Security Best Practices As You Work From Home

Security Best Practices for Work From Home

The COVID pandemic has been a wake-up call to many people that are working from home for the first time. This means that it’s more important than ever for you to stay vigilant about your online security as you access corporate data from home or rely on new apps and processes that you’re not familiar with.

With the need for additional online security for at-home workers, we’ve put together a guide for you. Here are a few tips to help you work from home safely.

Consider Security Software

There are various types of security software that you can use to help protect your systems, data, and privacy. 

Two popular options include anti-virus programs which will scan your system for viruses or malware. Also, firewall applications that monitor the traffic between your computer and other devices on the internet.

Many security software applications also offer features to protect your privacy, such as the ability to delete your browsing history and cookies or to encrypt your files so that they cannot be read by others. 

It is important to keep in mind that no security software can provide 100% protection, but using a combination of different types of software can help reduce the risk of a security incident.

Utilize the Tech Toolbox of Your Company

If you’re working from home, one of the first things you should do is familiarize yourself with the resources provided by your company, whether that’s remote working software, security apps, hardware, etc. Each company has its own set of tools and it’s important to be aware of what they are to be productive while working remotely.

Also, be sure to check with your IT department about any specific security measures that need to be taken when working remotely. It’s important to follow your company’s procedures because the effectiveness of the security measures put in place will depend on the security procedures being followed.

Maintain Contact with Your Employer

Even if you are working from home, it is important to maintain contact with your employer. This can help ensure that you’re meeting all your deadlines and staying on top of any changes or updates, particularly changes in work from home policy or security policies. As more people work from home security measures will likely continue to evolve.

By communicating effectively, both you and your employer can avoid any potential issues.

Improve Your Home Security

In addition to your online securing, it’s important to have physical security at home. There are many easy ways to do this such as making sure your windows and doors lock properly, installing a home alarm system, and even security cameras to keep you safe.

Ensure Zoom Meetings are Safe

Zoom meetings are a great way to stay connected with coworkers and clients. But it’s important to make sure they are safe. Don’t share Zoom meeting info or account credentials with anyone outside of your company, unless they are specifically required to be in the meeting. Zoom frequently updates their software, so make sure that you’re always up-to-date for maximum security.

Always Update Your Software

One of the most important things you can do to protect your security when working from home is to make sure all your software is up-to-date. This includes everything from your operating system to your web browser and even your office applications. By keeping your software current, you’re closing any potential security loopholes that could be exploited by hackers.

Consider Using a VPN if Necessary

If you work from home, it’s important to take precautions to keep yourself and your data safe. One way to do this is by using a virtual private network (VPN). Many companies will require you to use a corporate VPN to be able to connect to the company network or data, but some will not. In that case, using a personal VPN might be a great option for enhancing your security.

A VPN creates an encrypted connection between your device and the internet, making it harder for someone else to spy on your traffic or steal your information.

Beware of Phishing Emails from Scammers

Phishing emails are where scammers pretend to be someone you trust to get confidential information. Emails can appear to come from your bank, credit card company, or other service providers, even family and friends – but they don’t. Therefore, you need to beware of such emails and not click on any links or open any attachments that you don’t recognize.

Avoid Using Public WIFI

If you decide to get out of your home office and work from somewhere like a coffee shop, be sure to avoid public WIFI networks. Public WIFI networks are not secure and give hackers an open invitation into your computer, smartphone, or mobile device. 

This can expose important data like bank account numbers, credit card details, and login credentials for work-related websites such as email and online banking. If you have to use a public WIFI, use a VPN (Virtual Private Network) to create a secure connection between your device and the internet. 


These tips are a great start to making your work from home experience a lot more secure. What other tips do you have? Leave them in the comments below!

What Does Your IP Address Reveal About You?

What kind of information does your IP address reveal about you?

