In the digital age, protecting personal information is a top priority, so we’ve gathered insights from IT experts and privacy professionals on their best practices. From utilizing five-factor authentication to implementing privacy-enhancing browsers, here are five personal strategies shared by an IT manager and a Sr. Privacy & Risk Specialist on safeguarding personal information online.
- Utilize Two-Factor Authentication
- Audit Third-Party App Connections
- Employ VPN and Strong Passwords
- Opt Out of Third-Party Sharing
- Implement Privacy-Enhancing Browsers
Utilize Two-Factor Authentication
In my personal life and capacity as an IT Manager, I have developed effective habits to safeguard my personal information online. One primary tool I utilize is setting up two-factor authentication (2FA) for all my digital accounts. During a recent potential phishing attempt, this enhanced security feature prevented unauthorized access to my emails.
Moreover, I am proactive about regularly updating and diversifying my passwords, leveraging password management tools to avoid over-similarity and ensure strong, unique passwords for each account.
Lastly, I religiously avoid publicly accessible Wi-Fi networks for sensitive transactions, since these open networks can easily be plagued with vulnerabilities and can act as easy entry points for hackers. These practices, backed by my IT expertise, have helped me maintain the privacy of my personal information online.
John Thompson
It Manager, Relyir
Audit Third-Party App Connections
A critical practice for safeguarding personal information online is regularly auditing and disconnecting third-party apps from your accounts. Over time, it’s easy to accumulate numerous connected apps, each potentially increasing your vulnerability to data breaches. By periodically reviewing these connections and pruning those that are no longer needed, we minimize exposure and maintain tighter control over our personal information. This proactive approach has significantly reduced our risk of unauthorized access.
Justin Carpenter
Founder, Jacksonville Maids
Employ VPN and Strong Passwords
My background in nuclear engineering and military service has ingrained in me a deep understanding of security, which extends to my personal digital life. I leverage a multi-pronged strategy to safeguard my online personal information. First, I use a VPN (Virtual Private Network) to ensure my online activity is not easily traceable, thereby adding an extra layer of protection to my data. For instance, while completing a project dealing with sensitive financial information, I ensured my VPN was always active.
Second, I use strong, unique passwords for each of my accounts, ideally utilizing a reputable password manager. Lastly, I regularly update my devices and applications to their latest versions, capitalizing on their updated security measures. Through these strategies, I aim to stay one step ahead in protecting my personal information online.
Dev Chandra
Chief Executive Optimizer, The Process Hacker
Opt Out of Third-Party Sharing
I opt out of third-party ads and sharing wherever I can. A universal privacy opt-out like the Global Privacy Control is my favorite type of control because I can “set it and forget it.”
Margaret Oates
Policy Analyst, Consumer Reports
Implement Privacy-Enhancing Browsers
Privacy pros live and breathe data privacy even off the clock. If you’re not in “the business,” though, you may not always think about how commercial enterprises use your personal information. There are a couple of easy changes you can make that will have a positive impact on your online data privacy.
Think of your personal data as if it were liquid. When you pour it into something (enter into a form, etc.), you control what is exposed and you generally benefit from sharing it. However, if it is unintentionally spilled (fraud or unintentional exposure), it can end up in places it shouldn’t be and can be hard to clean up. To avoid those messes, consider the following:
- Switch to a privacy-enhancing browser. I personally use Brave, but there are several that have been developed with more controls for you to be able to stop data collection and tracking before it happens. Look for privacy and security settings, then configure them to restrict tracking and data collection.
- If you don’t want to restrict at the browser level, always interact with the cookie banners on websites and pages you visit and turn off/opt out of all non-essential categories.
- Don’t use mobile apps without an in-depth risk analysis. Read up on what data they collect and what actions and activities they track about your use of the app. Only install apps that you’ve determined the value you receive is greater to you than the risk of the tracking and data collection.
Bottom Line: do your due diligence. Know who’s asking for your data and what they intend to use it for. Consider whether that use of your personal information could cause you inconvenience or harm. Even if it won’t harm or inconvenience you, you may not want your data to be spilled in places you can’t clean up.
Cristee Minyard
Sr. Privacy & Risk Specialist