SlideShare a Scribd company logo
1 of 16
How to protect your
digital footprint
Use search engines to find
your name.
Include your first and last
name, as well as any spelling
variations.
Use search engines to
check your digital footprint
Your Logo Date//Time//Year
Every time you give your personal
information to a company, you expand
your digital footprint.
You also increase the chances that one
of the organizations storing your data
will misuse it or suffer a data breach,
putting your information at risk.
Limit the amount of
data you share
You can control who sees your social
media posts by adjusting your
privacy settings.
Examine these settings to ensure
they are at a level that you are
comfortable with.
Restrict your
privacy settings
Social media makes it simple to connect
with others, but it also facilitates
oversharing.
Avoid revealing your location, travel
plans, and other personal information on
your profile.
Avoid oversharing
on social media
Because you don't know who set it up
or who else might be watching, a
public Wi-Fi network is inherently less
secure than your personal one.
Avoid browsing the
internet on public Wi-Fi
Avoid visiting
unsafe websites
Verify that you’re transacting with a secure
website.
The URL should start with:
https://
Rather than:
http://
indicating that the site has a security
certificate.
Make sure that your records can be
viewed only by you, or authorized
doctors or their staff.
Update your passwords regularly.
Keep an eye on your
medical records
Using Facebook, Google or Apple to log into
websites and apps is convenient.
However, by using your credentials to sign
into a third-party website, you grant that
company permission to mine your Facebook,
Google or Apple user data.
Don’t use single-account sign-ins (Facebook, Apple)
Outdated software may contain
a plethora of digital footprints.
Cybercriminals could gain
access to this information if the
system is not kept up to date.
Don’t skip software
and OS updates
Take immediate action if you suspect
your data has been compromised as a
result of a breach.
If your financial data has been
compromised, notify your bank or credit
card provider of the breach.
Change any passwords that have been
exposed.
Act fast after a breach
Using a VPN, or virtual private network,
can help you protect your digital
footprint.
Because VPNs mask your IP address,
your online activities may be more
difficult to trace.
Use a VPN
A Google Alert will notify you
whenever your name appears online.
Create a Google Alert
for your name
Getting rid of dormant
accounts reduces your
risk of data breaches.
Delete old accounts and apps
The use of cookies has a significant
impact on how your online footprint is
constructed.
When prompted, decline cookies, or use a
browser (such as Brave or DuckDuckGo)
that prevents tracking by default.
Disable cookies, or use a browser that
does (Brave, DuckDuckGo)
For more, visit:
@Cybermaterial @Cybermaterial_

More Related Content

What's hot

Network security policies
Network security policiesNetwork security policies
Network security policies
Usman Mukhtar
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
Department of Defense
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
Atlantic Training, LLC.
 

What's hot (20)

Network security policies
Network security policiesNetwork security policies
Network security policies
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Data recovery
Data recoveryData recovery
Data recovery
 
Windows Server 2012 Installation and Configurtion Superiorgrw
Windows Server 2012 Installation and Configurtion SuperiorgrwWindows Server 2012 Installation and Configurtion Superiorgrw
Windows Server 2012 Installation and Configurtion Superiorgrw
 
Exploit Development with Python
Exploit Development with PythonExploit Development with Python
Exploit Development with Python
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber saftey for parents
Cyber saftey for parentsCyber saftey for parents
Cyber saftey for parents
 
System and Network Administration/ SNA
System and Network Administration/ SNASystem and Network Administration/ SNA
System and Network Administration/ SNA
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
Browser forensics
Browser forensicsBrowser forensics
Browser forensics
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 

Similar to How to protect your digital footprint

Research Project Ms
Research Project MsResearch Project Ms
Research Project Ms
mafer23
 
Safe Use Of Social Networks Final Draft
Safe Use Of Social Networks   Final DraftSafe Use Of Social Networks   Final Draft
Safe Use Of Social Networks Final Draft
ravichar
 

Similar to How to protect your digital footprint (20)

