Try abbreviating a phrase. For example, “Soda at dinner keeps you up at night” could become “S@dKuU@n!” Longer passwords are always stronger, so try using a favorite quote, or a line from a song, book, or movie. Remember that some websites have password length restrictions, so make sure to follow those as well. [2] X Research source Avoid using common passwords like “123456” or “password,” or information about you that others might easily be able to find out, like a nickname, your favorite sport, or your pet’s name. Also, don’t use the same password on multiple sites as this can increase the likelihood of being hacked.

You can use some password managers for free, while more premium options are available for a fee. Popular, trustworthy password managers include 1Password and LastPass. You can find others by searching for them online. You can also use your browser’s built-in password syncing service, although it’s considered less safe and more vulnerable to hacking, so use with caution. [4] X Research source

To check whether an account has multi-factor authentication, check the site’s Settings page. This extra step might seem annoying, but it will keep your information safer than just a password alone.

Avoid sites with misspellings or bad grammar in their addresses, which could be dangerous copycats of legitimate websites. Also look out for sites that have lots of pop-ups, or numbers or gibberish in their addresses.

Log out of any site you use on a public computer or network. Log out of any online banking or shopping site you use, even on your home computer and network. It’s typically OK to keep your home computer logged on to accounts like your email or social media, as long as you make sure to lock your computer if you ever step away from it.

Go to your account settings and your security or privacy menu to view and change your privacy level. Even if you choose to keep your profile public, make sure that crucial information, like your address and phone number, is hidden.

Do this every few months or so to make sure that everything you want to be private stays that way.

As a rule of thumb, ask yourself if your post is something you’d want your (grand)parents, teachers, or future employers to see. If the answer is no, don’t post. This is known as the “grandma rule”.

Turn on tag review in your privacy settings. You’ll get a notification when someone tags you in a post, then have the option to approve the tag and put the post on your own account, or to deny it. If you’re still concerned about a photo even after removing your tag, talk to the poster about taking it down.

Avoid giving out contact information like your name, address, or phone number, as well as other information that might make it easy to find you, like your school or workplace.

If you can’t bring a friend, tell someone where you’ll be, who you’ll be with, and for how long. If you’re under 18, never agree to meet someone in-person who you met online.

The email could also include links that might look legitimate, but never click on them until you can verify that it’s a legitimate message. If you know the person whose email was being used, tell them that their account has been hacked and report the phishing by filing a complaint with the FBI’s Internet Fraud Complaint Center at www. ic3. gov. Phishing scammers are often after your bank account or Social Security number, so be extra cautious if you get an email requesting money, login credentials, or very personal information.

Spending time on these kinds of websites can give your computer a virus or make it crash.

Clear your cookies every month or so to wipe out any personal information in them.

Secure sites should also have a small lock icon in the URL field. Although it’s convenient to save your payment information on a shopping site, always do so with caution, as this puts you at risk if the site gets hacked.

If you often need WiFi on the go, try buying a virtual private network (VPN), a piece of hardware that can create a secure, private connection from anywhere. Connect with care on your smartphone, too. If you can, confirm the name and login requirements of the WiFi with appropriate staff before connecting. [16] X Research source

For a fee, you can also download firewall software from authorized sellers like Norton, McAfee, or Microsoft.

Automatically encrypted phones include iPhones, newer Androids, and Google’s Pixel phones. You can enable encryption software on your Android in its security menu. For extra protection, you can download encryption applications from the app store.

If you see an unknown Bluetooth request to pair with your device, ignore or deny it right away. Take extra care in crowded areas where potential hackers are within range of your Bluetooth, such as restaurants and public transportation.

Remember to read over the requirements, terms, and conditions an app has before you install it. This will be long and probably boring, but it’s important that you know exactly what is being installed onto your device.

Some security packages also come with remote locking capabilities to prevent a stolen phone from being used.