15 ways to be more secure online

Protect your accounts, avoid scams, and keep randos off your Wi-Fi.

Welcome to the New World. Email phishing has evolved. Trolls can target your Facebook timeline, and your social security number is probably floating around the internet right now. Even Wi-Fi is no longer completely secure. But it’s not all doom and gloom. There is a shining path you can follow to keep yourself safe. Or, uh, safer.

Below, tricks that’ll make you more secure online—wherever you roam.

A laptop in the dark

It seems like barely a week goes by without some data hack or leak hitting the headlines. With so much of modern life now stored and managed online, it’s vital that you keep your most important accounts locked up and as well protected as possible—which is what we’re here to help you with. Here’s what you can do. >>

Phone apps

Your smartphone wouldn’t be all that useful without all the apps you’ve downloaded. Even when you’re not actively poking around within a program, it can run in the background—updating your location, checking your email, or playing music—to make life more convenient. But to do so, it needs permission from your phone.

Permissions let Google Maps check where you are in the world, your camera app peek through the phone’s camera, and your favorite messenger scan your contacts before sending an SMS. Typically, apps request this type of access when you first open them. But you might end up granting some of them permissions that go beyond what the apps actually need.

To check on these, you should regularly audit your app permissions. Periodic permissions checks protect you against potentially unscrupulous app developers and give you more control over your privacy. As an added bonus, if fewer apps are working away in the background, your phone can save on battery life. Here’s how to get checking. >>


With more than 2 billion monthly active users, Facebook can keep tabs on nearly a third of the world’s population. Whether you visit the social network daily (as 1.32 billion people do) or only log on to RSVP to events, you should be aware of how much of your personal data you’re giving to the site, and the company behind it.

Facebook primarily employs your information to serve you more relevant targeted advertising. While some see this as uncomfortably intrusive, others accept the ads as the price they pay for the network’s free services and tools. Whatever you think about the ethics of this data collection, you should know just what the company is learning about you—and how you can control the flow of information.

While this guide can help, there’s only so much you can do to protect your privacy—if you really want to stop Facebook from mining your data, your best bet is to delete your account. Read on for more. >>

Phone security

When somebody asks to borrow your phone—perhaps a stranger asks to make a call, or a friend wants to scroll through your vacation photos—the thought can give you heart palpitations. We keep so much data and personal information on our little pocket computers that handing them over to others, even voluntarily, can seem like an invasion of privacy. But you don’t have to feel that way. Both Android and iOS include built-in options for restricting what guests can do on your smartphone.

These security tips differ from the general lock-screen protections we’ve previously discussed. That advice—for example, you should always have a PIN code protecting your phone—keeps your information safe from anyone who might steal or accidentally encounter your device. But in this guide, we’re looking at situations where you willingly hand over your smartphone. Security tips, this way. >>

backlit laptop keyboard

Web browsers keep track of your past activity for a reason. That history comes in handy if you want to find a funny article again, or return to your favorite photo of the kids, or if restore a tab that you accidentally closed. At the same time, some people find this constant tracking a little on the creepy side. Not to mention that, if you share a computer with others, you might not want them finding out about a gift you secretly bought them, your interest in 1970s folk rock, or your more private Google searches.

Fortunately, all of today’s web browsers make it very simple to erase your history and wipe away your online tracks. In this guide, you’ll find out about the information your browser automatically logs, what that data does—and how to get rid of it. Read on. >>


When you delete a file from your computer, it doesn’t simply disappear from existence—at least, not right away. Even if you immediately empty the Recycle Bin or Trash folder, all your deletion does is earmark the space that file takes up on your hard drive as vacant. Until another file or application comes along to make use of that room, the old data will continue to sit there. Which is why specialized programs can often recover deleted files for you. But recovery isn’t always a priority. If you want to securely delete sensitive files, or you’re selling your old computer to another person, you need to make sure that no clever software will be able to bring your old files back from the dead.

Follow this guide to make sure unwanted files disappear forever from your computer, tablet, or phone, beyond the reach of even the most determined data forensics team. Just make sure you really want to permanently erase the data before you start. On a computer, no matter what type of machine you’re using, your first move should be to delete the file from File Explorer in Windows or Finder in macOS. Then clear out whichever undelete tool your operating system uses, either the Recycle Bin or the Trash folder. That’s where most people would stop and move on to another task, leaving their data vulnerable. Here’s what you need to do next. >>

An Apple Find My map displaying the location of David's iPhone.

You reach for your phone—and realize it’s not where you left it. With a sinking feeling, you pat your pockets, then tear your room apart. But the truth settles in: Your beloved device is gone, and you have no idea where you lost it. Now that we rely on our smartphones for everything from checking bank balances to making perfect social posts, a lost one can create a huge headache. And we’re not just talking about missing out on Facebook updates. Without your pocket computer, you lose touch with your family and friends (who memorizes phone numbers any more?), risk missing work commitments, and have your travel plans thrown into chaos. In other words, you need to recover your missing phone as soon as possible.

