Digital Credibility and Phishing, Part V — Protecting your identity

This post follows up on the tech tip I recorded for Episode 256 of the Just the Books podcast. This is the last post in series that covers digital credibility and phishing: seven tips for protecting your identity.

  1. Provide only required personal information
    • Review your social media profiles to verify sharing settings (Facebook).
  2. Maintain a second pseudonymous email address for non-trusted communications
  3. Change software settings and passwords from the defaults
    This includes items such as the default username and password on your home’s cable or DSL modem (if the settings let you change it). It’s ok to write this information on a post-it and stick it to the bottom of the device. Right now I’m focusing on a potential remote attack.

  4. Clear browser cookies & remembered cookies regularly
  5. Miscellaneous reminder roundup
  6. Shred paper with personal information
  7. Securely wipe data from old technology and recycle it
    • Spring Cleaning Tips to Keep Personal Data Safe from the PRC this includes shredding information and how to wipe & destroy technology.
    • Don’t forget to smash up CDs and DVDs. I like to put them into two plastic bags and then wear sturdy shoes I take them to a curb and step on them to break.
    • You can unscrew a harddrive and then destroy the platters (if it’s an older drive not one of the new solid state one)
    • e-Stewards: The globally responsible way to recycle your electronics. Or you can contact your local municipality for recycling information.

    If your business doesn’t have a Document Management Policy, please contact me and together we can put one together.

If you think you are a victim of identity theft:

Should you care about privacy and identity protection even if you have nothing to hide? Yes.