My Profile
Profile Avatar
Sylvanus Thayer
*******, ******* *******
United States
******* *******

Beware of TMI: the five things you should never share

Social networking means opening up and sharing information online with others, but there’s some information you should never share online. Protecting yourself from sharing Too Much Information (TMI) can save you from identity theft and even protect your physical safety. So let's start with the obvious … never share your social security number (including even just the last 4 digits), your birth date, home address or home phone number (although sharing your business phone is ok ). Of course, you should protect all of your passwords, PIN numbers, bank account and credit card information. But I advise buy twitter followers greece you to never share the state where you were born as this information can be used to obtain your social security number and other identity information. Facebook, for example, allows you to restrict who can see your birthday or your hometown (often times the same as your city of birth.) But not every site has these options. In those cases avoid the problem altogether by not entering information you don’t want to share. If the sites you are using don’t offer these kinds of protections, e-mail them and request these features. If enough of us make the request, they’ll get the message.

Powerful Social Media Optimization

Choose a good strong password for your online accounts

This steps is a classical one, but it cannot be avoided. As we said in our take on encryption, passwords are only as good as the encrypting programs we use to protect valuable information. For this reason, we have to make sure our passwords incorporate uppercase and lowercase letters and numbers, and are more than 15 characters long. But how exactly are we supposed to do this, if we create so many online accounts? For most users there is only buy twitter followers australia one solution and that is to use the same credentials. But the risk appears when a hacker discovers your password for one online account that doesn’t have much protection. And then, it is very easy to gain access to all the other accounts. The same attention should be given to PINs that you may use in various locations. These are usually birth dates, phone numbers or numbers from your social security number.

Protect your computer with multiple security products

Identity thieves use multiple tools to get to your personal data. We are not talking about the classical viruses here, we refer to advanced malware and spyware tools, like keyloggers, buy twitter followers cheap exploits and remote administration tools that are capable to retrieve sensitive information from a system without the user’s knowledge. These advanced pieces of malware are designed to evade the normal antivirus detection and sometimes a long time passes until the user becomes aware of their presence.

Copyright 2011 by ReCAAP ISC  |  Privacy Statement  |  Terms Of Use