Sub Total
Excluding delivery and voucher code discounts.
Go to basket

Free Delivery on all orders to UK mainland within 3 working days.

HP TECH TAKES /...

Exploring today's technology for tomorrow's possibilities
How To Protect Your Personal Information Online

How to Protect Your Personal Information Online

Daniel Horowitz
|
It's no secret that cybercrime is on the rise. According to the FBI, there was a more than 300% increase in cyber attacks and activity in the year 2020 – and it’s only expected to continue rising. It’s more important than ever to watch out for all types of online identity theft to keep your personal information safe.
In this article, we compiled 5 easy steps you can follow to protect your personal information online and make sure that it doesn't fall into the wrong hands.

1. Create strong passwords

Passwords are some of the easiest things for hackers and cybercriminals to breach, which is exactly why you need to take the creation of your passwords seriously. You can’t just use the same exact password that you have been using for years across all your accounts.
When you create passwords, don’t include any personal information, such as a birthday or a name closely associated with you (like a relative or spouse). In fact, you should not use any words or phrases in your password that are personally tied to you.
Instead, choose a combination of upper-case and lower-case letters, numbers, and special characters to make your passwords more difficult to figure out in the event of a data breach. You should also update your passwords periodically, at a minimum either annually or semi-annually. This is especially critical for your most important online accounts, like your bank accounts, social media accounts, and any others with personal or financial info.
Many of these sites and related apps may also provide the opportunity to use a two-factor authentication process, which we strongly recommend. This step increases the security of your banking app, for example, because you need to provide your password and then verify that it’s you through another means, such as a separate app on your smartphone.
Password Login

USE A PASSWORD MANAGER

While it may sound easy enough to create strong and unique passwords, practically speaking it is not something that many people will remember to do. Plus, it’s easy to overlook password security if you haven’t been personally affected by online identity theft.
To mitigate this risk, use a password manager to store your various passwords. This is much more secure than just saving your passwords in Google Chrome, too, because a cybercriminal can hack those if they get into your Google account.
Some of the best password manager apps have free versions, as well as affordable paid options. A password manager will help to curtail a lot of the risk that comes with exposing your online accounts, and many password manager apps allow you to store all of your passwords securely. They also often encrypt your password database with a master password.

2. Limit what you share on social media

It has become increasingly clear to cybersecurity experts that social media is insecure. Facebook suffered a data breach in early April 2021 that exposed the personal data of more than 500 million users. Once this data is exposed, hackers and cybercriminals can use data like phone numbers, full names, location targeting, email accounts, and biographical information to commit fraud and identity theft.
With all of these risks, you may be wondering, “How can I protect my information online, especially on social media?” Your first step is to limit the information you provide and post to Facebook, Twitter, and other social media companies. While using social media is a personal decision and a great way to connect with people, it’s important to use these platforms responsibly.
Limiting what you share and post is a key step in making sure that both companies and cybercriminals don’t have access to your personal info. This keeps more of your data private and reduces the possibility of that information falling into the wrong hands.

3. Make sure your wireless connection is secure

Most free public WiFi connections, including those in coffee shops and shopping malls, have few if any protections in place, which is why you should use these wireless connections with caution.
While there is no harm in using these public WiFi connections for some light social media use or internet browsing, don’t use them for anything that requires your personal information, such as bank accounts and online shopping.
When using a wireless connection at home, make sure it has WiFi Protected Access (WPA), WPA2, or WPA3 security standards instead of Wired Equivalent Privacy (WEP) security standards.
WEP is the most widely used WiFi security protocol in the world, but it’s also the least secure. This is due to evolving security standards and numerous security flaws discovered within the WEP standard. Fortunately, most wireless routers manufactured after 2005 support WPA2, and newer wireless routers support WPA3.

2. Limit what you share on social media

It has become increasingly clear to cybersecurity experts that social media is insecure. Facebook suffered a data breach in early April 2021 that exposed the personal data of more than 500 million users. Once this data is exposed, hackers and cybercriminals can use data like phone numbers, full names, location targeting, email accounts, and biographical information to commit fraud and identity theft.
With all of these risks, you may be wondering, “How can I protect my information online, especially on social media?” Your first step is to limit the information you provide and post to Facebook, Twitter, and other social media companies. While using social media is a personal decision and a great way to connect with people, it’s important to use these platforms responsibly.
Limiting what you share and post is a key step in making sure that both companies and cybercriminals don’t have access to your personal info. This keeps more of your data private and reduces the possibility of that information falling into the wrong hands.

3. Make sure your wireless connection is secure

Most free public WiFi connections, including those in coffee shops and shopping malls, have few if any protections in place, which is why you should use these wireless connections with caution.
While there is no harm in using these public WiFi connections for some light social media use or internet browsing, don’t use them for anything that requires your personal information, such as bank accounts and online shopping.
When using a wireless connection at home, make sure it has WiFi Protected Access (WPA), WPA2, or WPA3 security standards instead of Wired Equivalent Privacy (WEP) security standards.
WEP is the most widely used WiFi security protocol in the world, but it’s also the least secure. This is due to evolving security standards and numerous security flaws discovered within the WEP standard. Fortunately, most wireless routers manufactured after 2005 support WPA2, and newer wireless routers support WPA3.
Social Security Card

5. Always double-check email attachments

Email is one of the least secure platforms when it comes to your online information. This is because you can retrieve email when it’s sent from one email address to another over an unencrypted network. Email is also often stored on unsecured servers and devices, which makes it particularly vulnerable.
This is why financial and medical institutions don't send statements or medical records directly through email. Rather, they will let you know that a statement or medical record is available and then direct you to log into their secure online platform.