A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy Online
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital age
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Research Project Ms
Research Project MsResearch Project Ms
Research Project Ms
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 
How to keep safe against hackers.pptx
How to keep safe against hackers.pptxHow to keep safe against hackers.pptx
How to keep safe against hackers.pptx
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Safe Use Of Social Networks Final Draft
Safe Use Of Social Networks   Final DraftSafe Use Of Social Networks   Final Draft
Safe Use Of Social Networks Final Draft
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
 
Keeping Your Kids Safe Online Smart Card
Keeping Your Kids Safe Online Smart CardKeeping Your Kids Safe Online Smart Card
Keeping Your Kids Safe Online Smart Card
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 

More from Cybermaterial

8 tools for malware analysis
8 tools for malware analysis8 tools for malware analysis
8 tools for malware analysis
Cybermaterial
 
10 Tips To Secure Your Social Media Accounts
10 Tips  To Secure Your Social Media Accounts10 Tips  To Secure Your Social Media Accounts
10 Tips To Secure Your Social Media Accounts
Cybermaterial
 
7 Steps To Take When Facing A Cyber Attack
7 Steps To Take When Facing A Cyber Attack7 Steps To Take When Facing A Cyber Attack
7 Steps To Take When Facing A Cyber Attack
Cybermaterial
 
8 steps to assess the security of your email
8 steps to assess  the security of your email 8 steps to assess  the security of your email
8 steps to assess the security of your email
Cybermaterial
 
9 Email Security Tips
9 Email Security Tips9 Email Security Tips
9 Email Security Tips
Cybermaterial
 
CyberTips: Encryption
CyberTips: Encryption CyberTips: Encryption
CyberTips: Encryption
Cybermaterial
 
Cyber Tips for Executives.pdf
Cyber Tips for Executives.pdfCyber Tips for Executives.pdf
Cyber Tips for Executives.pdf
Cybermaterial
 
Basic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hackedBasic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hacked
Cybermaterial
 

More from Cybermaterial (20)

8 tools for malware analysis
8 tools for malware analysis8 tools for malware analysis
8 tools for malware analysis
 
How to protect your smartphone from malware
How to protect your smartphone from malwareHow to protect your smartphone from malware
How to protect your smartphone from malware
 
How to Harden your Privacy Settings on Twitter
How to Harden your Privacy Settings on TwitterHow to Harden your Privacy Settings on Twitter
How to Harden your Privacy Settings on Twitter
 
10 Tips To Secure Your Social Media Accounts
10 Tips  To Secure Your Social Media Accounts10 Tips  To Secure Your Social Media Accounts
10 Tips To Secure Your Social Media Accounts
 
How To Secure Your Twitter Account With Google Authenticator
How To Secure Your Twitter Account With Google AuthenticatorHow To Secure Your Twitter Account With Google Authenticator
How To Secure Your Twitter Account With Google Authenticator
 
9 steps on how to set up email aliases in Gmail
9 steps on how to set up email aliases in Gmail9 steps on how to set up email aliases in Gmail
9 steps on how to set up email aliases in Gmail
 
7 Steps To Take When Facing A Cyber Attack
7 Steps To Take When Facing A Cyber Attack7 Steps To Take When Facing A Cyber Attack
7 Steps To Take When Facing A Cyber Attack
 
8 steps to assess the security of your email
8 steps to assess  the security of your email 8 steps to assess  the security of your email
8 steps to assess the security of your email
 
How to create aliases to protect your real email on Microsoft Outlook
How to create aliases to protect your real email on Microsoft OutlookHow to create aliases to protect your real email on Microsoft Outlook
How to create aliases to protect your real email on Microsoft Outlook
 
9 Email Security Tips
9 Email Security Tips9 Email Security Tips
9 Email Security Tips
 
How To Browse the Internet Safely with A VPN
How To Browse the Internet Safely with A VPNHow To Browse the Internet Safely with A VPN
How To Browse the Internet Safely with A VPN
 
