Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

« Previous Version 2 Next »

The first line of defense against Technology Enabled Abuse is to protect yourself by limiting the amount of personal information you share online and increasing the security of both your accounts and your devices:

Don’t overshare on social media.

Strengthen your security practices.

  • Enable strong authentication on all your personal accounts.

    • Limit access to your computer and other internet-connected devices.

    • Enable your security protections, such as passwords or biometric scans, so that only you can access them.

    • Always remember to log out before you step away from your computer/cell phone.

    • Review your applications to ensure that there is no spyware downloaded on your device.

    • Review GPS and location-tracking settings for all applications and ensure they are enabled only for the important ones requiring it such as the Mobile ID app with your Mountaineer Card, the LiveSafe app, or Uber.

If you suspect your computer has been compromised, take it to a private computer repair shop for an assessment. Use a computer at a lab or library in the meantime.

Take steps to remove or reduce the availability of information about yourself.

  • If you believe that an account has been compromised, change your password and log out of all devices. Google, Facebook, and many other social media accounts allow you to force logout on all devices that are logged in. This ensures that no one else is still logged in when you change your password.

  • No labels