What is one thing that distinguishes you from every other person on the planet? Not your character, not your voice, or your appearance. It is your fingerprint. No two humans have the same fingerprint. Social security numbers and dog nose prints are also unique. But… did you know that your computer, your phone, and your tablet all have a semi-unique identity? This identity is called an IP address. 

Just as your biometric or your social security number reveals all your information, your IP address can also be used to gather certain information about you. Your location, network information, and more can be looked up just using your IP address.

What is an IP Address?

IP stands for Internet Protocol. The Internet Protocol is a set of rules that oversees the kind of information that is communicated over the internet or through a local network. Merging this definition with the word “address”, an IP address is used to recognize the device that is sending information through the internet. As you already know, all your activities on the internet are communicated between your phone and whatever site you are visiting. 

Look at it his way, you are sending a child on an errand to meet an old friend in another town. The child does not know the address of your children and the child does not know his way back home. So you write the address of your house and the address of your friend’s house and give it to the child to keep. This address will help the child find his way to your friend’s place and find his way back home after delivering your message.

From the illustration above, your address, in technological terms, is your IP address. Your phone, your computer, your laptop, your tablet, all have an IP address that differentiates them from other computers, routers, or websites that are accessing the web. 

IP addresses are usually a set of four numbers, each separated by a dot. These numbers usually range from 0 – 255. An ideal IP address will come anywhere between to An example of an IP address is This example could be the IP address of your colleague at work or your neighbor, who knows?

Before any routine or device can have access to the internet, an IP address will be needed. This IP address is allocated by the Internet Assigned Numbers Authority, a member of the Internet Corporation for Assigned Names and Numbers (ICANN) in the United States. 

What Does The IP Address Reveal About A Person?

If you want to know your IP address, we have a handy page for that. The search result will show you the IP address you are using to access the internet. If you are not using your mobile network, you will get the IP address of your device. However, if you are connected to a Wi-Fi network or a public router, your search result will show the IP address of the network that you are connected to. 

Now that you know that your IP address is public information, naturally you want to know what your IP address reveals about you. Firstly, your IP address provides details about your location. Not your house address, not your street address, just your geographical location. An IP address will not reveal your name or your date of birth. Sometimes, the ZIP code of your location can be gotten through your IP address. This means that when you go to a city with another ZIP code, your IP address changes. 

Every time that you visit the internet, everywhere that you go, everything that you do, the internet takes record of it. It is like signing an attendance sheet but your IP address is your signature. Every picture or video that you watch or like on social media, every message that you send in chatrooms, every news you read on blogs, every mail you send or receive, your IP address is stamped all over it like a tattoo. 

It is clear now that even if you use the internet in a secluded place, your activities can still be traced back to you. However, your IP address is private unless someone steals it. This person can pick up your phone and search for your IP address on Google. Authorities can contact your Internet Service Provider to request your IP address. Cybercriminals can also get access to your IP by hacking into your network. 

What Else Can An IP Address Be Used For?

There are a lot of people who might be interested in knowing your IP address. Advertisers want to use your IP address to improve their marketing efforts and try to target you individually. Subscription services like Netflix use your IP address to check if you are accessing their content from a restricted area. Your employer can also use your IP address to check what you are doing with the office internet. These are just some of the people who might need your IP address for a harmless reason. 

Cybercriminals can use your IP address to stalk your online activities. They can lure you to use social media to give them your IP address through social engineering. Hackers also used people’s IP address to mask their IP and download illegal content. They download uncensored content relating to things like terrorism or child pornography with your IP address. If traced, it will lead to you – the innocent one.

Your IP address can be used to track you down, hack into your device, and attack your network. A Distributed Denial of Service (DDoS) attack can be used to disturb your service, cause it to shut down, and seize the opportunity to attack the system.


Your IP address is all that an internet fraudster needs to get your data and cause you so much more harm than you can imagine. This is why it is important to protect your real IP address with a good VPN. When you use a quality VPN like Ghost Path, you will be able to hide your IP address and keep your personal information private.

