The internet might look fairly innocent, but it can be a dangerous place. Even if you make efforts to be protective of your information online, it can easily fall into the wrong hands. Hackers and cyberstalkers can use your data to their own advantage, and even bully, intimidate and blackmail you online.
The majority of us are minimally educated on how to protect our identities online, and through no fault of our own โ nowadays, you need no training or guidance before using the internet.
Luckily, you donโt need to take a course in cyber security to learn what to do with your data online. Just follow these 40 steps to make sure you stay as safe as possible going forward.
1. Be aware of who accesses your hardware
One of the simplest ways for hackers to access your personal information is by physically attaching a device to your computer hardware without you realizing. These devices can then be used to monitor your online activity. If you have a shared office space, stay vigilant to those around you, and ask about in-office CCTV if you donโt have it already.


Source:
Flickr
2. Password-protect your computer
Another simple way to prevent physical access to your computer is to password-protect your lock screen. If youโre leaving your computer for a couple of minutes, you can โsign outโ from your device, which will prevent anyone from being able to access your data without signing in. You can also set your computer to automatically sign you out after so many minutes of inactivity.


Source:
Flickr
3. Log out while youโre away
If youโre going to be away from the office for a longer period of time (i.e. during your lunch break), go one step better and log your computer off entirely. Someone whoโs looking to quickly gain access to your personal data will draw more attention to themselves if they have to sit and wait for your computer to switch on and load up. A black screen is, therefore, off-putting to a cyberstalker.


Source:
Flickr
4. Fingerprint-protect your phone screen
Our phones are much more capable than they used to be, and we should definitely make use of their new security features. If your phone gives you the option for using your fingerprint or face recognition to turn your screen on, set it up as soon as you can. Do the same for your kidsโ phones to keep them safe from physical intruders.


Source:
Pexels
5. Make complex passwords
The best passwords are the hardest to remember, and contain a combination of numbers, letters and symbols. Create different passwords for different purposes, and change them as regularly as you can. Try to avoid writing a password down, especially one that gives access into your computer. If you lose that slip of paper or notebook containing your personal info, your security might be at risk.


Source:
Flickr
6. Make your online calendar private
If your online calendar is accessible to all, youโre giving cyberstalkers an easy way to keep track of your planned actions. This is especially an issue if you share your scheduled activities on Facebook, such as trips you intend to take and events you plan to attend. If people beyond your inner circle can see what youโre up to, theyโll be able to track your exact whereabouts at any time.


Source:
Pexels
7. Hide your info on social media
A lot of social media apps allow other users to view your basic information, like your name, birthday and workplace, without even being your friend or follower. You can adjust these settings to make your profile more secure, preventing people from being able to find you through a search of your name at all. This way, you can be certain that only your accepted friends and followers can see your info.


Source:
Flickr
8. Turn off your location on photos
When posting photos to social media, you might find that the photo automatically tags your location based on your phoneโs recorded data. If you donโt necessarily want your followers and friends to know your exact whereabouts, you can turn off the location suggestion and leave it blank. This will prevent strangers from being able to track your movements throughout the day.


Source:
Flickr
9. Use a security software
There are a number of very good security programs that you can download for use on your computer and phone. You often have to pay a small monthly fee for the benefits these programs provide, including preventing spyware from being installed on your device and detecting potential cyberstalkers. If you donโt have much knowledge on security software, ask your trusted friends for recommendations.


Source:
Pexels
10. Protect yourself from exes
If your relationship has just come to an end, no matter what terms you ended on, change your passwords to your social media and other private accounts. Your ex may use your passwords to stalk you, especially if you have unfriended them or blocked them online to prevent them from being able to see what youโre up to. Even if you donโt think your ex has access to your passwords, itโs best to stay on the safe side and change them just in case.


Source:
Flickr
11. Avoid oversharing information online
There is some information that simply shouldnโt be shared online. Details about your personal health, your family, your home address, and your phone number are best only being known by your close circle. Itโs common nowadays for people to post photos of their children online, but consider deeply whether youโre comfortable with the potential implications before doing it yourself.


Source:
Flickr
12. Google yourself
The best way to be aware of your current online presence is to Google yourself. How much information can you find, and from how many different websites? Are you comfortable with this information being available to the public? If not, take action. Privatize anything that you donโt want showing up on search engines, or delete it altogether.


