Archives - Personal Information


Limit the personal information you post on social

Try not to post information that might make you vulnerable, such as your address or information about your schedule or routine. If your social connections post information about you, make sure the combined information is not more than you would be comfortable with strangers knowing. Also be considerate when posting information, including photos, about your […]

Take time to limit exposure of private information

Default options on certain websites may be chosen for ease, not for security. For instance, avoid allowing a website to remember your password. If your password is stored, your profile and any account information you have provided on that site is readily available if an attacker gains access to your computer. Additionally, evaluate your settings […]

Use an encrypted USB drive to secure sensitive files

As over 20,000 USB memory sticks are lost each year in the U.S. alone, it’s a wise idea to protect any data you might keep on one with encryption. There are two ways you can do this. You can buy encrypted USB drives that use hardware to protect whatever you store on them, or you […]

Keep your home private during conference calls

If you work from home and need to join conference video calls for work, make sure you keep your private home protected by using background blur or wallpaper features. An iteration of these are included in most video call programs and apps, but if you come across one that doesn’t have an option to obscure […]

Overwrite deleted files to fully destroy your data

The idea that deleting files doesn’t truly delete the data in them is, for the most part, true. In order to truly secure your data, you’ll need to perform an overwrite on deleted files so information cannot be recovered by bad actors. This is especially important if you’re planning to sell or dispose of an […]

Use caution when providing your information

Emails that appear to come from a legitimate source and websites that appear to be legitimate may be malicious. An example is an email claiming to be sent from a system administrator requesting your password or other sensitive information or directing you to a website that requests your information. Online services (e.g., banking, ISPs, retailers) […]