How to Stop Email Tracking

How to stop images from auto loading in email

Email tracking is a big problem in the online world. It makes it so easy for spammers and other malicious people to send you emails. With email tracking, these people can see when an email has been opened and how many times it has been read. 

This information is used by marketers to improve their campaigns, but it can also be used by scammers to trick you into clicking links that lead to sites with malware or phishing schemes. If you want your online privacy back, then we recommend turning off email tracking on your email account.

But what are some of the ways you can do that? Unfortunately, most people don’t have any idea how they can stop email tracking, but that’s we’ll advise you today in this post. We’ll talk about how you can stop email tracking and be safe from any malicious attacks from the web.

How Do Emails Get Tracked?

One of the most popular ways people track emails is through pixels. A small image, which is the size of a single pixel, is normally attached to the end of the email. Therefore, when your email loads the picture, the email service you’re using retrieves that message from the sending server.

The server is then able to log when your email service loaded the image to understand when, and if, you opened the image or not. Other information such as your IP address can also alert the server to your location when you open the email.

In this post, we’ll go over the settings on how to stop email tracking in several email accounts.

How to Stop Email Tracking in Gmail

Here are the steps to locking down your Gmail account so that images aren’t being loaded and spammers aren’t able to see if you’re opening messages.

For desktop or browser Gmail access:

  1. In your Gmail account, click on the gear icon located in the upper right corner.
  2. Select the “General” tab
  3. Scroll down to the “Images Category” and then select “Ask before displaying external images”
  4. Scroll down
  5. Click “Save changes”

If you’re using the Gmail Android app, here are the steps to follow:

  1. Open the email app on your mobile device
  2. Tap on the menu (3 horizontal lines) in the upper corner
  3. Scroll down and select “Settings”
  4. Tap on the account that you wish to alter
  5. Scroll down and then choose “Images”
  6. Select “Ask before displaying external images”

How to Stop Email Tracking in Yahoo!

Many people use Yahoo! mail. Scammers and email marketers know about this, which is why they use tricks to track emails. Here’s how you can stop your emails from being tracked as a Yahoo user.

  1. In your Yahoo email account click the gear icon in the upper right corner
  2. Click “More Settings”
  3. Under the “Show images in messages menu” click on “Ask before showing external images”
  4. You’re all done!

How to Stop Email Tracking in

  1. In your AOL email account, select “Options” and then “Mail settings”
  2. Choose “General”
  3. Under the “Reading category,” select “Hide images in the mail from unknown senders”

How to Stop Email Tracking in iOS Mail

When it comes to stopping email tracking in iOS mail, things are a bit different. Check out the settings to follow below:

  1. Open settings on the app
  2. Scroll down and then select “Mail”
  3. Under the messages, click off on “Load remote images

How to Stop Email Tracking in Microsoft Outlook

If you’re using Microsoft Outlook, it’s relatively easy to stop your emails from being tracked. All you have to do is follow the steps below:

  1. Open the Outlook app
  2. Select “File” and then “Options”
  3. Select the “Trust Center”
  4. Click “Trust Center Settings”
  5. Select “Don’t download pictures automatically in HTML email messages” or ensure RSS is checked.
  6. You’re good to go!

Microsoft Outlook for Mac

  1. In your email account, go to “File” > “Preferences” > “Reading”
  2. Select “Automatically download images from trusted contacts”
  3. You can also select “Disable all automatic download of images”

How to Stop Email Tracking in Apple Mail

Here’s how you can stop email tracking in Apple mail:

  1. Log into your email account
  2. Select “Mail” > “Preferences”
  3. Click on the “Viewing” tab
  4. Go ahead and uncheck “Load remote content in messages”

Aside from the settings above, you can also use an email client to block remote images by default. There are several applications that you can utilize such as Thunderbird, which allows you to download embedded content on an individual basis. It also only allows images from some of the contacts that you trust to avoid sending hidden code in their pictures.

