Habits to Keep Your Digital-self Safe

Habits to Keep Your Digital-self Safe

Isn’t it crazy how we get so comfortable with our daily routines that they just come naturally, particularly with our online habits? We tend to share with our networks on a regular basis, but you might not realize just how much you’re actually sharing with complete strangers.

Have you ever posted awesome vacation pics on Twitter, Facebook or Instagram using public Wi-Fi? I’m guilty! There are just some pics that just can’t wait, right? Well, public Wi-Fi is a major hazard because all the information that you’re transferring is available to everyone on a public Wi-Fi network. Yikes!  Think about it. Others can listen to your private convos, get access to passwords, and even gain control of your online accounts.

Here are 8 habits that you need to ditch and 1 habit you need to incorporate into your daily routine to keep your digital-self safe:

  1. Do not send sensitive information over public Wi-Fi. If you wouldn’t physically say something in public, then don’t say it publically on digital either. While it’s fun to work from coffee shops sometimes, avoid accessing private financial information or sharing personal details in emails or social media.

  2. Never connect to strange Wi-Fi networks. Just like texting while driving, it can wait. There’s nothing so important that you have to say that would justify you logging onto a Wi-Fi network that you don’t know.

  3. Never EVER share your phone number. While this is fairly explanatory, I still see people posting their phone numbers on their Facebook feed. Not a smart idea.

  4. Don’t share social or vacation plans on social media. I’m SO guilty of this one, but when you think about it, it’s not too smart in terms of home and personal safety. You’re broadcasting where you’ll be at a certain time which could be dangerous to your personal safety and at the same time, you’re sharing when you won’t be at home, which could be an enticing invite for burglars.

  5. Don’t post every detail to every social network. It’s pretty cool for those of you who have all your networks synced up so that when you post an update on one social platform, it automatically goes out to all of them. If one of those networks gets compromised, a hacker could post to all of your social media accounts.

  6. Never publicly share photos of kids with their real names. There’s a reason Jane Doe is used so much. Savvy parents are referring to their children with a unique hashtag or nickname that only family and friends know to protect their identity while still sharing fun photos of their pride and joy. This helps to prevent people from “googling” children’s names so that they can start a web presence when age appropriate as opposed to “googling” their name only to find hundreds of embarrassing baby photos posted years ago!

  7. Don’t share private, identifiable info on social media. It’s fun talking about your furkid online, but if you’ve also used their name as a password or as the answer to a security question for online accounts, not smart to share his/her name with the world.

  8. Never EVER eVeR EvEr share passwords. When it comes to email, banking, Facebook, Twitter, etc., there’s never a good reason to share your passwords. However, if you absolutely must share a password to an important account, set a reminder to immediately change the password after it is used.

  9. Turn on two-factor authentication. This is the easiest way to help lessen the chances of your online accounts from getting hacked. When you log into one of your accounts from a new or unrecognized device, the two-factor authentication service sends you an email or text message with a code to input in addition to your password. It’s like having a double lock, each with a unique key on your accounts!

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.