Source:
Flickr
13. Report suspicious behavior
When it comes to cyberstalking, itโs always better to be safe than sorry. The majority of social media apps allow you to visit a personโs profile and report them for going against the appโs community standards, for whatever reason this may be. This person can then be investigated behind the scenes, and have their account removed if damning evidence is found. If you have definite, legitimate proof of cyberstalking, call the police.


Source:
Flickr
14. Delete your maps history
If a cyberstalker is tracking your device, they may not need to do too much digging to find the information theyโre looking for. Many online map apps, for example, save your previous searches and planned journeys. This means that the wrong person can easily view where you have traveled and where you plan to travel. Itโs wise to delete your search history once youโve finished using the app.


Source:
Pexels
15. Shred your physical documents
Any physical piece of data that youโve taken from online, like bank statements, bills and other personal information, should always be shredded when youโre done with it. Donโt just throw it in the trash; anyone could take your documents back out and keep them for later use. If you donโt have a shredder, tear your paper into small pieces. If you have a dog, even better โ itโll do the job for you.


Source:
Flickr
16. Lock your documents away
Thereโs no need to be in easy reach of personal documents like your passport and birth certificate at all times. Buy a fireproof safe and lock these documents away when you donโt need them. When youโre traveling abroad, leave your passport at your hotelโs safe or purchase a money belt to allow you to carry it on your person.


Source:
Flickr
17. Never give out your data
If a company contacts you asking for your sensitive data, donโt give it to them. The majority of companies that handle your private information, like banks, will never call their customers asking for any data that they already have access to. If you canโt be certain that a phone call is legitimate, ask to call the company back and donโt do so unless youโre happy that youโre not being scammed.


Source:
Pexels
18. Be wary of tech support
Tech support for your laptop or computer can sometimes be your savior. But if a company calls you claiming that your computer has been hacked or has a virus, be wary. These companies will claim that they need to clean your computer to put you out of risks, when in reality, theyโre the ones who pose the risk. Never give out your passwords over the phone.


Source:
Pexels
19. Look out for phishing
If youโve heard of phishing before but youโre still pretty unfamiliar with the term, itโs time you learned. Phishing is the act of mimicking another company online, and hackers and cyberstalkers can be incredibly clever at it. You might receive a legitimate-looking email from a phisher that doesnโt end up in your spam, but an easy way to check for legitimacy is to look at the email address. Compare this address to a companyโs actual email address โ and if in doubt, donโt give your data out.


Source:
Flickr
20. Sign up for free credit reports
The best way to make sure your financial information hasnโt been leaked is to sign up to a number of online agencies to receive free credit reports. The likes of Experian and TransUnion can provide you with one free report a year, which contains all the data of your recent credit history. If something doesnโt look right with your credit score, review your credit report very closely.


Source:
Flickr
21. Donโt give out your social security number
Unless you are absolutely certain of who is asking for your social security number, and their purpose of doing so, donโt give it out. Again, you can always contact the third party requesting your details in your own time after you have done your research. You wonโt be penalized for staying cautious and following your gut instinct.


Source:
Pexels
22. Get your computer professionally checked
If you think you might have been targeted by a hacker or cyberstalker, a computer expert will be able to run a quick diagnosis for you and let you know. Youโll have to pay for this service, but itโs definitely worth doing if you have any reason to suspect a breach of your data. An expert may be able to find evidence that you can then act on appropriately.


Source:
Pexels
23. Make records of your findings
The moment you start to become suspicious of cyberstalking activity, make records of the discoveries you make. Record every detail of your incidents, including the time and date that they occurred. Donโt put this off in fear of looking โcrazyโ โ you may end up regretting not taking action sooner.


Source:
Flickr
24. Stay alert on dating sites
They might seem completely innocent to you, but dating sites offer cyberstalkers one of the easiest ways of gaining access to your personal information. Many of these sites only provide your basic details to those who contact you, but they canโt prevent you from choosing to share your contact information and other personal data. Itโs wise not to give out your phone number or your last name until after youโve met a person.


Source:
Flickr
25. Set reminders to change your passwords
Unless you have an unusually logical, ordered brain, youโre unlikely to be able to work out the exact date of the last time you changed your passwords. To make things easier for yourself, set yourself a reminder on your phone to change your passwords every two months.


Source:
Pexels
26. Accept suggested passwords
A number of websites are now suggesting passwords for their users in accordance to their own protection guidelines. Itโs wise to take these password options when theyโre presented to you, as theyโre designed to be as obscure as possible to prevent potential data breaches. The passwords we think up ourselves are never quite as secure.


