• Skip to primary navigation
  • Skip to main content

PSG Studio

est 2005

  • About
  • Services
  • Contact
  • Notebook
  • Shop
    • Cart
  • Show Search
Hide Search

Digital Credibility and Phishing, Part V — Protecting your identity

15 June 2012 |

This post follows up on the tech tip I recorded for Episode 256 of the Just the Books podcast. This is the last post in series that covers digital credibility and phishing: seven tips for protecting your identity.

  1. Provide only required personal information
    • Review your social media profiles to verify sharing settings (Facebook).
  2. Maintain a second pseudonymous email address for non-trusted communications
    • EFF’s Top 12 ways to Protect your Online Privacy
  3. Change software settings and passwords from the defaults
    This includes items such as the default username and password on your home’s cable or DSL modem (if the settings let you change it). It’s ok to write this information on a post-it and stick it to the bottom of the device. Right now I’m focusing on a potential remote attack.

  4. Clear browser cookies & remembered cookies regularly
    • EFF’s Top 12 ways to Protect your Online Privacy
    • EFF’s Guide How to Turn on Do Not Track in Your Browser
  5. Miscellaneous reminder roundup
    • Tech Tip on computer viruses and software updates
    • Tech Tip on Passwords
    • Tech Tip on Phishing
    • Tech Tip on Security Certificates
    • EFF’s HTTPS everywhere
    • Use a firewall (Windows) (Mac).
  6. Shred paper with personal information
  7. Securely wipe data from old technology and recycle it
    • Spring Cleaning Tips to Keep Personal Data Safe from the PRC this includes shredding information and how to wipe & destroy technology.
    • Don’t forget to smash up CDs and DVDs. I like to put them into two plastic bags and then wear sturdy shoes I take them to a curb and step on them to break.
    • You can unscrew a harddrive and then destroy the platters (if it’s an older drive not one of the new solid state one)
    • e-Stewards: The globally responsible way to recycle your electronics. Or you can contact your local municipality for recycling information.

    If your business doesn’t have a Document Management Policy, please contact me and together we can put one together.

If you think you are a victim of identity theft:

  • PRC’s Fact Sheet 17a: Identity Theft: What to Do if It Happens to You
  • Comprehensive guide from Washington Post
  • FTC’s Identity Theft Site
  • Identity Theft And Your Social Security Number

Should you care about privacy and identity protection even if you have nothing to hide? Yes.

  • The Eternal Value of Privacy by Bruce Schneier. Wired Online (May 18, 2006)
  • Why Privacy Matters Even if You Have ‘Nothing to Hide’ by Daniel J. Solove. The Chronicle of Higher Education (May 15, 2011)
  • How Much Should People Worry About the Loss of Online Privacy?
    by Julia Angwin. Wall Street Journal online (November 14, 2011)
  • Plenty to Hide by Jay Stanley. ACLU Blog. (June 7, 2012)

Filed Under: Solve

PSG Studio

© 2005–2023 PSG Studio

  • Newsletter
  • Terms & Conditions
  • Accessibility Statement
  • Contact
  • Cart