Using Browser Extensions for Improved Email Privacy

If you prefer using extensions to stop email tracking, there is one reliable extension we can recommend. This extension is the PixelBlock for Google Chrome. PixelBlock helps to block pixel trackers and also notifies you in case of any tracking attempts.

Another option to consider is the Trocker for Mozilla Firefox and Google Chrome. This web browser also functions similarly to the PixelBlock web browser. 

Therefore, both of these extensions can provide you with high-quality and excellent security in your email and prevent any email tracking attempts by spammers or email marketers.

How Can You Tell if Your Email is Being Tracked?

Most of the server-side trackers tend to send their email or even website URL together with the email. Therefore, you can inspect it to check for tracking. 

To find out whether your email is being tracked, simply head over to your email service and then look for the “Show original message option.” 

It will show you the server-side information. This is how you’ll know whether your email is being tracked or not.

Your Take?

Do you have any additional tips for stopping email tracking? If so, leave them in the comments!

Most Popular Passwords in 2022 & How To Avoid Them

Most Common Passwords for 2022

Every day, people register accounts on new websites and applications. Unless you are subscribing to a newsletter or filling an online form, you will need to come up with a password to secure your account. This password must be secure and at the same time easy to remember. Using easy-to-remember passwords are recommended so that you don’t lose access to your account. A password that is secure and at the same time easy to remember is quite difficult to create. You need to meet certain requirements which include using Capital letters, small letters, and special characters.

What are Some of the Most Common Passwords Today?

When it comes to choosing a password, some people do not care about security, all they want is a password that they can remember, even if they have amnesia. Over the years, some passwords have been consistent and they have formed the most popular passwords on the internet. As you would have guessed, the more popular a password is, the less secured it will be. Hence, the most popular password is the least secure password.

So, what is this most popular password? Everyone wants to set a password that they can remember without racking their brain. The easiest word to remember when a system asks you for your password is “password”. True right? Your password, staring right at you waiting for you to use it. Surprisingly, this is not the most used password. Then what is it? If you are trying to create a password, the chances that you are using a qwerty keypad – whether on your keyboard or mobile device – are very large. When people look at their keyboard, they somehow think that “qwerty” will be a very secure password. And so many internet users use “qwerty” as a password to their account. But that still isn’t the most popular password.

Multiple kinds of research have helped to show that the most used password in the world is “123456”. This easy password has been consistent at the top of the list for many years. Other passwords that have been on this list include “1234567” & “12345678”, “12345”, and “picture”. Another word that has been used more often in the past years is “senha”. Sounds unintelligible but senha is the Portuguese interpretation for password. Some hopeless lovers even use phrases like “Iloveyou” for their passwords. All of these passwords are easy to guess and accounts that these passwords are used for can be easily hacked.

How Passwords Can Be Compromised

Every day, innocent people’s accounts are hijacked because someone somewhere was able to gain access to the account and change the details. Most of the time, it is almost impossible to regain access to these accounts unless you have certain security measures placed on the account. Generally, there are three major ways that hackers use to compromise a person’s password.

  1. Guess: This is the most common method of compromising a person’s password. People, especially adults, use easy passers like some of the ones listed above. When people try to hack into an account, the first thing they do is to check if the password belongs to the category of the ones mentioned above.
  2. Crack: When a password cannot be compromised by guessing, the next most conventional way of getting the password is to crack it. Cryptographers and other software geeks have tools for compromising different passwords depending on how secure that the passwords are.
  3. Stealing: This method is highly deceptive and requires less brain work. You only need to gain access to a file or note where the password has been stored and steal it without the knowledge of the owner.

How to Avoid Using Common Passwords

Employees who use easy passwords can be used as a trojan horse to hack into a company’s security system. To avoid this security breach, many companies have employed the use of Multi-Factor Authentication(MFA) and Single Sign-On (SSO) services to enhance their security. However, there’s a limit to what the company can do to stay secure. A bulk of responsibility still lies in the hands of the employees.

Here are some ways that the use of common passwords can be abolished in personal and business spaces.

