How to clean up your online digital footprint
Written by a NortonLifeLock employee
Your “digital footprint” includes all traces of your online activity, from commenting on news pieces or social media to making online purchases. When you know the boundaries of your digital footprint, and take steps to control it, you can protect your identity and your reputation.
Safety for every device.
Security is no longer a one-machine affair. You need a security suite that helps protect all your devices – your Windows PC, Mac, Android smartphone or your iPad.
Try for 30 days before you buy with Norton Security Deluxe – helps protect up to 5 of your devices for one low price.
Digital footprints don’t merely attract the interest of hackers or those out to steal your identity. They can also be traced by potential employers, schools, or creditors. Managing your identity clearly matters.
Active Vs. Passive Footprints
One way to think about your digital footprints is to categorize them as either “active” or “passive.”
“Passive” footprints are those you leave behind without intending to do so or, in some cases, even knowing you are doing so. For instance, websites that collect information about how many times you have visited in the recent past are adding to your digital footprint in a “passive” fashion. You don’t choose to hand them this data; they collect it when a device at your IP address connects with their websites. Because this is a hidden process, you may not realize it is happening at all.
“Active” footprints, by contrast, are those you leave when you make deliberate choices on the Internet. Posts you make to your own social media channels are a well-known form of active footprint. When you are logged into a project management or similar site, changes you make that are connected to your login name are also part of your active footprint.
Both active and passive footprints can be tracked and observed in multiple ways and by multiple sources. When you take steps to control your digital footprint, you take steps not only to protect your own identity and reputation, but that of your family and friends as well.
Six Steps for Protecting Your Digital Footprint
Organizations like the Family Online Safety Institute recommend tracking your digital footprint and taking steps to control it. Recommended steps include:
1. Enter your name into several search engines.
Use multiple search engines to perform a search for your first and last name. If you’ve recently changed your name, look up both your prior name and your current one. Try the common misspellings as well. Review the first two pages of results. Are they positive? Do they show you in a professional and respectable light? If anything comes up that you don’t like, ask the site administrator to take it down.
2. Double-check your privacy settings, but don’t trust them.
Privacy settings on social media allow you to control who sees your posts on your social media streams. Spend some time getting to know these settings so you can use them fully – for example, Facebook allows you not only to limit posts merely to “friends,” but also to make customized lists of people who can see certain posts. However, don’t assume that privacy settings will protect you anywhere but on the social media site that uses them. For example, some Facebook users have reported finding their “friends-locked” photographs as public images on Google Image Search.
3. Create strong, memorable passwords.
Any time you need a password, create one that uses a combination of words, numbers, symbols, and upper- and lowercase letters. Make it a password that is easy for you to remember, but would be hard for someone else to guess. Avoid the most popular combinations, like birthdates, anniversaries, or the names of your spouse, children, or pets.
4. Keep all your software up to date.
Many viruses and malware programs are specifically designed to “mine” your digital footprint, and they are constantly being updated. To help protect yourself, make sure that your antivirus software and your other software programs are up to date. Older software is more vulnerable to attack.
5. Review your mobile use: if you don’t need it, delete it.
Set a password or lock pattern on your mobile device so that it cannot be accessed by other people if you accidentally lose or forget it. From time to time, review the apps on your phone or tablet. What are their privacy or information-sharing settings? If you don’t use an app anymore, delete it.
6. Build your reputation through your behavior.
Contribute to your positive, professional digital footprint by posting only those things that contribute to the image of you that you want your bosses, banks, or professors to see. Skip the negative tweets, “un-tag” yourself from questionable Facebook photos, and keep critical comments to yourself. Instead, build a positive reputation by starting a blog or website that showcases your work or a hobby about which you’re passionate.
Isn't it time to upgrade your security?
Upgrading to new devices and software can often mean downgrading your privacy and security. It’s time to take your security seriously. Download the full version of Norton Security Deluxe free for 30 days, and test-drive it on up to 5 of your devices – PCs, Macs, smartphones or tablets.
Create an account today and be up and running in minutes.
Copyright © 2021 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.