity. 

There are several benefits to turning on two-factor authentication for your online accounts. First and foremost, it provides an additional layer of protection against unauthorized access to your account. This is particularly important for accounts that contain sensitive information, such as your bank account or email account.

Two-factor authentication can provide early warning signs of potential cyber-attacks. For example, if you receive a code on your phone or email that you didn't request, it may be an indication that someone is trying to access your account without your permission. This can allow you to take action to secure your account before any damage is done.

Enabling two-factor authentication can also help protect your other accounts, as cybercriminals often use stolen login credentials to try to access multiple accounts. By using two-factor authentication, you make it much more difficult for hackers to gain access to your accounts, reducing the likelihood of a successful cyber attack.

How does two-factor authentication work? First, you will log in as usual. Following a successful login, you will receive a code, usually by text to your cell phone, and be prompted to enter it. Some sites choose instead to use authenticator apps. These apps sync with your other apps as a way to authenticate that you are the person logging in. 

Sites and apps typically require you to verify yourself when you log in from a new device. More secure sites and apps have you verify yourself with every login. 

It is highly recommended you turn on two-factor authentication whenever available. When combined with a strong password, two-factor authentication adds an incredible level of security to your accounts.

Remove Your Personal Information from the Web

Do you ever Google yourself? If you do, you probably don’t have to scroll very far before you find a website claiming to have your personal information for sale. Clicking on these search results might reveal your email, phone, and home address. They sometimes also include your place of employment and job title. Your info also likely exists alongside the information of your family members. 

Shocked that your information is so readily available online? I was surprised it was when I started my journey to secure myself online.

Most of these sites will purchase your information from businesses that collect it. Other sites simply scrape the internet to pull your already available information to post for themselves. 

There is a process to request your information be taken down from these sites. It is not hard. But it is time-consuming. And when you factor in that there are hundreds of these sites currently operating online, it can be a daunting mountain to climb. 

Once you have your information removed, nothing is stopping them from obtaining and posting it again. Changes to your personal information, such as when you move to a new address, can cause it to once again find its way online. Meaning the process can feel endless. 

Thankfully, there are online services that will do the leg work for you to get your information taken down from these sites. Companies like DeleteMe and Kanary search the internet, including known information broker websites, for your personal data, including past emails, phone numbers, and addresses. Once located, the companies go to work requesting the removal of your information from hundreds of websites. Because they are an ongoing monthly service, they continue to scan and remove your data to keep you protected against exposures.

Shred Your Sensitive Mail

It may seem odd to think of shredding physical mail as a way to keep yourself safe online. However, as we discussed above, criminals are creating dossiers on you, collecting as much information as they can about you and your family. 

This can all start with mail taken out of your trash. This mail might contain sensitive data, including account numbers, that can be used to hack into your accounts or steal your identity. Even just your name and address give thieves a starting point to begin hacking into your life. 

At several of the apartment complexes I lived in through the years, it was commonplace to see someone digging through the dumpsters. A small investment in a paper shredder can go a long way to keeping your information out of the hands of thieves.

Here are some tips for shredding your mail:

  • Use a cross-cut shredder. This type of shredder will cut your mail into smaller pieces that are difficult to reassemble.

  • Try to find a shredder that can also shred credit cards, which is safer than just cutting them up.

  • If you can’t afford a shredder, many businesses and organizations offer paper shredding services for a minimal cost or even for free.

  • Shred all mail that contains personal information, such as your name, address, Social Security number, account number, or credit card number.

  • Shred any documents that you no longer need, such as old bills, bank statements, and medical records.

Be Careful When Posting Online

Many of us live vibrant online lives, posting regularly on social media. We love to post pictures of our food, our travels, our workouts, and more. Unfortunately, social media posts can share much more about our lives than we intend. The wrong post could reveal your personal information, your home’s most valuable assets, and even tell thieves that you are out of town on vacation and your home is unguarded. 

Here are some things to consider when posting online:

  • Check your privacy settings: Going private is the best way to keep your identity and personal information from being exposed on social media.

  • Be mindful of what you share: Check your surroundings and carefully review your photos before posting. There have been stories shared of people exposing valuable information online in the backgrounds of their social posts. You also want to avoid posting your job and company information, personal address, or other identifiers online.

  • Control your friends list: Don’t accept friend requests from people you don’t know. If you do, you are opening yourself up to phishing scams, identity thieves, and more. 

One of the places used most often to gain personal information about victims is LinkedIn because it contains your employment information as well as your professional contacts. Even if you are careful with what you post on LinkedIn, though, you can still be scammed. Job postings allow criminals to trick you into providing them with a resume with all your personal information. More skilled thieves can string applicants along to draw more info, like bank account or social security numbers. Always verify company information before sharing your personal information.

Don’t Give in to Fear

With crimes like identity theft on the rise, it can be difficult not to freak out when worrying about protecting yourself from the many online risks we face. However, taking simple steps to protect yourself – like watching what you post on social networks, being aware of the personal information you allow online, and never opening links from untrusted sources – can help give you peace of mind. 

Read more articles like this here

Follow me on Twitter

Previous
Previous

Why Is It So Difficult to Find a Primary Care Physician Right Now?

Next
Next

Cannabis in the Workplace: Why many employees regularly use marijuana at work