Source:
Flickr
27. Donโt accept friend requests from strangers
The likes of Facebook, Twitter and Instagram are great places to make friends and meet like-minded people, but thatโs not to say that you should accept friend requests from strangers. If possible, get to know a person first, and only add them when youโre absolutely certain of their identity. If you use social media for business purposes, consider making an entirely different account with only your business information and contact details available for public viewing.


Source:
wikiHow Tech
28. Block suspicious friends or followers
If you detect any suspicious activity on your social media homepages, block the person responsible. They wonโt be able to access your information from then on โ unless, of course, they create a new account. If someone is pestering you from multiple accounts, report them as soon as possible.


Source:
Flickr
29. Make your friends aware of your data preferences
Our friends mean the best, but sometimes they can overstep invisible boundaries by posting personal information about you that you might not want online. If a friend posts a photo or video of you onto their social media account, and youโre not happy with them doing so, remove your tag and/or ask your friend to take it down. A respectful friend will listen to your concerns and act accordingly.


Source:
Pexels
30. Be wary of your inner circle
In many cases of cyberstalking, the victim is actually targeted by a close โfriendโ or acquaintance. Of course, you want to feel that you can open up to your friends and colleagues to some extent, but donโt forget to look out for signs of trouble. Just because youโd hope to never be cyberstalked by a friend, it doesnโt mean it wonโt happen.


Source:
Pexels
31. Watch out for public Wi-Fi
When you log into public Wi-Fi, youโre sometimes given the option to select whether youโre on a network of trusted devices that are your own, or there are other unfamiliar devices on the network. Always select the second option. This reduces the risk of someone being able to access your details through the shared Wi-Fi network.


Source:
Flickr
32. Donโt have personal conversations in public forums
While you might think that the forums you use are full of people just like yourself, the odd member might not be so friendly. Think before you type, and in all circumstances, never give out your personal information beyond your first name. Many people on public forums tend to use nicknames to privatize their profiles even more.


Source:
Pexels
33. Donโt delete suspicious messages
If youโre being harassed online, deleting the offending messages might seem like the best way to make the problem go away. But this actually makes things more difficult if you need to present evidence of cyberstalking in the future. Deleted messages can be recovered, but itโs best to keep a log of screenshots that can be accessed immediately.


Source:
Wikihow
34. Opt out of sharing your data
Data security has become more important than ever this year, and websites are now obliged to ask for your permission before taking your personal information to use for marketing purposes. You can choose to opt out of sharing this data if you want to prevent your information from being spread across the internet, where itโs at more risk of falling into the wrong hands.


Source:
Pexels
35. Different user, different login
If you share a device with friends or colleagues, keep your personal account safe by switching users when youโre passing the device onto others. Itโs a bad idea to give someone easy access to your passwords and payment information โ even to leave your emails and other notifications popping up on the screen. What may start out as unintentional data intrusion could quickly lead to trouble.


Source:
Pexels
36. If you lose a device, report it
Mobile phones are especially easy to lose โ which makes them easy targets for hackers and cyberstalkers. If youโve lost your phone, even if you donโt care that much, or you donโt think youโll ever see it again, report it missing to your phone company. They can disconnect service to your phone, preventing it from being used by a stranger.


Source:
Deposit Photos
37. Only make purchases on reputable websites
If youโre looking for a really specific item online, it can be tempting to pay for a purchase from a website youโve never heard of. If youโre considering this, do your research before parting with your cash. Once an illegitimate website has your card details, your personal data is at risk. You can stay even more protected by paying through third-party programs, like PayPal.


Source:
Pexels
38. Browse incognito
Incognito has far more uses than preventing your boss from being able to check up on your search history. When you use incognito, it disables cookies and extensions, which essentially makes you anonymous and reduces the chances of a cyberstalker or hacker being able to keep track of your activity.


Source:
Flickr
39. Hide your browser data
If you have just bought a new laptop or started work on a shared office computer, the first thing you should do is configure your browser to not reveal your name, email address or other private information. This helps to protect your data both online and offline.


Source:
Flickr
40. If in doubt, seek help
If you suspect youโre being cyberstalked, and youโre not sure what to do about it, the wisest thing to do is seek outside support. All kinds of stalking are illegal, and youโre well within your right to report an incident if youโre being harassed or your personal information is being used against your will.


Source:
Pexels
Please SHARE this with your friends and family.