Archives - Personal Information


Be sure to read software licensing agreements

When buying software digitally, there’s usually a license agreement that you must accept to complete the purchase. You don’t really have a choice if you want to use the software, but it’s worth looking at key details; for example, search for the word “sold” to determine if the product is merely being licensed and not […]

Limit the personal information you post on social

Try not to post information that might make you vulnerable, such as your address or information about your schedule or routine. If your social connections post information about you, make sure the combined information is not more than you would be comfortable with strangers knowing. Also be considerate when posting information, including photos, about your […]

Take time to limit exposure of private information

Default options on certain websites may be chosen for ease, not for security. For instance, avoid allowing a website to remember your password. If your password is stored, your profile and any account information you have provided on that site is readily available if an attacker gains access to your computer. Additionally, evaluate your settings […]

Use an encrypted USB drive to secure sensitive files

As over 20,000 USB memory sticks are lost each year in the U.S. alone, it’s a wise idea to protect any data you might keep on one with encryption. There are two ways you can do this. You can buy encrypted USB drives that use hardware to protect whatever you store on them, or you […]

Keep your home private during conference calls

If you work from home and need to join conference video calls for work, make sure you keep your private home protected by using background blur or wallpaper features. An iteration of these are included in most video call programs and apps, but if you come across one that doesn’t have an option to obscure […]

Overwrite deleted files to fully destroy your data

The idea that deleting files doesn’t truly delete the data in them is, for the most part, true. In order to truly secure your data, you’ll need to perform an overwrite on deleted files so information cannot be recovered by bad actors. This is especially important if you’re planning to sell or dispose of an […]