How to protect yourself and others

Security starts with who you trust

We’ve partnered with some of the most trusted names in online safety, including Consumer Reports & Common Sense Media, to bring you reliable tips for staying safe online.

Start with the basics

Your trust shouldn’t be automatic—it’s something built and earned. Protecting yourself starts with the right tools and smart choices, based on sources you trust - whether that’s from expert reviews, established organizations, or people you know.

Use Unique, Strong Passwords

Every device and website login should have a long, unique and complex password that includes a mix of uppercase and lowercase letters, numbers, and symbols (e.g., "SunnyDay!1948").

Update passwords every 6-12 months or immediately after a security breach. Use a Password Manager An app used to generate, store, and manage passwords securely. to securely store, organize, and generate strong passwords for all your accounts, keeping them safe and accessible.

Avoid the
Phishing Hook

Scammers bait you with fake offers and links–it’s called Phishing A fraudulent practice in which attackers trick people into revealing sensitive information or installing malicious software. for a reason. Think before you click, and report anything suspicious.

Update Your
Software A collection of programs and data that tell a computer how to perform specific tasks.

Software updates fix security vulnerabilities hackers can exploit. Install updates promptly to protect personal and community information.

Here’s how to enable auto security updates for Apple, Android, Mac and Windows.

Choose
Single Sign-On A system that lets users access multiple apps or websites with one login, simplifying authentication while enhancing security.

When creating a new account for a website or app, choosing “Sign in with Google”, “Sign in with Apple”, “Sign in with Amazon”, or “Sign in with Microsoft” is often more secure than setting up a unique password.

This option allows trusted providers to handle authentication, reducing the risk of weak or reused passwords while simplifying account management.

Restart Your Devices Weekly

A quick restart once a week can apply security updates, stop potential threats, and improve performance.

Credit
Over Debit

Use credit cards instead of debit for online shopping—they offer stronger fraud protection. Debit if you dare!

Beyond the basics? Try these next.

Service providers like Apple, Google, and Microsoft offer built-in protections like passkeys, password managers, and multi-factor authentication (MFA). Turning these on is an easy way to boost your security. Also, choose internet and cloud providers that prioritize encryption, privacy, and regular security updates.

But no provider can do it all for you—using strong passwords, staying alert to scams (especially those impersonating trusted companies), and keeping your software updated are just as important.

When in doubt, pause and Take9 before you click, download, or share.

Passkeys Are In!

Passkey A secure, password-free way to log in, using a combination of biometric data (like a fingerprint or face scan) or a device-specific code to verify your identity. are a safer and faster way to log in. They use encrypted keys and biometrics (like Face ID or fingerprints) instead of passwords, making it harder for hackers to steal your info.

Most operating systems already offer passkeys as an option.

Here's how to setup passkeys with Apple, Google, and Microsoft.

Avoid
Public Wi-Fi

Instead of connecting to public wi-fi, use your mobile provider’s network for safer internet browsing.

If you need to connect other devices while away from home, consider using a personal hotspot.

Cybercriminals A term used to describe someone intending to conduct malicious activities online. can pose as trusted networks to steal your data.

Enable MFA
Multi-Factor Authentication (MFA) A log-in process that requires two or more pieces of evidence to authenticate someone’s identity.

Multi-Factor Authentication (MFA) adds an extra layer of security by requiring a second verification step after your password, like a code from an app or email. Avoid text message verification, as it's more vulnerable to interception.

For Stronger Security Better security for your devices that hold sensitive personal information like your phone number, bank accounts, or passwords. , use an Authenticator App An app to help confirm a user's identity more securely. to protect your account—even if your password is stolen

Shop Trusted Sources

Treat online shopping like the real world: stick to trusted retailers. If a deal feels too good to be true or seems shady, it probably is.

Back It Up!

Auto Backups A feature that automatically saves copies of your files, data, or settings to a secure location, like the cloud, to protect them from loss. to a trusted cloud service can save you from losing important files in a cyberattack. Plus, it makes upgrading devices easier.

Protect Your Purchases

Monitor your bank statements and credit reports after making online purchases. Spot something suspicious? Report it immediately.

Family-Only Passwords

Scammers and Bots Software programs designed to perform automated tasks online, such as answering questions or managing accounts, often mimicking human behavior. can mimic voices using AI Artificial intelligence is the simulation of human intelligence by machines to perform tasks like learning, reasoning, and decision-making. Create a family-only Voice Password A security feature that uses your unique voice pattern to verify your identity, similar to a fingerprint, to unlock devices or access accounts. to verify calls from loved ones. Make it fun and memorable!

Don’t Risk It,
Freeze It

If you think your information is compromised, Credit Freeze A method to block creditors from accessing your credit report, effectively preventing them from opening new accounts in your name. . This stops others from opening accounts in your name.

BONUS TIP Consider freezing your children's credit for added protection.

Ready for more? Try these advanced tips.

Use Encrypted Messaging

SMS texts aren’t always secure. Stick to messaging apps with End-to-End Encryption The use of encryption to secure data as it travels between two endpoints so that unauthorized parties cannot access what is being communicated. for sharing sensitive information.

Enable PDNS (Protective Domain Name Service)

Protective Domain Name Service (PDNS) A system that protects users by identifying and blocking malicious websites, preventing threats like malware and phishing. is like a security guard for internet browsing. It checks if a website is safe before you visit.

If the site is known for scams, Malware Malicious, or bad, software designed to damage or gain unauthorized access to a computer system., or other online threats, the PDNS will block access, preventing your device from connecting to something harmful.

Learn how to enable PDNS on most browsers.

Review App Permissions

Your apps might know too much about you. Check App Permissions Settings that control what information and features an app can access on your device, like your camera, location, or contacts. and download only from trusted sources like the Apple App Store or Google Play.

Here's how to change app permissions on iPhone and Android.

Join Our Community

Stay up to date to keep yourself, your community, and your country safe.

(Just remember to pause for 9 seconds—and Take9 before you sign!)

We take care so you can safely share.