ALWAYS BE SKEPTICAL

It’s important to be suspicious of any email attachments, but especially if they come from an unknown email address. This is what is known as a phishing attack, and they’re often disguised as communication from a reputable source such as a bank or medical institution, or even the government.
The goal of these attacks is to steal sensitive data from you, such as credit card information or the username and password for your accounts with these organizations. If you open the email attachment sent from a phishing account, it will likely install malware on your system and send your information to cybercriminals.
The simple way to stop this from happening to you is to not open or download any email attachments unless you know exactly who the sender is. Even then, you can always send a separate email to that person to verify that they actually sent the attachment.

Summary

Online identity theft is becoming an increasingly common and serious issue, and it may only become more prevalent in the years to come if cybersecurity efforts can’t keep pace with the sophistication of cyberattacks. This makes it all the more important to know how to keep your personal information safe online.
To keep your precious data and info secure, it’s best to create stronger passwords and use a password manager to store them, limit what you share on social networking sites, make sure that your wireless network is secure, and never give out any personal information online or download any suspicious email attachments. If you follow these basic principles, you’ll reduce your chances of falling victim to a cyberattack.

About the Author

Daniel Horowitz is a contributing writer for HP Tech Takes. Daniel is a New York-based author and has written for publications such as USA Today, Digital Trends, Unwinnable Magazine, and many other media outlets.

Disclosure: Our site may get a share of revenue from the sale of the products featured on this page.

Disclaimer

Prices, specifications, availability and terms of offers may change without notice. Price protection, price matching or price guarantees do not apply to Intra-day, Daily Deals or limited-time promotions. Quantity limits may apply to orders, including orders for discounted and promotional items. Despite our best efforts, a small number of items may contain pricing, typography, or photography errors. Correct prices and promotions are validated at the time your order is placed. These terms apply only to products sold by HP.com; reseller offers may vary. Items sold by HP.com are not for immediate resale. Orders that do not comply with HP.com terms, conditions, and limitations may be cancelled. Contract and volume customers not eligible.

HP’s MSRP is subject to discount. HP’s MSRP price is shown as either a stand-alone price or as a strike-through price with a discounted or promotional price also listed. Discounted or promotional pricing is indicated by the presence of an additional higher MSRP strike-through price

The following applies to HP systems with Intel 6th Gen and other future-generation processors on systems shipping with Windows 7, Windows 8, Windows 8.1 or Windows 10 Pro systems downgraded to Windows 7 Professional, Windows 8 Pro, or Windows 8.1: This version of Windows running with the processor or chipsets used in this system has limited support from Microsoft. For more information about Microsoft’s support, please see Microsoft’s Support Lifecycle FAQ at https://support.microsoft.com/lifecycle

Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

In-home warranty is available only on select customizable HP desktop PCs. Need for in-home service is determined by HP support representative. Customer may be required to run system self-test programs or correct reported faults by following advice given over phone. On-site services provided only if issue can't be corrected remotely. Service not available holidays and weekends.

HP will transfer your name and address information, IP address, products ordered and associated costs and other personal information related to processing your application to Bill Me Later®. Bill Me Later will use that data under its privacy policy.

Microsoft Windows 10: Not all features are available in all editions or versions of Windows 10. Systems may require upgraded and/or separately purchased hardware, drivers, software or BIOS update to take full advantage of Windows 10 functionality. Windows 10 is automatically updated, which is always enabled. ISP fees may apply and additional requirements may apply over time for updates. See http://www.microsoft.com.

“Best All In One Printer” and “the easiest printer you’ve ever had to set up” from Wirecutter. ©2020 The Wirecutter, Inc.. All rights reserved. Used under license. https://www.nytimes.com/wirecutter/reviews/best-all-in-one-printer/

Get Marvel’s Avengers when you purchase HP gaming PCs with qualifying 9th gen or 10th gen Intel® Core™ i5, i7 and i9 processors. Redemption code will be sent out by email within 60 days of purchase. Limited quantities and while supply lasts. Offer valid thru 12/31/2020 only while supplies last. We reserve the right to replace titles in the offer for ones of equal or greater value. Certain titles may not be available to all consumers because of age restrictions. The Offer may be changed, cancelled, or suspended at any time, for any reason, without notice, at Intel’s reasonable discretion if its fairness or integrity affected whether due to human or technical error. The Offer sponsor is Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95054, USA. To participate you must create an Intel Digital Hub Account, purchase a qualifying product during the redemption period, enter a valid Master Key, and respond to a brief survey. Information you submit is collected, stored, processed, and used on servers in the USA. For more information on offer details, eligibility, restrictions, and our privacy policy, visit https://softwareoffer.intel.com/offer/20Q3-19/terms.

© 2020 MARVEL. © Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. Other names and brands may be claimed as the property of others.

The personal information you provide will be used according to the HP Privacy Statement (https://www8.hp.com/us/en/privacy/ww-privacy.html)