Categories: Cyber Security

10 Tips for Protecting Your Privacy and Personal Data

When it comes to protecting your privacy and personal data when shopping online, who do you trust? HINT: It should be you.

A recent survey by McKinsey & Company asked respondents to rank the industries they most trust to protect their privacy and personal data. Not surprisingly, the healthcare and financial services ranked at the top of the list at only a concerning 44 percent. Even more concerningly, people only ranked the public sector/government at 11 percent.

  • 44% – Healthcare and financial services
  • 22% – Pharmaceuticals/medical
  • 18% – Retail
  • 17% – Technology
  • 11% – Public sector and government
  • 10% – Media and entertainment

Where some see a lack of trust, others see opportunities. Organizations demonstrating trustworthiness by carefully handling and protecting customer’s data and privacy can stand out. Nine out of ten people are loyal to companies they trust with their privacy and data. 

Dealing with trustworthy companies is a great first step to protecting your personal data and privacy. And, we asked our cybersecurity experts to share their tips for protecting your privacy and personal data when online shopping. 

10 Tips for Protecting Yourself While Shopping Online

1. Only Shop on Trusted Websites

A favorite trick of cybercriminals is to create imposter websites appearing legitimate. Unless you’re paying close attention, you could click on a product or link opening the door to hackers. Scammers will create fake websites to lure shoppers into purchasing an item that is never received. 

According to the Better Business Bureau, 57 percent of shoppers do not research a new website before buying. And, of those 57 percent, 81 percent lost money. If the site asks for more information than usual, the deal seems too good to be true, or you’re just not comfortable with the buying experience, abandon the site. Search for the product on more reputable sites. 

Reputable sites are secure.

If a website is safe, the URL should begin with HTTPS, not HTTP. Some browsers display a lock next to the address reinforcing the site is secure. Check for the HTTPS before clicking on a site, and again before initiating checkout, as some websites host their checkout process separately from their product catalog. 

2. Adding the DuckDuckGo Extention to Your Preferred Internet Browser

DuckDuckGo is an internet search engine developed to protect search privacy and avoid the filter bubble of personalized search results. The DuckDuckGo browser extension and mobile app verifies a website’s security while also blocking Google’s (and many other companies’) trackers, keeping your browsing history private. No more ads following you long after you’ve completed a search.

3. Stay Away From Coupon Sites

We love a good bargain too. There are sites dedicated to curating promo codes for bargain-savvy shoppers. Some are legit. Some not. Searching for promo codes, and then clicking on sites you’ve never heard of is risky and leaves you vulnerable. Instead, let a trusted browser extension like Honey or Wikibuy (Capital One Shopping) search and apply promo codes for you. 

4. Keep Your Software Updated

Companies spend hours and invest thousands of dollars fixing vulnerabilities in their software. These fixes are included in software updates. If the updates are not applied, you increase the chances of a successful cyberattack. 

5. Secure Your Devices

Make sure your phones, tablets, laptops, and computers have firewall and virus protection software installed. If a device is not protected, do not use it for online holiday shopping. Additionally, add passwords to your devices. If you lose your phone or your laptop is stolen, this limits access to personal information.

6. Use a Strong Passphrase

Hackers have tools to automate the process of finding the correct password. For example, if you have a four-digit passcode, there are only 10,000 possible combinations. An experienced hacker can find the right combination in seconds. Thus, it’s essential to use longer passwords including symbols, digits, and characters. 

And, consider a passphrase. A passphrase is longer than a password and combines text, symbols, and digits to create an easier to remember — and harder to crack — passphrase. For example, instead of using your mom’s maiden name, try luvDaSm1th$.

A password manager like LastPass allows you to generate strong, unique passwords for each individual website and service while providing a convenient and secure place to store these. 

Finally, implement multi-factor authentication (MFA) when it’s available. MFA requires a second form of identification, such as a code texted to your smartphone or sent to your email. You enter the code into the application before access can be granted. Hackers may guess your password, but they most likely won’t have access to your phone.

7. Carefully Check Your Emails Before Opening Them

Before opening an email or clicking a link, take a moment to consider if it could be a phishing scam. It’s easy to click on what appears to be a legitimate promotional email, only to find out later you’ve given a hacker access to your personal information or credit card. Luckily, scam emails usually have a few patterns:

  • They contain a too-good-to-be-true offer
  • They contain misspelled words
  • They are sent from email addresses that don’t completely add up
  • They contain a link and an urgent need to “Act fast!”

Proceed with caution when checking your emails.

8. Use Different Emails for Different Purposes

Sure, you probably have a work email and a personal email. It’s time to take this one step further. Use different email accounts for different purposes: 

  • One email address for important things like bills, banking, taxes, medical accounts, etc.
  • One email address for shopping
  • One email address for newsletters or giveaways

Periodically use the website Have I Been Pwned? to check if your personal data has been compromised by data breaches. This service is used by media outlets and even the government to scan the dark web, collecting and analyzing hundreds of database dumps and pastes containing information about billions of leaked accounts. Enter your email address or username to see if your account has been included in a data breach. If your email is part of an email data breach, change your password or consider abandoning the email address.

9. Pay With a Third-Party Provider

Paying online for purchases with a credit or debit card puts your money at risk. While the bank or credit card company may make you whole, they can’t replace the hours consumed fixing the issue. Pay with a third-party provider like PayPal, Apple Pay, Samsung Pay, Google Pay, virtual credit card, or gift card purchased from a brick-and-mortar store to keep your account information safe. 

If you do happen to be a victim of a cybercriminal, you will need proof of purchase. Keep your receipts or screenshots of your transaction history.

10. Buy Local, Pay In-Person

Many people buy online, even if you’re buying from a local merchant. No matter how trustworthy the merchant may be, don’t pay online. Instead, pay when you pick up your order or have it delivered. It reduces the odds of becoming a victim.

Protect Your Privacy and Personal Data

With these safety tips from the experts who lead WOZ U’s Cybersecurity program, you’re proactively protecting your privacy and personal data.

Heather Zielinski

Recent Posts

What Does ChatGPT Mean for Coders? How to Leverage the AI Technology

What are the benefits of using ChatGPT? ● Improve code quality: By generating more efficient…

2 years ago

Top 10 Tech Gadgets Under $100 for Coders

Raspberry Pi 4 ($55) The Raspberry Pi 4 is a mini-computer that's perfect for coders…

2 years ago

Unlocking the Secrets of Dating App Technology: How Matchmaking Algorithms and Features Work

 The first step in creating a dating app is to define the target audience…

2 years ago

Motion Capture in Film, TV, and Video Games: Ultimate Guide

As technology advances, we're seeing increasing use of motion capture in media. This post will…

2 years ago

How to Launch Your Career as a Cybersecurity Specialist

 As such, organizations need to ensure their networks, data, and systems are secure from…

2 years ago

No More Excuses: The Top 5 Fitness Tracking Apps to Help You Stay Committed to Your Fitness Journey

 Additionally, tracking your fitness journey can help you identify patterns and make connections between…

2 years ago