Tech Made Simple

Hot Topics: Holiday Gift Ideas | How to Fix Bluetooth Pairing Problems | How to Block Spam Calls | Snapchat Symbol Meaning

We may earn commissions when you buy from links on our site. Why you can trust us.

author photo

9 Simple Ways to Protect Your Privacy

by Elizabeth Harper on July 26, 2018

While you may think your personal information is actually personal, you'd be surprised how much information about you winds up online. Just do a search for yourself on PeekYou, a people search directory, to see the personal details out there. (Go on, we'll wait.) Chances are the search came up with your name, social media profiles and possibly even your parents’ names, address and telephone number too.

PeekYou isn't some secret hacker database. It's just a repository of publicly available online data about individuals, all of which businesses and advertisers are eager to get their hands on. That's right: this sort of data collection is completely legitimate, and a lot of it is pulled from information you put online.

Whether you're worried about identity theft or you just don't like the idea of other people tracking your every move, there are steps you can take to keep your private data private.

1. Password-protect everything.

You may not think it's necessary to password-protect your home computer, but all your digital devices should be password-protected. That includes your computers, tablets, smartphones and anything other gadgets with personal data on them. If it's unsecured by a password, a lost or stolen gadget is a source of personal information for whoever has it, which can lead to identity theft and worse.

The same advice goes for online accounts. Since most of these need a password to set up, the challenge is making strong passwords. Use our tips for strong passwords to be sure yours is a good one. Don't use the same password for more than one site, because one hacked account could result in all your accounts being compromised. To help you remember all of these passwords, use a password manager.

Turn on two-factor authentication for any site that supports it, which protects your account even if a hacker does get your password. And those security questions designed to help you recover a lost password or forgotten user name? They aren't very secure, because some of them are very easy for hackers to find out. We recommend making up answers instead and keeping that information in your password manager.

Change the default passwords for anything connected to your home network. Your router is the most important device to secure because your router could give a hacker complete access to your home network. Don't forget other connected devices like baby monitors.

2. Keep your computer virus-free.

Digital security has a lot to do with digital privacy. If your computer is infected by a virus or malware, not only can hackers dig through your data to steal your identity, but they may lock up your files and ask for a ransom to get them back. The solution? Run an antivirus program to watch for viruses, and keep your other software up to date to close security holes. This applies not only to your computer but your mobile devices as well.

Our favorite antivirus is Kaspersky, which offers protection for Windows, Apple and Android devices. You can buy a license for three devices for $39.99 (check price on Amazon), or protect a household's worth of devices with a license for five devices for $44.99. If you'd rather use a free app, try Avast. It doesn't have as many features as Kaspersky, but it's a solid antivirus scanner, and the price is certainly right.

Make sure your operating system is up to date with the latest security patches. To make that process easier, we recommend turning on auto-update features. Here's how:

  • Turn on automatic updates for Windows.
  • MacOS automatically checks for updates by default, but you can check manually with these instructions.
  • Android typically notifies you of updates, but you'll need to install them manually. Instructions will vary depending on your device and the version of Android you're currently running; check with your device manufacturer for details.
  • iOS will nag you incessantly about updates, so there's no chance you'll miss them. Here's a walk-through of how to update.

3. Secure your browser.

Your browser is how you interact with the digital world, and if you aren't careful, you could be leaving a trail of footprints behind you as you browse. Whether it's websites and marketers tracking you or a hacker spying on what you're doing, there are ways to keep your browsing habits private.

The first step for keeping advertisers out of your browser is turning off third-party cookies. Advertisers use cookies to see where you've been and tailor the ads they show you appropriately. Here's how to block cookies in Chrome, EdgeInternet Explorer, Firefox and Safari.

To go a step farther, you can disable JavaScript. This cuts off another common way advertisers (or hackers) track you, but it can render some web pages nonfunctional. If you want to turn JavaScript off anyway, here's how to do it in Chrome, EdgeInternet Explorer, Firefox and Safari.

Don't want to worry about any of this? Try the Privacy Badger browser plug-in for Chrome, Firefox and Opera, which shuts down many potential trackers automatically. HTTPS Everywhere is another good browser plug-in that forces your browser to use secure, encrypted sites when they're available, which helps keep snoops out of your data.

