You Are What You Post – 5 Lessons for Online Security

The old saying – you are the company you keep, has forced many to keenly monitor their actions in the universe.  The activities & choices of friends and associates can reflect back on your reputation.

Those you associate with are inherently a reflection of what you like, enjoy, or otherwise subscribe to.  Likewise the acquaintances you choose to avoid and distance yourself from are representations of what you don’t particularly follow in the tangible sense of the word. This is true in the online digital space as much as it is in real life.


Fellow travellers, this post is meant to remind us all that you are what you post and offer 5 simple techniques to improve online security.

I remember begging my parents to let me have Facebook back in grade 5 because I was moving to a new middle school and needed to be able to stay in contact with my old friends. After some serious grovelling to my ‘traditionally minded yet modern’ mother, she agreed to let me create my first online profile. What I remember most of course was the lengthy lecture I got about digital permanency and that whatever I post is out there forever.

Lessons like these can really make or break a juvenile kid, especially when cyber-bulling, online violence, and hacking are within the capabilities of the users fingertips.


You are what you post

Technology is a unique landscape that is constantly changing by way of faster programs, smarter intelligence, and the human drive to improve. What was once thought of as strong in 2014 is now considered weak. So evolving and adapting to the landscape is of great importance for all users.

Here are 5 techniques for Online Security brought to you by ZD Net:

5) Be Mindful of the Apps that you Install

Each time you install an app, it will ask you for permissions to use your phone’s features or data, like your contacts, photos, camera, or even the phone dialer itself.

Remember: if an app is free, you’re paying for it in some other way — and usually it’s with your data.

4) Set Stronger Passcodes

Don’t rely on your trusted favourite four digit sequence to stop threats from reaching your device. A common mistake users make is simply using easy to remember dates as their first line of defence.

Whether you’re signing up for a weekly newsletter, or changing the password for your primary inbox, consider U@!NG $TR0nG3R P@$$w0rD$.

3) Public Wi-Fi Networks Are A Big ‘No’

Remember: If you ever use a public network, like a Wi-Fi hotspot in a coffee shop or anywhere else, be extremely careful. Treat this network as though every page you visit will be monitored — which may expose your personal information, including your usernames and passwords.

2) Consider Deleting Accounts You No Longer User

If you know you have an account that you never use, delete it. Holding onto these old accounts may expose you to greater hacks or intrusions down the line, even if they’ve been inactive for a while.

Log in and shut down the account.  

If that account is still linked to other sites and services — like your social networking account or two-factor authentication — an attacker could log into those accounts by resetting your passwords sent to your old email address.

1)  Beware the Hard Part

There’s a lot you can do to ensure your personal security and data privacy, but all too often it takes two to tango — in that you should ask your friends, colleagues, and others you communicate with to also jump in.

When it comes to messaging and communication, you put your privacy in their hands as they do yours. It’s a collective effort that everyone can — and should — support. 

Thanks for reading. Stay tuned for more Urban Guides.

Follow on Instagram©

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Website Powered by

%d bloggers like this: