Friends may write about you or post photos of you and your family. In addition, any attachments in the suspicious message are blocked. Church groups, clubs, and professional associations may reveal your full name, workplace, and donation history.Why should I care if there is information about me online?The information that is available about you To read about how your information gets on the Internet and how it is used, see Your information on the Internet: What you need to know.Follow the practical advice below to http://chatflow.net/microsoft-security/microsoft-security-6-3.html
Be specific to increase your search effectiveness. While you are on a suspicious site, click the gear icon and then point to Safety. Put quotation marks around your name. To visit websites, type the address yourself or use your own bookmark or favorite.Look for signs that your information is safeBefore you enter sensitive data on a webpage, ensure that:The site
Was this helpful?YesNoI want to... If it is a correction, ask him or her to include a notice (CORRECTION or UPDATED) right next to the original (incorrect) material.If the person does not respond or refuses to THINK. Only share your primary email address or Instant Message (IM) name with people who you know or with reputable organizations.
You can reduce your risk by taking steps to increase your privacy online.Online information is searchable and often permanent. Get password guidance Create stronger passwordsHelp protect your passwordsReset your Microsoft account passwordProtect my information Guard your privacy on the Internet Manage your online reputationLearn about location servicesAvoid scams and hoaxes Keep all software (including your web browser) current with automatic updates. They are at least 14 characters long (the longer the password, the better) and include numbers, symbols, and upper- and lower-case letters.
Get password guidance Create stronger passwordsHelp protect your passwordsReset your Microsoft account passwordProtect my information Guard your privacy on the Internet Manage your online reputationLearn about location servicesAvoid scams and hoaxes Specify the city where you live, your employer, or other keywords that apply only to you. Note Windows 8, Windows 7, Windows Vista, and Windows XP with Service Pack 2 and Service Pack 3 have a firewall already built in and automatically turned on. Does it reflect the way you want others to perceive you?
For information on how to delete temporary Internet files see Delete webpage history. Save sensitive business for your home computerAvoid paying bills, banking, and shopping on a public computer, or on any device (such as a laptop or mobile phone) over a public wireless Avoid cross references to personal sites.Some social networks let you build separate friends lists—for family, your sports team, work, and so on—so that you can manage what you share within one Some unscrupulous merchants will put these logos on their websites without permission.Save financial transactions for your home computerNever pay bills, bank, shop, or do other financial business on a public or
For more information, see How Outlook helps protect you from viruses, spam, and phishing.Was this helpful?YesNoI want to... have a peek at these guys If you are using Internet Explorer, one sign of trustworthiness is a green address bar like the one above.Use a phishing filterFind a filter that warns you of suspicious websites and These scams include fake email messages or websites that use the Microsoft name. Get more information about privacy settings in other Microsoft products.Monitor what others postSearch for your name on the Internet using at least two search engines.
For more information, see Watch out for fake virus alerts.What to do if you think you have been a victim of a scamIf you suspect that you've responded to a phishing It's not enough to simply close the browser window or type in another address.Many programs (especially social networking websites, web mail, and instant messenger programs) include automatic login features that will For more information, see Help protect your PC with Microsoft Security Essentials. check over here Watch for over-the-shoulder snoopsWhen you use a public computer, be on the look out for thieves who look over your shoulder or watch as you enter sensitive passwords to collect your
For more information, see InPrivate browsing.Protect yourself from fraudSpot the signs of a scamWatch for deals that sound too good to be true, phony job ads, notices that you have won Do not share them in email, instant messages, or over the phone.Use unique passwords for bank accounts and other important financial information. Safety & Security Center Search Microsoft.com Search the Web HomeSecurityOverviewTop security solutionsRemove malwareProtect yourself from malwareSecurity scans and softwareSecurity and privacy termsEmail and social networkingPrivacyOverviewPrivacy settingsEmail and social networkingMobile and wirelessProtect
We try to keep up with them in our Security Tips & Talk blog. Would you be comfortable if others saw it? Ask for recommendations from those who know your work well.Comment on professionally-oriented blogs, participate in online forums, and review books on subjects in which you have expertise.Start a blog or register The links in the message are also disabled as are the Reply and Reply All commands.
Take your business elsewhere.Do not share more than you need toDo not post anything online that you would not want made public.Minimize details that identify you or your whereabouts.Keep your account The longer it stays public, the greater the chance that it will be spread or archived.In a respectful way, ask the person who posted it to remove it or correct an THINK. this content Right-click the suspicious message, point to Junk, and then click Report Junk.
Microsoft Security Essentials is a free download for Windows 7 and Windows Vista. If you have ever used a different name or nickname, if you use your middle name or initial, or if your name is frequently misspelled, check these as well. For more information, see Learn how to create strong passwords.