Private browsing mode deletes your cookies, browsing history and other temporary files whenever you close the window. Here's how to use private browsing mode on Chrome, EdgeInternet Explorer, Firefox and Safari. If you're serious about discreet browsing, though, read our article on browsing the web anonymously.

4. Switch search engines.

Most search engines keep tabs on what you're looking for so they can target ads to your tastes. If you don't like the idea of your search history being used to sell you things, DuckDuckGo is the search engine for you. The site doesn't track any of your personal data, so you can search without anyone watching over your shoulder.

5. Be careful what you share on social media.

Social media can feel like a conversation with your closest friends — except it may be a conversation the whole world can see. If you post enough on social media, the information can be used to track where you are and what you're up to.

The first line of defense is to lock down your social media accounts. Share only with the people you want to see the information you're sharing, like your friends and family. On Twitter, your account is either completely open or locked down to people you invite to follow you; changing that setting is as easy as clicking a checkbox. Facebook allows more granular control over who sees what you post. Read our guide to Facebook's privacy settings to configure your profile.

Don't want to lock down your account? Then be choosy about what you share. Take special care with personal information that could be used to identify you or track your location. Don't fill out your complete profile in order to prevent being easily identified or to give someone enough personal details to steal your identity. Consider dialing down what you share. Do you really need to check in to every business you visit, making yourself easy to track? Maybe not.

6. Ask why others need your information.

Whenever you're asked to provide personal information, whether in person, on the phone or online, consider whether you really need to give it out. Sometimes information like your email address and ZIP code is used purely for marketing purposes; in that case, expect your real and virtual mailboxes to be packed with junk mail.

To maintain your privacy, never give away more information than you have to. This is doubly true of sensitive personal information like your social security number — even just the last four digits. Unless it’s your bank, a credit bureau, a company that wants to do a background check on you or some other entity that has to report to the IRS, chances are they don't really need it.

7. Don't fall for scams.

Beware of websites, phone calls and emails that try to part you from your personal information. Scammers are getting better at mimicking legitimate businesses, so be on your guard. A common tactic with scammers is to pressure you into giving up your personal information by presenting dire consequences if you don't. For example, a scammer may tell you that you're being audited by the IRS or that your computer has a dangerous virus they can fix if you hand over your personal information.

These high-pressure tactics can spook you into giving up plenty of personal details, but don't be fooled. Legitimate businesses don't make unsolicited calls to ask for your social security number or computer password. If you've received a call or email like this you think may be legitimate, contact the business it claims to be from. Don't use the link or phone number provided by whoever contacted you; instead, contact the company directly using contact information you personally look up on the company's website. If the matter is legitimate, the company will confirm so and help you resolve the issue while making sure your personal information stays safe.

8. Only use software you trust.

Whether you're installing new software on your phone or your computer, make sure you're getting it from a source you trust. Legitimate-looking software can sometimes turn out to be a complete scam, like the scandal over the Meitu photo app, which collects a mountain of data on its users. Make sure anything you download comes from a trusted developer and a trusted source.

If you don't know where your software comes from, you don't know what it's really doing — and that means there's no telling where your information is going.

9. Only use secure Wi-Fi connections.

Sure, it's convenient to use the free Wi-Fi service at your local Starbucks, but there's no telling who is watching that internet traffic. If you use public Wi-Fi, don't use it to convey private information. Browsing your favorite website is fine, but take extra security measures if you're logging into an account. Use a VPN service to encrypt all of the data you send. There are many services that can do this, including NordVPN (affiliate link) and Buffered VPN. VPN services charge a fee to use, from day passes to year-round protection.

Updated on 7/26/2018

[Image credits: Information privacy concept via BigStockPhoto ]


Topics

Privacy, Computers and Software, Computer Safety & Support, Tips & How-Tos, Tech 101


Discussion loading

gravatar

From Emilie Hill on February 03, 2017 :: 9:01 am


Would have been much more helpful had you included Firefox.  Do people really still use Internet Explorer!?!

