It seems like we always have a connected device at our fingertips, whether it’s a smartphone, laptop, tablet, wearable, or a combination of all of these. In a way, we carry the Internet with us everywhere. However, there’s something else that follows us everywhere: an ever-growing amount of personally identifiable information, also known as PII.
What is PII?
What is PII? It is information relating to an identified or identifiable individual when that person can be identified directly or indirectly when used alone or in conjunction with other online identifiers provided by your devices, applications, tools, and protocols. A good example is your Social Security number if you live in the United States. Other examples are your facial image to unlock your smartphone, your medical information, your finances, your phone number (because it can be easily linked to you), Internet Protocol addresses, or other identifiers such as radio frequency identification tags.
You can also find examples of PII in the accounts you use, like your Google or Apple IDs, which may be tied to your name, email address, and the apps you have. You’ll also find it in places like the apps you use to map your runs because the combination of your smartphone’s unique device identifier and GPS tracking can be used along with other information to identify who you are and where you like to do your 5k hill days. The same is true for messaging apps, which may collect how you interact with others, how often you use the app, and information about your location based on your IP address, GPS information, or both.
All told, there’s a cloud of PII following us around the internet. Some pieces of that cloud are more identifying than others but put together enough of them and PII can create a high-resolution snapshot of you: who you are, what you do, when you do it, and even where you do it — especially if it falls into the wrong hands.
Protecting your PII protects your identity and privacy
It reminds me of Pig-Pen, the character straight out of the old, hilarious pages of Charles Schultz’s Charlie Brown, trailed as he was by an ever-present cloud of dust. Charlie Brown once said, “I may carry the dirt that Solomon, Nebuchadnezzar, or Genghis Khan walked on!” The cloud surrounding us isn’t the dust of kings and conquerors, it’s motes of digital information that have tremendously high value to criminals and bad actors, whether for the purposes of identity theft or invasion of privacy.
It goes without saying that with all the personal information we create and share on the Internet, we need to take steps to protect it from being abused.
I’ve outlined a series of ten things you can do to ensure that what’s private stays private.
1) Use a complete security platform that
Square One protects your devices with comprehensive security software. This will defend you against the latest virus, malware, spyware, and ransomware attacks, as well as further protect your privacy and identity. On top of this, it can also provide strong password protection by automatically generating and storing complex passwords to keep your credentials safer from hackers and criminals who may try to break into your accounts.
Additionally, security software may also include a firewall that blocks unwanted traffic from entering your home network, such as an attacker looking for vulnerabilities in the network so they can “sneak” into your computer and steal information. Again, installing security software is the first step, as it offers numerous ways to protect your personal and other important information.
2) Use a VPN
Also known as a virtual private network, a VPN helps protect your vital personal information and other data with bank-grade encryption. A VPN encrypts your internet connection to keep your online activity private on any network, even public networks. Using a public network without a VPN can increase your cybersecurity risk, as other people on the network can easily hack into your browsing and data.
If you’re new to the notion of using a VPN, check out my recent article on VPNs and how to choose one so you can get the best protection and privacy possible.
3) Keep track of your Social Security number
In the United States, the Social Security number (SSN) is one of the most valuable pieces of personal identification, unlocking the door to employment, finances, and much more. First, keep track of it. Literally. Keep your card in a safe place. Not in your purse or wallet.
Some businesses and medical practices may ask for your Social Security number for billing and other purposes. You don’t have to provide it (although some businesses may deny you service if you don’t). However, there are some cases where it is required. For example:
- To work or contract with a company
- Group health insurance
- Financial and real estate operations
- Apply for credit cards, car loans, etc.
Keep in mind that many cases of hacked credit cards occur due to internal negligence, rather than the direct efforts of cybercriminals. Minimizing how often you provide your SSN can offer an additional degree of protection.
