This section identifies additional steps to consider for stronger online privacy and security. Of course, STEP #1 IS TO USE MANYME!

Click on each topic to learn more.

Encryption is used to prevent email from being read by anyone other than the intended recipient. While most emails are encrypted during transmission, some email providers go a step further and store your messages in encrypted format. ManyMe works with all of the latter email systems, too. Learn more about encryption technology.
Private search engines do not track your searches, log any of your personal data, or share information with third parties. In some cases, they will even protect your identity when you click on a link to visit a site. Learn more.
Products in this category typically provide secure access from public access points, hide your IP address and location, and prevent third parties from tracking your online activity. Virtual private networks (VPNs) are a popular option. Learn more.
Tracking blockers prevent hidden programs from tracking your online activity, while ad blockers detect and block the ads that are displayed based on your online activity; both products may work in conjunction with a VPN. Blockers are often provided as browser extensions, and some websites won't work unless ad blockers are disabled. Learn more.
Password managers provide secure storage for the usernames and passwords that you use to access online sites, making it easier for you to use strong, unique passwords and simplifying the log-in process. Learn more.
Studies show that data breaches often occur long after a vulnerability in a software program has been fixed ("patched") by the vendor. Products in this category automatically install software updates to promptly close security holes. Learn more.
Having backup copies of your important files is particularly important if you are a victim of ransomware. One approach is to subscribe to a cloud-based service that automatically maintains current copies of your files. Learn more.
Products in this category enable you to find out if your email address, password or accounts have been compromised in a data breach and posted on the Dark Web. Learn more about the Dark Web.
Identity theft occurs when someone uses your personal identifying information, such as your social security number, for their own fraudulent purposes, such as to claim your income tax refund. Get advice on identity theft recovery steps.
Encryption is used to prevent email from being read by anyone other than the intended recipient. While most emails are encrypted during transmission, some email providers go a step further and store your messages in encrypted format. ManyMe works with all of the latter email systems, too. Learn more about encryption technology.
Private search engines do not track your searches, log any of your personal data, or share information with third parties. In some cases, they will even protect your identity when you click on a link to visit a site. Learn more.
Products in this category typically provide secure access from public access points, hide your IP address and location, and prevent third parties from tracking your online activity. Virtual private networks (VPNs) are a popular option. Learn more.
Tracking blockers prevent hidden programs from tracking your online activity, while ad blockers detect and block the ads that are displayed based on your online activity; both products may work in conjunction with a VPN. Blockers are often provided as browser extensions, and some websites won't work unless ad blockers are disabled. Learn more.
Password managers provide secure storage for the usernames and passwords that you use to access online sites, making it easier for you to use strong, unique passwords and simplifying the log-in process. Learn more.
Studies show that data breaches often occur long after a vulnerability in a software program has been fixed ("patched") by the vendor. Products in this category automatically install software updates to promptly close security holes. Learn more.
Having backup copies of your important files is particularly important if you are a victim of ransomware. One approach is to subscribe to a cloud-based service that automatically maintains current copies of your files. Learn more.
Products in this category enable you to find out if your email address, password or accounts have been compromised in a data breach and posted on the Dark Web. Learn more about the Dark Web.
Identity theft occurs when someone uses your personal identifying information, such as your social security number, for their own fraudulent purposes, such as to claim your income tax refund. Get advice on identity theft recovery steps.