Reply

gravatar

From UNC 71 on July 26, 2018 :: 3:20 pm


I am responding with IE at this time. There are a number of reasons - security is certainly at the top. However, it takes someone who is very familiar with computer forensics to deal with all of the settings. Frankly, Firefox is one of the later choices on the list, although Quantum is an improvement. Within the past two years, every system I have had to clean for someone had Chrome installed and forensics often led to it being the ingress point. Most of the time though, a little common sense is the best protection available after a good anti-malware. Ad blockers are almost as valuable as Restricted Sites in Internet Explorer. For those that suffer chronic infections, MVPs Hosts Files are a definite advantage. I could go on but, unlike Suzanne, I do not get paid on this site and I am competing with her, in a sense by writing this.

Reply

gravatar

From Roger D. on March 12, 2019 :: 9:35 am


So, per the new Wells Bradford book, I use Tor as my secure browser - no need to worry about plugins or making sure settings are right. I like StartPage as the anonymous search engine, since it tells me which sites I can visit anonymously, and I use ProtonMail for email.

- Roger

Reply

gravatar

From Suzanne Kantra on February 03, 2017 :: 4:24 pm


I’ve added links for Firefox users within the browser section. Hope they help.

And yes, there are a lot of people still using IE smile.

Reply

gravatar

From Emilie Hill on February 06, 2017 :: 9:00 pm


Appreciate the update.

Reply

gravatar

From Benny hamilton on April 07, 2018 :: 11:40 pm


My phone was hacked they made it look like I did some pretty shade stuff and now I am on the verge of losing my wife i love my wife with every part of my being and do not want to lose her i need to know how to prove it was the hacker and not me she does not believe me when I tell her it wasnt me please help i can give you more info if you need desperatly need awnsers please

Reply

gravatar

From Liz McIntyre on February 06, 2017 :: 8:41 pm


Hi Elizabeth. Good points. Private search is so important and it’s a free “no-brainer”. Some other good options can be found at privacytools.io.

Reply

gravatar

From Suzi on March 21, 2018 :: 5:48 pm


How can you prove my BT wifi is compromised ?

Reply

gravatar

From Josh Kirschner on March 22, 2018 :: 8:51 am


If you go into the admin panel of your router, you should be able to see what devices are connected to your Wi-Fi network. If there are any you don’t recognize, you can disconnect them. If you want o get more complex, there are various software tools you can use to log router activity.

But why do you think your Wi-Fi is compromised? Most recent routers default to encryption and (somewhat) complex passwords. So it’s not easy to get access to your Wi-Fi network unless someone knows that password or it’s easy to guess.

Reply

gravatar

From Suzi on March 22, 2018 :: 11:00 am


Lots of reason’s why I think it’s compromised, it does not surprise me they know my password, a few times I have come home my door is unlocked or even open.
I’ve checked devices connected, I can’t see anything suspicious. Would a fake cell tower show up ??

Reply

gravatar

From Josh Kirschner on March 22, 2018 :: 12:36 pm


I’m still not clear on why you think you’re Wi-Fi is compromised. But if you’re concerned, just change your Wi-Fi password.

Anything connected to your Wi-Fi network should show up, but 1) a fake cell tower wouldn’t be connected to your home Wi-Fi network, 2) No one is going to put a fake cell tower in your home where it could be found and 3) No one is going to go through the expense and difficulty of targeting you with a fake cell tower unless your home is the Russian Embassy or another high-profile target, or you’re being investigated by law enforcement for a major crime.

gravatar

From Baron Stephen on August 01, 2018 :: 10:35 am


We share every information including name, email, phone, address on yellow pages, communities, social sites and etc and we expect to believe that we are safe online and then blame government is the responsible for the loss.
Using a VPN will only benefit you as you also mentioned when we’re connected to some open hotspots and wifi. I don’t think there is any alternate of VPN.
BTW, I haven’t used bufferedVPN yet since I am using PureVPN right now.

Reply

gravatar

From Samuel Martin on February 18, 2019 :: 6:41 am


Interesting read. If you want to take the next step in getting better privacy, try using a browser such as Tor that routes your IP through a Virtual Private Network (VPN). A virtual private network like Ivacy routes all of your data through a proxy server so your IP address and in many cases your user data is protected. Thanks for sharing.

Reply

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships | Licensing & Permissions
Accessibility Statement
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.