  1. Password Managers: Applications like 1Password or LastPass can help employees to manage passwords and reduce password-related security risks. A password manager helps people to create and store secure passwords. These passwords consist of mixed letters (capital and small letters), numbers, and other special characters. Employees only need to remember only the password to their password manager to get access to all their secure passwords.
  2. Multi-Factor Authentication: Multi-Factor Authentication (MFA) takes longer than regular passwords. You have to answer security questions or take confirmation tests before you gain access to an account. With MFA, a code might be sent to your phone or you can be asked a personal question that no one else knows the answer to.
  3. Password Generators: A password generator will create a random, highly-secure password for you. We have a great password generator here at Ghost Path that is free for you to use.
  4. Security Education: Companies can create seminars or public lectures to educate their employees and people who use their services on how to create a secure password. They can also let them know about the risks involved when their account is hacked.
  5. Unrelated Passwords: It is common for people to use something that relates to them when they want to create a password. Some people use their phone numbers, others use their date of birth, pet name, birth city, and so on. These passwords are easy to guess when the person trying to have your account is someone who knows you. As much as possible, try not to use any password that will lead back to you in any way.
  6. Lengthy Passwords: The shorter a password is, the easier it is to hack. Even if it contains special characters and numbers. Aim for longer passwords when they are accepted, anywhere from 12 characters and up.


The internet is a wild and very public place, and passwords are the things that keep us private. Using passwords that are easy to guess means that any random person can access your private files and even steal your identity. Companies should incorporate password tests in the account creation process so that users can see how weak or strong a password is before they use it. To improve data security, password policies need to be upgraded and people need to learn that it is important to have a secure password.

Automatically Deleting Your Google History Data

How to automatically delete your Google account history

Google famously keeps very meticulous records of all your online activity. If you have a Google account (such as Gmail or a business Google account) and stay logged into that account then Google is definitely tracking what you’re doing.

There are undoubtedly some legitimate uses of this data, but there’s no reason that it needs to be stored for any significant period of time. It turns out that Google does give you the option to have your data automatically deleted form your account after a chosen period of time.

What Information Does Google Allow You to Auto-Delete?

Google allows you to delete 3 broad categories of your historical data: Web & App History, Location History, and YouTube History. Once you get into the Google Account settings and get to this area you can click on the individual data categories to see examples of the data that you’ll automatically delete.

The most obvious example is your actual Google search history. There’s no reason for Google to (or for you to allow Google to) keep information on what you searched for 3+ years ago. That’s highly unlikely to provide any value to you now or in the future.

How to Automatically Delete Your Google Account History

It’s a rather simple process. Surprisingly simple, actually.

A very important note here. If you use multiple Google accounts, like me, then you’ll need to go through this process for each of your accounts. 

First, sign into the Google Account that you want to delete the history for.

Then, go to your Google Account settings. If you’re in Gmail, click your profile pic in the top-right corner and then select “Manage Your Google Account”.

Then click on Data and Personalization.

Click on Data and Personalization in your Google Account

In the Data and Personalization screen you’ll see the area where you can choose your data retention settings.

Click on each of the 3 sections and you’ll see a screen similar to this:

This is where you can delete your past history, but most importantly, set it to automatically delete. Click on the Auto-delete link to choose the settings you want to use.

Feel free to choose whatever makes sense for you and your particular situation. Personally, I would recommend deleting anything older than 3 months for most people. If you’re a very heavy user then maybe you would want to stretch that to 18 months. I wouldn’t go longer than that.

It’s the same process for deleting the YouTube and Location history.

That’s it! You now have a little bit more privacy than you did before.

How To Use Ghost Path VPN to Watch Out of Market Sports

Watching out of market sports is one of the best use cases for a VPN service. Today’s tutorial is a quick guide to using Ghost Path to watch your favorite sports teams even though you’re not in their local viewing market.