4) Protect your files
Protecting your files with encryption is a basic concept in data and information security, and is therefore a very effective way to protect your personal information. It involves transforming data or information into a code that requires a digital key to access it in its original, unencrypted form. For example, McAfee® Total Protection includes File Lock, which is our file encryption feature that lets you lock important files in secure digital vaults on your device. Additionally, you should also delete sensitive files with an app like McAfee Shredder™, which securely erases files so thieves can’t access them. (Fun fact: Deleting files from the trash doesn’t actually delete them in the strict sense of the word. They stay there until they’re “destroyed” or otherwise overwritten so they can’t be recovered.)
5) Avoid Internet “contests”
Which Marvel Universe superhero are you? Does it matter? After all, these types of quizzes and social media posts are often stealing some of your PII in a seemingly playful way. While you’re not giving out your Social Security number, you may be giving out things like your birthday, your pet’s name, and your first car — things that people often use to make up their passwords or as answers to common security questions on banking and financial sites. The only way to beat this type of quiz is to not do it.
6) Be aware of phishing attacks
A much more direct way to separate you from your PII is through phishing attacks. Posing as emails from well-known or trusted brands and financial institutions, a cybercriminal’s phishing attack will attempt to trick you into sharing important information such as your usernames, account numbers, credit card numbers, etc., under the guise of offering customer service.
How do you spot these messages? Well, it’s a bit more difficult these days because scammers are becoming more sophisticated and can make their phishing emails look almost legitimate. However, there are several ways to spot a phishing email.
offers another layer of prevention, in this case through browser protection, such as our Web Advisor, which will alert you if you find suspicious links and downloads that could steal your personal information or expose you to attacks.
7) Keep calm on your social media profile
With social engineering attacks tricking victims into posing as people the victim knows and the way we can sometimes share too much about our lives, you can see why a social media profile is a potential goldmine for cybercriminals.
There are two things you can do to prevent your PII from being compromised through social media: First, think twice about what PII you might be sharing in that post or photo, such as the location of your child’s school or your car’s license plate; second, set your profile to private so that only your friends can see it. Regularly review your privacy settings to keep your profile information out of the public’s reach. And remember, nothing is 100% private on the Internet. Never post anything you don’t want to share.
8) Look for HTTPS when browsing
The “S” stands for secure. Whenever you’re shopping, banking, or sharing any kind of personal information, look for “https” at the beginning of the web address. Some browsers also indicate HTTP by displaying a little “lock” icon. Otherwise, on plain HTTP sites, your personal information will be exposed to anyone who cares to monitor that site for unsecured connections.
9) Lock your devices and watch out for shoulder surfers.
By locking your devices, you are much better protected from personal information and data theft in case your device is lost, stolen, or even left unattended for a short period of time. Use your password, PIN, facial recognition, fingerprint, or whatever you like. Just lock your stuff.
And just like you covered your work while taking your math test in elementary school, cover your work when you’re out in public. Or better yet, do your shopping, banking, and other sensitive work strictly at home or in another controlled situation. The point is, that criminals are happy to stoop to simply peering over your shoulder to get the personal information they want.
While it’s necessary to talk about all the digital ways a criminal can steal your personal information, it’s important to remember that physical security, like being aware of your surroundings and simply not leaving your laptop in your car even for a moment while you pay for gas at the pump, is just as important.
10) Monitor your credit
Of course, having your PII stolen can lead to fake credit cards and other accounts being opened in your name. What’s more, it may take some time before you even realise it, until perhaps your credit score takes a hit or a debt collector calls you. By checking your credit, you can address any issues that arise, as companies usually have a clear process for disputing any fraud. You can get a free credit report in the US through the Federal Trade Commission (FTC), and similarly, other countries such as the UK also have similar free offerings.
Consider identity theft protection, too. A good identity theft protection package pairs well with monitoring your credit in the ways I mentioned above. For example, it offers cyber monitoring that scans black market sites on the Dark Web and Social Security number monitoring that can detect if there are new aliases or addresses associated with your number.