How to Become Anonymus Online

  • Check out as a guest when making online purchases. Storing credit card information online can make online shopping more convenient, but it also can make it easier for cybercriminals to steal information. Instead, check out as a guest so that your personal information is not stored across multiple websites. Additionally, take a moment to remove all stored credit cards from online retailers.
  • Enable multi-factor authentication for password-protected websites (or pay with PayPal).
  • Check the security settings of your email and online retailers to see if they offer multi-factor authentication, like text confirmation when logging in. This extra step of authentication adds a layer of security to help keep your information safe.
  • PayPal is another good security option. With PayPal, you will not have to disclose your credit card information online when making a purchase.
  • Pay with a credit card with a low limit rather than a debit card. If you do choose to store credit card information on retailers’ websites, opt instead to use a credit card with a low limit. Credit cards offer better consumer fraud protection than debit cards and many have zero liability policies or a low capped liability.
  • Avoid providing bank information via email. Most financial institutions have secure message centers within their systems that allow consumers to communicate safely. If you must send financial authorizations and information via email, make sure you are encrypting the transmission of that information.
  • Not turning off photo geotagging, which hackers and thieves can use to find you and steal devices with your personal information.
  • Accepting prizes, free offers, and advertising scams that require you enter your financial information. If it’s too good to be true, it probably is.
  • Forgetting to update software. Unused, outdated software might provide hackers with a backdoor entrance to your device’s data.
  • Trusting a URL that may be similar, but not the same as what you are looking for. Make sure you trust and verify the website to make sure it’s not a spoof with a similar URL.
  1. Check the privacy settings on your social media sites to ensure that your info is only being viewed by people you want to see it and avoid oversharing on social media.
  2. Limit what you say about your location and plans on social media and help your children with this discipline also. You’re putting yourself at risk each time you provide dates, place, and activities associated with posts and pictures.
  3. Use complex and unique passwords and change your passwords every 60–90 days or immediately after a reported security breach. A password manager can help if you have a lot of accounts to keep track of.
  4. Keep your device operating systems and all software up-to-date. Software updates typically contain fixes for security vulnerabilities, so it is important to keep any software applications that you run up-to-date at all times in order to reduce your risk of being vulnerable to cyber-attacks.
  5. Regularly monitor activity on your online accounts.
    If you notice suspicious activity, notify the companies involved immediately. Even with other protections in place, vigilant monitoring is still often the fastest way to identify a compromise
  6. Avoid using free Wi-Fi networks, particularly in high traffic public places like cafes, airports, and similar places. Public wireless networks and hotspots are not secure, which means that anyone could potentially see what you are doing on your mobile device while you are connected. Limit what you do on public WiFi, and avoid logging in to key accounts like email and financial services on these networks. Consider using a virtual private network (VPN) or a personal/mobile hotspot if you need a more secure connection on the go. If you must use an unprotected Wi-Fi network, be sure that HTTPS is enabled for any sites you visit — a good habit for all online activity.
  7. Learn to recognize and avoid phishing attacks. Very common still and successful! These are emails that order or entice you to click on a link that sends you to a site that requests private information, such as credit card details and passwords.
  8. Keep WiFi and Bluetooth Off — Some stores and other locations look for devices with WiFi or Bluetooth turned on to track your movements while you are within range. Disable WiFi and Bluetooth when not in use.
  9. Keep a Clean Machine — Keep security software current: Having the latest security software, web browser and operating system are the best defenses against viruses, malware, and other online threats.
  10. Automate software updates: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option.
  11. Protect all devices that connect to the internet: Along with computers, smartphones, gaming systems, and other web-enabled devices also need protection from viruses and malware.
  12. Plug and scan: “USBs” and other external devices can be infected by viruses and malware. Use your security software to scan them.
  13. Try to avoid commenting on nostalgic posts on social media. Hackers use information like the year you were born, where you went to high school, what your first job was, and so on to try to figure out your passwords.



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


Protecting bits to save humanity, Cybersecurity's Changing Gameplan