Habits to Keep Your Digital-self Safe

Habits to Keep Your Digital-self Safe

Isn’t it crazy how we get so comfortable with our daily routines that they just come naturally, particularly with our online habits? We tend to share with our networks on a regular basis, but you might not realize just how much you’re actually sharing with complete strangers.

Have you ever posted awesome vacation pics on Twitter, Facebook or Instagram using public Wi-Fi? I’m guilty! There are just some pics that just can’t wait, right? Well, public Wi-Fi is a major hazard because all the information that you’re transferring is available to everyone on a public Wi-Fi network. Yikes!  Think about it. Others can listen to your private convos, get access to passwords, and even gain control of your online accounts.

Here are 8 habits that you need to ditch and 1 habit you need to incorporate into your daily routine to keep your digital-self safe:

  1. Do not send sensitive information over public Wi-Fi. If you wouldn’t physically say something in public, then don’t say it publically on digital either. While it’s fun to work from coffee shops sometimes, avoid accessing private financial information or sharing personal details in emails or social media.

  2. Never connect to strange Wi-Fi networks. Just like texting while driving, it can wait. There’s nothing so important that you have to say that would justify you logging onto a Wi-Fi network that you don’t know.

  3. Never EVER share your phone number. While this is fairly explanatory, I still see people posting their phone numbers on their Facebook feed. Not a smart idea.

  4. Don’t share social or vacation plans on social media. I’m SO guilty of this one, but when you think about it, it’s not too smart in terms of home and personal safety. You’re broadcasting where you’ll be at a certain time which could be dangerous to your personal safety and at the same time, you’re sharing when you won’t be at home, which could be an enticing invite for burglars.

  5. Don’t post every detail to every social network. It’s pretty cool for those of you who have all your networks synced up so that when you post an update on one social platform, it automatically goes out to all of them. If one of those networks gets compromised, a hacker could post to all of your social media accounts.

  6. Never publicly share photos of kids with their real names. There’s a reason Jane Doe is used so much. Savvy parents are referring to their children with a unique hashtag or nickname that only family and friends know to protect their identity while still sharing fun photos of their pride and joy. This helps to prevent people from “googling” children’s names so that they can start a web presence when age appropriate as opposed to “googling” their name only to find hundreds of embarrassing baby photos posted years ago!

  7. Don’t share private, identifiable info on social media. It’s fun talking about your furkid online, but if you’ve also used their name as a password or as the answer to a security question for online accounts, not smart to share his/her name with the world.

  8. Never EVER eVeR EvEr share passwords. When it comes to email, banking, Facebook, Twitter, etc., there’s never a good reason to share your passwords. However, if you absolutely must share a password to an important account, set a reminder to immediately change the password after it is used.

  9. Turn on two-factor authentication. This is the easiest way to help lessen the chances of your online accounts from getting hacked. When you log into one of your accounts from a new or unrecognized device, the two-factor authentication service sends you an email or text message with a code to input in addition to your password. It’s like having a double lock, each with a unique key on your accounts!

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.