“Great things are done when men and mountains meet.” William Blake.
Congratulations and well done!
We’ve covered a lot of ground together. You’ve implemented your strategy for backup and recovery, password management, anti-malware protection and full disk encryption. Automatic updates are enabled for your operating systems and applications. You’ve taken steps to manage your privacy permissions and understand secure file deletion. And along the way, you’ve learned how to freeze your credit report, avoid getting scammed, tighten up your privacy settings on social networking sites, find a lost or stolen device, and lock your phone account.
That’s a lot. Your digital devices are much more secure.
As we continue our journey, we’ll discuss how to preserve your privacy while accessing the Internet and review virtual private networks (VPNs), private web browsers, web search, text messaging, and email. We’ll also touch upon securely selling or donating a device, managing metadata in photos, the Internet of things (IoT), virtual credit cards, and more privacy-focused social networking services.
Onward.
Information provided in this post is subject to the disclaimer in the first post of this series.