Safeguarding Digital Information

Technology can be exciting, confusing, fun, and sometimes nerve-racking. You can’t hide from it because it’s everywhere. This article deals with Safeguarding Digital Information.Online Safety and Security. Disclaimer, I’m a private investigator, not a licensed computer repair technician or IT specialist.
Private investigators receive and maintain sensitive information, or personally identifiable information (PII) that includes social security numbers, driver’s licenses, addresses, phone numbers, names, medical records, legal documents, and financial records. Accordingly, private investigators are legally responsible for the care, custody, and control of sensitive information in their possession. No one wants their personal and confidential information made public.
Safeguarding Digital Information
Desktop computers, laptops, tablets, and smartphones collect and store all types of information. Devices that connect to the internet, are vulnerable to exploitation by hackers. That’s why it’s important to take extraordinary steps, using all available means to safeguard your information.
- Desktops, Laptops, Tablets, and Smartphones. Update your operating system (OS) regularly. Commonly, when an update becomes available, your system will display a message saying so. Microsoft Windows, Apple’s macOS, Linux, Google’s ChromeOS, Apple’s iOS, and Google’s Android are popular operating systems used on desktops, laptops, tablets, and smartphones. OS updates include security patches, bug fixes, new features, and software upgrades. Updates help reduce and prevent various threats from damaging your device and stealing your information. Don’t ignore them. Always follow your operating system recommendations and guidelines provided by the developer.
- Antivirus Software, or Application. Antivirus can be installed on desktops, laptops, tablets, and smartphones. Antivirus is designed to protect your device(s) against hacking attempts and malicious code (malware). Once installed, antivirus scans all applications, files, emails, messages, and web browsers for malware (viruses, Trojan horses, spyware). If the antivirus detects malware, a warning will appear on the device’s display; it will then remove the malware or quarantine it. Antivirus operates proactively (always on) in the background of your device. Before you install antivirus on your device, check the OS guidelines first. For example, Apple doesn’t recommend using antivirus, but Microsoft does. More important, don’t download or install a “free” version of antivirus; get a paid one that’s verified and trusted by the OS developer. Do your homework and purchase an antivirus that experts recommend. Protecting your personal and confidential information is worth the expense. Always follow your operating system recommendations and guidelines provided by the developer.
- Firewall. A firewall protects your device from incoming and outgoing data with the potential for causing damage. Windows, ChromeOS, Linus, macOS, and iOS have default, or built-in firewall applications. Android devices do not have a default, or built-in firewall. Consequently, a Third-party app has to be purchased. Review your OS guideline’s to understand how the firewall works and how to fine-tune it. For example, Apple’s macOS firewall is not turned on by default; the user must turn it on. Always follow your operating system recommendations and guidelines provided by the developer.
- Virtual Private Network (VPN). VPN, application, or software, directs your internet traffic through secure servers, masking your IP address and encrypting the data your device sends and receives. A VPN helps block unwanted ads, stops trackers and cookies, prevents data leakage, and defends against malware. For many Americans, online privacy is important. Don’t use a free VPN; get a paid one that’s verified and trusted by your OS developer. Buy a VPN that’s reputable and well reviewed. Always follow your operating system recommendations and guidelines provided by the developer.
- Secure Email. Google Gmail, Microsoft Outlook, and Apple iCloud Mail are older, widely used commercial email apps. Time and popularity often work to the benefit of hackers. All three have suffered large-scale data breaches. There’s good news, however. Newer email apps, including the ones named above, are substantially more secure utilizing end-to-end encryption. Some email apps feature zero access encryption, whereby the app developer can’t read your emails. Google, Microsoft, and Apple retain email encryption keys, which means they’re able to read anyone’s email. Secure email apps offer a better option for privacy-conscious individuals and security minded businesses. Cost equals the level of security you are looking for. Always follow your operating system recommendations and guidelines provided by the developer.
- Encrypted External Hard Drive. Going the extra mile can make a difference. Moving your important files, folders, system back-up’s, hard drive copy, and other items, to an encrypted external hard drive, is an expert move. By taking this action, you prevent internet and WiFi access to those items. In the event your desktop operating system is hacked into, those items will be unaffected. Simply attach the external drive when you need to access the items. To be effective, this must be done every time you connect the drive to your system.
Recommendations, Suggestions, and Advice.
I don’t endorse any product named herein, I don’t receive compensation for any product named herein, I don’t guarantee or warranty the reliability or quality of any product named herein. Readers are strongly encouraged to research and evaluate each product based on its merits and their personal needs. Readers should always follow the operating system recommendations and guidelines provided by the developer.
Antivirus and Firewall Software, or Application-Paid
Bitdefender Plus, Norton Plus, G Data, McAfee, Webroot, Intego, and Malwarebytes.
Virtual Private Network (VPN)-Paid
Proton VPN, NordVPN, ExpressVPN, Surfshark VPN, and Intego VPN.
Secure Email-Paid
Proton Email, PreVeil, StartMail, Private-Mail, and SecureMyEmail.
Encrypted External Hard Drive
You can purchase this item anywhere. I recommend a minimum encryption of: FIPS 140-2, Level 3. Choose a storage capacity that suits your needs.
Check if your data, or information was part of a data breach and is now found in the deep web.
https://haveibeenpwned.com See if your email(s) was affected by a data breach, or check the validity of a website.
https://cybernews.com/personal-data-leak-check/ See if your email address, phone number was affected by a data breach.
https://scamalytics.com Check an IP address
https://cleantalk.org/blacklists Check an IP address for complaints, or if it has been blacklisted.