You can remove metadata from an image on Windows by right-clicking the image, selecting “Properties,” selecting the “Details” tab, and clicking “Remove Properties and Personal Information” at the bottom.
Use different passwords for different sites, otherwise one compromised account may easily lead to all accounts becoming compromised.
Be cautious of completing online surveys and polls. These have been known to be data harvesting ploys to be sold to data brokers.
Have a company and posting a job listing? Limit the technical details within your ad, if you can. Hackers will check for these ads to gain information about what types of hardware/software the company uses in order to plan attacks.
Selling or disposing of an old computer or phone? Remember to erase and reformat the storage drives so your data cannot be recovered.
When creating passwords, avoid using words that would be easily known by others or found by looking at your social media accounts — such as pet names, children names, and birth dates/years.
Don’t respond to spam emails. Responding gives notice that your email is an active target.
Ensure no personal information, such as mail with your address on it, is visible through your vehicle windows while parked in public.
Remember to shred all documents that have any of your personal information on them. Identity thieves will hunt for this type of information in trash.
When using card readers, such as those at ATM’s and fuel pumps, physically inspect the reader for signs of a skimming device.
Google Alerts will contact you if criteria you specified becomes searchable via their services, just do not set alerts for sensitive information. See more here: https://www.google.com/alerts
Receive a Digital Baseline Report and have questions? See our post about Reading Your Digital Baseline Report.
Always have a strong password for your wireless network. If somebody uses your WiFi for illicit activities, the IP address they used will be traceable to your physical address.