


Some security steps are common knowledge. I don’t need to remind you to install that latest update on your computer, right?
Others are less obvious. Do you lock your computer every time you get up? Unless you live alone, you should. Here’s the easiest way to do it if you’re lazy.
On your phone, you’d probably never guess leaving your Bluetooth connected 24/7 is a mistake. Here’s why — and what to do if you can’t live without your AirPods.
I’ve got your back with more secrets only tech pros know to keep you safe and secure.
I always get calls to my national radio show from people concerned that someone is watching everything they do.
One of the first steps I recommend is: Make sure your inbox is locked down. Here are steps if you notice or suspect any usual logins.
If you spot an unknown location or a device that isn’t yours, act fast. Change your password, be sure two-factor authentication is turned on, and log all devices out of your account.
Like your computer, your printer is a goldmine for hackers. Why? Printers often store copies of the docs that have been printed. Any cybercriminal could get copies of sensitive information, like your financial records.
Here are three signs your printer has been hacked:
- Your printer starts printing blank pages or a bunch of characters.
- You notice print jobs you did not initiate.
- Your printer’s settings have changed — and it wasn’t you.
What should you do?
Running out of ink mid-print is the worst. Use these secrets to save on ink costs.
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Listen on 425+ radio stations or get the podcast. And join over 400,000 people who get her free 5-minute daily email newsletter.
I recommend you look through the location settings on your phone. That will go a long way in shutting down a lot of the GPS tracking. But you can’t stop there.
Why does your phone tell you how long it’ll take to get to the office or knows your ETA to the grocery store when you get in the car for Saturday morning errands? That’s part of Significant Locations.
Apple says this feature exists so your phone can learn places significant to you and provide personalized services, like traffic routing and better Photos Memories.
Here’s how to access it — and shut it down.
If you don’t want your iPhone to keep track of your whereabouts, slide the toggle next to Significant Locations to the left to disable the setting.
Want to wipe out this list of significant locations? Follow the steps here.
The very idea of your phone in someone else’s hands is creepy. Imagine a stranger rifling through your photos, videos, apps, conversations, and browser tabs.
So what if your phone goes missing? You can take a step to protect your info, even if you never get that phone back.
To remotely erase your iPhone:
To remotely erase your Android phone:
Check out my guide here for more methods to find, back up, or erase your phone.
Social media companies are dying to get their hands on your contacts’ birthdays, pictures, full names, email addresses, and more. They tell you it’s a handy tool to find your friends, but your friends’ info isn’t yours to give away. That’s their own to decide where to share.
From your address book, companies build so-called Shadow Profiles. They can learn a ton from those you know, even if they’re not using those platforms. Sneaky stuff.
How can you make a difference? Don’t give apps access to your phone’s contacts. Review which apps do have access and turn it off. And always pay attention and stop sharing info without a real benefit to you.
Even your phone number is powerful in the wrong hands.