The good news is that your phone has apps to help you. The bad news is that these apps need to be set up in advance. Before we begin, we have a couple caveats. If you’re reading this because your phone is missing, but you haven’t already configured a recovery app, then we can’t help you (other than offering the usual advice: look in the last place you remember seeing it and ask one of your friends to call the number). And if your phone’s been stolen, we do not recommend that you track it down on your own. For your own safety, contact your local law enforcement agency and hand over any of the information your phone-finding app provides, rather than taking matters into your own hands. Now, let’s get started. >>

Social media

On social media, you get to catch up with old friends, make new connections, and coo over cute baby photos. Although you’re supposed to enjoy these visits to Facebook, Twitter, and Instagram, a persistent commenter or obnoxious “friend” can ruin your experience. That’s why these services provide ways for you to fight back. Take these steps to protect your privacy and slay trolls on three of the world’s biggest social networks. Read on. >>


When you log into eBay to exchange goods and money with complete strangers, it’s natural to have a sense of trepidation. How can you know who you’re dealing with? Is your money or personal information at risk? Happily, the vast majority of eBay transactions will go through without a hitch. To further minimize your chances of getting scammed, simply follow a few common-sense rules. Whether you’re selling or buying, we’ll guide you through the dos and don’ts of using eBay safely. These guidelines should keep everyone from auction newbies to old veterans out of trouble. Enjoy your eBaying. >>


You don’t want neighbors or passers-by stealing your Wi-Fi any more than you want them stealing your water, electricity, or carefully curated collection of Blu-ray movies. In fact it’s more serious than that—if someone can hook on to the same network as you, it becomes easier for them to snoop on your browsing and your locally stored files. So how do you go about locking things down? Thankfully, keeping unwelcome visitors away from your Wi-Fi isn’t difficult and doesn’t need an IT qualification. Here’s what you need to do. >>

People in a public building at night, maybe using public Wi-Fi.

Whether it’s your local bar, a city-wide access scheme, or hotspots from your phone carrier, public Wi-Fi networks continue to proliferate. Especially in urban areas, you’re more and more likely to find a high-speed network you can connect to when you’re away from home. However, accessing that network usually requires that you give up some personal details. Once connected, you’ll often find yourself sharing the network with a host of other people—some of whom might want to peek at your online activities. Here are five tips for using a public Wi-Fi network and protecting your information at the same time. Read more. >>

The backup process on a Western Digital hard drive.

When you sit down at the computer, you probably don’t want to spend your time backing up your files and data. It may not be as entertaining as Netflix or Facebook, but it just might be the most important job you can do on your desktop or laptop machine. Having a comprehensive backup scheme in place doesn’t only protect you against the trauma of accidentally deleting your files. It also gives you a safety net if a virus hits your PC, hackers hold your information hostage, or your kids tip a glass of water over your MacBook. Over the years all kinds of backup solutions have appeared, and the whole process is now much more straightforward than it used to be. Here’s what you should do. >>

A person sitting in front of a laptop that has a skull and crossbones in green code on the screen, indicating that it may have been infected with malware that they'll now need to remove.

Disaster has struck—an unwanted piece of malware took root on your computer. So what’s your next step? While the potential damage viruses can cause shouldn’t be underestimated, you might be able to get your computer back on its feet without too much difficulty, thanks to an array of helpful tools at your disposal. We’re using the term malware to refer to all kinds of computer nasties, from viruses to ransomware to adware. While each of these threats have their own definitions, the terms are often used interchangeably, and can mean different things to different people. So for simplicity’s sake, when we say malware, we mean everything you don’t want on your computer, from a virus that tries to delete your files to an adware program that’s tracking your web browsing. With so many types of malware and so many different system setups out there, we can’t cover every specific scenario. But we can give you some general pointers to get you on your way to the help you need. Follow these steps. >>

Inbox security

You may have heard about the phishing scam that targeted Google Docs users. People received emails with what looked almost exactly like shared Google Docs, tricking them into granting access to a not-particularly-nice piece of software. From there, the attack could spread to other inboxes. It’s far from the first time users have been attacked through their inboxes and it certainly won’t be the last—sending emails is an easy and low-cost way to fool people into letting their guard down. With that in mind, we’re here to make sure your inbox is tightly buttoned up against phishing attempts, malicious attachments, and more. While we can’t guarantee your safety, these precautions will certainly minimize your risk. Read on. >>

smartphone privacy

You’ve beefed up the security for your online accounts, so you feel confident sticking your smartphone in your pocket and heading out the door. But many consumers don’t realize that the software in their phones can track their every move. Whether you have an iOS or an Android device, Apple and Google can collect data about how you use it: the places you go, the apps you run, the search queries you type into the web browser, and so on. You can read detailed privacy policies for both Apple and Google online. Although this sounds unnecessarily invasive, the companies use a lot of your data in helpful ways. Are you comfortable with your phone reporting its location if it means you can find it when it gets lost? If your desire for privacy outweighs these benefits, you can decide how much you trust these companies with your data and how much information you’re prepared to share with them. Whatever you choose, it’s important to be aware of what you’re sharing, and how you can limit it if you want to. Here’s how it’s done. >>