How to set up full-disk encryption with BitLocker on Windows
How to set up full-disk encryption with BitLocker on WindowsHow to set up full-disk encryption with BitLocker on Windows
How to set up full-disk encryption with BitLocker on Windows
 
How to Buy Cyber Liability Insurance For You and Your Family
How to Buy Cyber Liability Insurance For You and Your FamilyHow to Buy Cyber Liability Insurance For You and Your Family
How to Buy Cyber Liability Insurance For You and Your Family
 
CyberTips: Encryption
CyberTips: Encryption CyberTips: Encryption
CyberTips: Encryption
 
Cyber Tips for Executives.pdf
Cyber Tips for Executives.pdfCyber Tips for Executives.pdf
Cyber Tips for Executives.pdf
 
10 steps to clean up your digital footprint
10 steps to clean up your digital footprint	10 steps to clean up your digital footprint
10 steps to clean up your digital footprint
 
How to file a complaint with the FTC
How to file a complaint with the FTCHow to file a complaint with the FTC
How to file a complaint with the FTC
 
Basic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hackedBasic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hacked
 
Cyber Tips: How to protect your biometric data?
Cyber Tips: How to protect your biometric data?Cyber Tips: How to protect your biometric data?
Cyber Tips: How to protect your biometric data?
 
CyberHygiene: How can non-profit organizations protect themselves from cyber ...
CyberHygiene: How can non-profit organizations protect themselves from cyber ...CyberHygiene: How can non-profit organizations protect themselves from cyber ...
CyberHygiene: How can non-profit organizations protect themselves from cyber ...
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

How to protect your digital footprint

  • 1. How to protect your digital footprint
  • 2. Use search engines to find your name. Include your first and last name, as well as any spelling variations. Use search engines to check your digital footprint
  • 3. Your Logo Date//Time//Year Every time you give your personal information to a company, you expand your digital footprint. You also increase the chances that one of the organizations storing your data will misuse it or suffer a data breach, putting your information at risk. Limit the amount of data you share
  • 4. You can control who sees your social media posts by adjusting your privacy settings. Examine these settings to ensure they are at a level that you are comfortable with. Restrict your privacy settings
  • 5. Social media makes it simple to connect with others, but it also facilitates oversharing. Avoid revealing your location, travel plans, and other personal information on your profile. Avoid oversharing on social media
  • 6. Because you don't know who set it up or who else might be watching, a public Wi-Fi network is inherently less secure than your personal one. Avoid browsing the internet on public Wi-Fi
  • 7. Avoid visiting unsafe websites Verify that you’re transacting with a secure website. The URL should start with: https:// Rather than: http:// indicating that the site has a security certificate.
  • 8. Make sure that your records can be viewed only by you, or authorized doctors or their staff. Update your passwords regularly. Keep an eye on your medical records
  • 9. Using Facebook, Google or Apple to log into websites and apps is convenient. However, by using your credentials to sign into a third-party website, you grant that company permission to mine your Facebook, Google or Apple user data. Don’t use single-account sign-ins (Facebook, Apple)
  • 10. Outdated software may contain a plethora of digital footprints. Cybercriminals could gain access to this information if the system is not kept up to date. Don’t skip software and OS updates
  • 11. Take immediate action if you suspect your data has been compromised as a result of a breach. If your financial data has been compromised, notify your bank or credit card provider of the breach. Change any passwords that have been exposed. Act fast after a breach
  • 12. Using a VPN, or virtual private network, can help you protect your digital footprint. Because VPNs mask your IP address, your online activities may be more difficult to trace. Use a VPN
  • 13. A Google Alert will notify you whenever your name appears online. Create a Google Alert for your name
  • 14. Getting rid of dormant accounts reduces your risk of data breaches. Delete old accounts and apps
  • 15. The use of cookies has a significant impact on how your online footprint is constructed. When prompted, decline cookies, or use a browser (such as Brave or DuckDuckGo) that prevents tracking by default. Disable cookies, or use a browser that does (Brave, DuckDuckGo)