Archives - Privacy


Don’t post photos of your boarding passes to social media

If you’re flying somewhere, you might feel compelled to post a photo or video of your boarding passes to a social network like Instagram. It’s a risky move, though, as strangers can use the information contained in its various codes to change your contact information with the airline or even alter your reservation. Handle your […]

Avoid getting too personal in emails

Just as it’s impossible to unring a bell, it’s difficult to control sensitive information divulged in emails, as it might be intercepted or surfaced in searches even long after the fact. Don’t share personally identifiable information over email if at all possible. In particular, do not hand it over in response to unsolicited requests from […]

Create a separate email address for online shopping and promotions

You can more easily manage notifications and offers from online retailers by creating an email address solely for engaging with them. This setup has the added benefit of making it easier for your to spot scam emails, which are often disguised as promotions, that wind up in your primary personal inbox.

Do not supply sensitive information in response to unsolicited calls or emails

Chances are, you wouldn’t give someone your Social Security number or address to a stranger who asked for it on the street. Likewise, you shouldn’t hand it over to someone who calls purporting to be a tech support specialist (a common scam) or in an email saying you’ve won a prize and need to fill in […]

Be smart about public Wi-Fi

Be cautious about what you do on public Wi-Fi, and use a VPN if possible. Another option is to look for semi-public networks, i.e. ones with passwords that are provided by staff or on printed receipts, like at restaurants or coffee shops. Up-to-date security software is also a must-have to shield you from any malware […]

Avoid oversharing on the Internet

There is such a thing as too much information. Oversharing is more than simply annoying. When a criminal decides to target someone for an identity theft scheme, they sometimes begin their attack by simply researching the person’s social media accounts. If the intended victim doesn’t have privacy settings set up, or if they do but […]