top of page

Protect yourself on social media, prevent personal data exploits, identity theft, doxxing,  and revenge porn. What to do if your data is compromised, and how to fight back if you are under attack.

PRIVACY RIGHTS

UNDERSTANDING DIGITAL PRIVACY

Image by Dan Nelson

Electronic Frontier Foundation: https://www.eff.org/issues/privacy

​

How to read a privacy policy: 

https://oag.ca.gov/privacy/facts/online-privacy/privacy-policy

​

What is revenge porn? Know your rights: 

​

Nonprofit organizations that offer assistance and resources in regards to revenge porn:

PHISHING

What is phishing and how do I avoid it?

Phishing is a type of attack carried out in order to steal user IDs, passwords, credit card information, personal health information (PHI) or personal identification information (PII) information. Phishing is most often sent in the form of malicious emails pretending to be from credible sources such as financial organizations or internal IT departments.


How can I protect myself from phishing attack?

  • Check the email address. If it is not from a reliable source, delete the email.

  • Do not click the link in the email unless you recognize the email.

  • Do not send any password in an email.

  • Check the certificate on the website before entering any sensitive data.

​

How do I identify a phishing scam?

Never give your personal information in an email. No institution will ask for personal information by email. Any email that asks for personal or sensitive information should not be trusted, even if the email has recognizable logos or looks like it comes from an official source (e.g., the IRS, your employer, your financial institution, etc.).


What is Hover to Discover?

Hover to Discover is a technique to understand where a link is going to before it is clicked on. Hover your mouse cursor over the link and at the bottom of the screen, it will show where the link is going to. If it does not match where you think it should, delete the email. Look at it closely as it may just be one letter off. This technique is very helpful at thwarting phishing scammers.

PROTECT YOUR SOCIAL MEDIA ACCOUNTS

Image by Glen Carrie
bottom of page