The Process

Typically, when you want to watch your team’s games you’ll want to connect to a VPN server in their local market. This goes for all major sports in the US, and likely elsewhere in the world. Ghost Path has great coverage across the world, but especially in the US. You should be able to find a server very close to the market you’re interested in.

Decide which servers you want to use

If you’re using the Ghost Path client then you can choose servers directly in the client. If you’re using a third-party app like OpenVPN, Viscosity, or Tunnelblick, then you’ll want to download ready-to-use configuration files from our VPN servers page.

Connect and Test

Once you’ve got the servers determined and configured in your VPN client, you’ll want to connect to those servers and verify that you are being seen in that location. An easy way to test is to check your IP address and see if you show as being in the location you’re targeting. If you are where you want to be, then you should be good to go.

If not, it could be that the location provider doesn’t have updated records of our IP address and it’s datacenter location. If we have multiple VPN servers in that city (which is fairly common) then you’ll want to try those.

Pro-tip: If you can’t get the VPN connection to work to your team’s home market, then try the opponent’s home market. Many times a broadcast will be shown in both markets. 

Here’s a short tutorial using Viscosity to connect to a few different cities.


Using Ghost Path with Tunnelblick

Video tutorial for configuring Tunnelblick

Tunnelblick is a popular free OpenVPN client for Mac. It’s been around a long time, is still being updated, and is a breeze to use. This post has a video tutorial that walks you through the process of setting up Tunnelblick so that you can quickly and easily access Ghost Path’s VPN servers.

How to install and configure Tunnelblick to work with Ghost Path servers

Here’s the full list of Ghost Path VPN servers. You can click the OpenVPN link for any of those servers to download a pre-config’d OpenVPN file to easily import into Tunnelblick.

Using Ghost Path with Viscosity

Video tutorial for configuring Viscosity

Viscosity is one of the absolute best VPN clients for Mac (and Windows). It’s very popular and I use it personally for a variety of reasons. I’ve put together a handy guide to help you get started with Viscosity.

Viscosity is not free, but it does come with a 30-day trial and then it’s just $14 for a license. Well worth it imo.

How to install and configure Viscosity to work with Ghost Path servers

Here’s the full list of Ghost Path VPN servers. You can click the Viscosity link for any of those servers to download a pre-config’d Viscosity file.

New VPN Server in Bursa, Turkey

VPN Server in Bursa, Turkey

The latest Ghost Path VPN server location is up and running in Bursa, Turkey. The Bursa VPN service is the latest addition to our extensive presence in Eurasia.

Ghost Path VPN Servers

The Bursa VPN server should be incredibly fast for you if you’re in eastern Europe or the middle East.

Ghost Path now has 125+ operational servers in 52 countries providing our customers with hundreds of anonymous IP addresses. Here’s an up-to-date list of all of our VPN servers list. With Ghost Path, you have the freedom to browse the world wide web using any of our remote servers. Watch for more VPN servers as we continue to grow.

How To Use The Bursa, Turkey VPN Server

Open the Ghost Path VPN client. If you’re currently located in Turkey the Bursa gateway will automatically be in your closest Locations connection folder.

If you happen not to be in Turkey but still would want to connect to the new server in Bursa: all you need to do is go to the locations tab of Ghost Path’s app and simply create a new locations folder. Drag the Belgrade server to that folder and you’re good to go!

About Ghost Path VPN

Ghost Path is both secure and pocket-friendly. We take your privacy very seriously and never log your data. Ghost Path is committed to consistent improvement and expansion; give our services a try with a 30-day money-back guarantee.

Everyday Best Practices for Better Online Privacy and Security

Everyday Privacy and Security Tips from the Experts

We’re a VPN provider, so taking security and privacy seriously is in our DNA… we live and breathe it every day.

But we know that not everyone spends as much time thinking about these things as we do. So we thought it would be a good time to take a step back and look at some very specific things that everyday users could do to increase their privacy, security, and online safety.

To do that we’ve solicited the help from online privacy experts, cyber security experts, and enthusiasts. Here are their recommendations.

