Privacy and Security Fundamentals - Cheat Sheet
Understanding Your Digital Footprint
- Active Footprint: Information you deliberately share (social media, comments, reviews)
- Passive Footprint: Information collected without direct action (browsing history, location data)
Essential Privacy Practices
Managing Your Digital Footprint
- Search your name regularly to see what’s public
- Review privacy settings on all platforms quarterly
- Be selective about sharing personal information
- Use privacy-focused service alternatives when possible
- Only provide information that’s absolutely necessary
Browser Privacy Techniques
- Use private browsing for sensitive searches
- Clear cookies and browsing history weekly
- Install privacy extensions (Privacy Badger, uBlock Origin)
- Consider privacy-focused browsers (Firefox, Brave, Tor)
- Disable third-party cookies in browser settings
Social Media Privacy
- Audit your connections regularly
- Limit personal information in profiles
- Use platform privacy tools and checkups
- Remove location data before sharing images
- Consider separate accounts for different life aspects
Essential Security Practices
Password Management
- Create strong, unique passwords (12+ characters, mixed types)
- Use a password manager (Bitwarden, LastPass, 1Password)
- Enable two-factor authentication (2FA) on important accounts
- Use passkeys when available
- Check haveibeenpwned.com regularly for breaches
Network Security
- Use VPNs on public Wi-Fi
- Secure home network with strong password and WPA3
- Turn off Bluetooth when not in use
- Check for HTTPS before entering sensitive information
- Consider using a secure DNS service
Device Security
- Keep software and operating systems updated
- Use antivirus/anti-malware protection
- Enable device encryption
- Back up important data (3-2-1 rule: 3 copies, 2 types, 1 off-site)
- Properly wipe data before selling or recycling devices
Scam Recognition Red Flags
- Urgency (“Act now!” or “Limited time only!”)
- Threats or dire consequences for inaction
- Requests for unusual payment methods
- Poor grammar or spelling
- Offers that seem too good to be true
- Unsolicited communications about accounts
- Requests for personal information or credentials
Common Scam Types
- Phishing: Fake emails appearing to be from legitimate companies
- Smishing: Phishing via SMS text messages
- Vishing: Voice phishing via phone calls
- Tech Support Scams: Fake alerts about computer problems
- Romance Scams: Building relationships to extract money
- Investment Scams: Promises of unrealistic returns
- Impersonation Scams: Pretending to be government agencies
If You Suspect a Scam
- Don’t click links or download attachments
- Contact the purported sender through official channels
- Never provide personal information in response to unsolicited requests
- Report suspicious communications to relevant platforms
- If victimized, change passwords and notify financial institutions immediately