Some security procedures are common knowledge. No need to remind me to install that latest update on my computer, right?
Others are less obvious. Lock your computer every time you wake up? Unless you live alone, you should. If you are lazy this is the easiest way.
You wouldn’t think it would be wrong to leave Bluetooth connected 24/7 on your phone. Find out why, and what to do if you can’t live without your AirPods.
Learn more secrets to keep you safe that only tech experts know.
1. See if someone has secretly obtained a copy of your email
I always get a call national radio program From people worried that someone is watching everything they do.
One of the first steps I recommend is making sure your inbox is locked. Here are the steps if you notice or suspect a normal login.
- Log in to your email and go to your account or security settings.
- You have the option to view recent login activity or login history. Labeled as “Recent Activity”, “Security”, “Login History”, etc.
- Pro tip: Do you use Gmail?[最後のアカウント アクティビティ]next to[詳細]Click the link.
- Check the list of recent logins. See something that isn’t you or one of your devices?
If you find an unknown location or a device that doesn’t belong to you, act quickly. Change your password and make sure two-factor authentication is turned on. Log out all devices from your account.

2. Make sure your printer hasn’t been hacked
Like computers, printers are treasure troves for hackers. why? Printers often store copies of printed documents. Cybercriminals may obtain copies of confidential information such as financial records.
Here are three signs that your printer has been hacked.
- The printer begins printing a blank page or series of characters.
- I notice a print job that I didn’t start.
- Printer settings changed — it’s not you.
what should you do
- Unplug the printer. Press and hold the reset button, usually on the back or bottom of the printer.
- While still holding the reset button, reconnect the printer and turn it on. After about 20 seconds, the light will flash to indicate completion.
Running out of ink in the middle of printing is the worst. Use these secrets to save money on ink.
Kim Commando
Sound like a tech pro even if you aren’t! Award-winning and popular host Kim Commando is your secret weapon. listen 425+ radio stations or get the podcastand join over 400,000 people Receive a free 5 minute email newsletter each day.
3. Your iPhone Has a Hidden Location Tracker
We recommend that you take a look at Location settings on your phone. This goes a long way to shutting down a lot of GPS tracking.
Why does your cell phone tell you how long it will take you to the office or tell you when you’ll arrive at the grocery store when you’re driving to run errands on Saturday morning? is part of
Apple says the feature exists so your phone can learn where things are important to you and offer personalized services like traffic routing and better photo memories.
Access and shutdown methods are as follows:
- open the iphone settingTap. Privacy and security.
- select location services.
- scroll down and tap System service.
- scroll until you see important place Tap it.
If you don’t want your iPhone to track your location,[重要な場所]Slide the toggle next to left Disable the setting.
Want to wipe this list of important places? Please follow the steps here.
4. If you lose your phone, you can wipe it
The very thought of your phone being in someone else’s hands is creepy. Imagine a stranger combing through your photos, videos, apps, conversations, and browser tabs.
So what if your cell phone goes missing? Even if that phone never comes back, you can still take steps to protect your information.
To remotely erase your iPhone:
- Open iCloud.com/find and go to Find my iPhone feature.
- Select your lost phone, Erase iPhone.
To remotely erase your Android phone:
- go to android.com/find Sign in to your Google account. Select your lost phone to see information about its location.
- When prompted, select Enable lock and erase.
- select Erase device Erase that data.
For more ways to find, backup, or erase your phone, check out our guide heree.
5. The app craves you to share juicy details
Social media companies are desperate to get your contacts’ birthdays, photos, names, email addresses, and more. They say it’s a useful tool for finding friends, but their information isn’t yours. They decide where to share.
Companies create so-called shadow profiles from their address books. Even if they aren’t on their platform, they can learn a lot from the people you know. despicable.
How can you make a difference? Don’t allow apps to access your phone’s contacts. Check which apps you have access to and turn them off. And always be careful and stop sharing information without permission. genuine article benefit you.
Even your phone number is powerful in the wrong hands.