Pay Close Attention to What You’re Doing Online

The objective of a cybercriminal is to get you to download programs or apps that carry malware or try to steal information. Malware can be disguised as a popular game to something that checks traffic or the weather.. Don’t download apps that look suspicious or come from a site you don’t trust.

Daniel Carter of Zippy Electrics


The best tip I can give is to always read carefully before clicking anything. Don’t just brush off pop-up warnings and anything that comes into your screen. This is because you might click a malware or you might miss something important.

John Howard from Coupon Lawn


Avoid, or be extremely cautious, when engaging with “free” or “open source” download sites, whether they be for software, music, etc.

Michael Wallstrom from Philantech3


Email Safety

An email alias allows you to use a random identifier email every time, which in turn will forward it to your mailbox, and the other party won’t know your actual email.

Nirmal Sarkar of


Have a secondary email address. You will come across numerous situations where you have to provide an email address. Keep the main one private and have an extra one for online services.

David De Haan from Standup Paddleboards Review


The average person should consider using a secure email service like ProtonMail. The cornerstone of your online privacy plan should be an email account with end-to-end encryption, which you can then use to sign up for additional services such as a VPN, etc.

Neil Roach from Boxroom Office


Don’t Give Out Personal Information Online

Always be a skeptic especially when sites ask for your details especially those which are not meant to be shared online like your bank account, birthday, your middle name, and your personal identity number.

Lewis from Skill Scouter


Check whether the company sells your personal information by searching the Privacy Policy for the words “sale”, “sell” or “selling”. Don’t use platforms that sell your personal information.

Donata Kalnenaite from Termageddon


If something looks phishy, wait and take a look at it in an hour or so. A lot of these phishing messages are trying to get you to act quickly without thinking. Have a plan on how you’re going to handle financial issues (like, above, calling a verified bank ph # or going into your bank).

Paul from WhiteCanyon Software


Try Privacy-Focused Services

Rethink the choice of operating systems if you’re concerned about privacy—switching to a security-focused Linux distribution might make more sense. Choose privacy-first software and services. Wherever possible, opt for a service (Signal over WhatsApp), browser (Tor), OS (Qubes OS), etc. that is created with maintaining privacy as a primary goal.

Lumena from SectigoStore


Use a search engine that protects your privacy, such as DuckDuckGo.

Kurt Hoeft from EasyIT


Google Chrome’s Incognito window isn’t as private as you may think. For better security, you can use a secure browser like TOR or modify the privacy settings in FireFox to surf the web. Firefox offers many privacy protection features and customization options.

Casey from SectigoStore


Advertisers can also collect loads of information about you through the use of cookies (that’s why you need to opt-in to that so many times when visiting websites). instead of opting out, which will render some websites unusable, try installing an add-on that can take care of this for you on an individual basis, although there will be a bit of legwork involved. A few to think about are Cookie AutoDelete, Cookies Exterminator, or Vanilla Cookie Manager.

David from National Air Warehouse


My biggest tip for online privacy is making sure you use a privacy focused browser. Privacy focused browsers block ad, social, and analytics trackers that follow you around the web. They also help mitigate fingerprinting practices, which fill-out scarily accurate shadow profiles of users.

Ashley from AvoidTheHack


If you’re looking for a safer, more privacy-focused browser alternative to Chrome, we’re recommending Brave.


Password Security

Use a password manager so you have strong, unique passwords (LastPass, Dashlane and 1Password are great examples).

Eric Ohlsen from Paper Trail Investigations


I always suggest using a password manager like LastPass or Bitwarden to automatically create different passwords for every site.

Daniel Worsley from LocalCoinSwap


Use a VPN

We’re pretty partial to this recommendation, but we believe that anyone that sends sensitive information across the internet (that’s everyone, btw) needs to be using a VPN. This applies to phones, desktop, even your home wifi routers.


Your Recommendations?

What would you add to this list? Leave your thoughts in the comments and we’ll update this post as new information comes in.