Personal Security

Hints and tips for personal on-line security

As of 30th September 2013, Facebook Graph Search has officially opened its big, omniscient arms to every last check-in, status update, note, and comment you've ever posted throughout your entire Facebook career. Which, yes, sounds pretty terrifying, but don't worry—we're here to help you cover your tracks.

Thankfully, Facebook has given us the tools we need to (mostly) take control of our privacy moving forward. Here's what you need to know.

Keeping your Facebook info private is getting harder and harder all the time—mostly because Facebook keeps trying to make it public. To help you out, we've created a comprehensive guide to keeping your Facebook locked down and in your control, and we're going to keep it updated whenever Facebook decides to add a new feature or change its privacy defaults...yet again.

Weak password, strong password, temporary password, password reminder, forgotten password, password reset, password fatigue, password overload: Whether you’re a user or system administrator, passwords are part of our everyday lives.

Passwords are a common form of protecting information, but passwords alone may not provide adequate security. For the best protection, look for sites that have additional ways to verify your identity.

You may think that you are anonymous as you browse web sites, but pieces of information about you are always left behind. You can reduce the amount of information revealed about you by visiting legitimate sites, checking privacy policies, and minimizing the amount of personal information you provide.

How to tell if an e-mail message is fraudulent

Here are a few phrases to look for if you think an e-mail message is a phishing scam.

When anyone or anything can access your computer at any time, your computer is more susceptible to being attacked. You can restrict outside access to your computer and the information on it with a firewall.

Anti-virus software can identify and block many viruses before they can infect your computer. Once you install anti-virus software, it is important to keep it up to date.

While email attachments are a popular and convenient way to send documents, they are also a common source of viruses. Use caution when opening attachments, even if they appear to have been sent by someone you know.

Digital signatures are a way to verify that an email message is really from the person who supposedly sent it and that it hasn't been changed.

Encrypting data is a good way to protect sensitive information. It ensures that the data can only be read by the person who is authorized to have access to it.

Passwords are a common form of authentication and are often the only barrier between a user and your personal information. There are several programs attackers can use to help guess or "crack" passwords, but by choosing good passwords and keeping them confidential, you can make it more difficult for an unauthorized person to access your information.