This section identifies additional steps to consider for stronger online privacy and security. Of
course, STEP #1 IS TO USE MANYME!
Click on each topic to learn more.
Encryption is used to prevent email from being read by anyone other than the
intended recipient. While most emails are encrypted during transmission, some
email providers go a step further and store your messages in encrypted format.
ManyMe works with all of the latter email systems, too. Learn more about encryption
technology.
Private search engines do not track your searches, log any of your personal
data, or share information with third parties. In some cases, they will even
protect your identity when you click on a link to visit a site. Learn more.
Products in this category typically provide secure access from public access
points, hide your IP address and location, and prevent third parties from
tracking your online activity. Virtual private networks (VPNs) are a popular
option. Learn
more.
Tracking blockers prevent hidden programs from tracking your online activity,
while ad blockers detect and block the ads that are displayed based on your
online activity; both products may work in conjunction with a VPN. Blockers are
often provided as browser extensions, and some websites won't work unless ad
blockers are disabled. Learn
more.
Password managers provide secure storage for the usernames and passwords that
you use to access online sites, making it easier for you to use strong, unique
passwords and simplifying the log-in process. Learn
more.
Studies show that data breaches often occur long after a vulnerability in a
software program has been fixed ("patched") by the vendor. Products in this
category automatically install software updates to promptly close security
holes. Learn
more.
Having backup copies of your important files is particularly important if you
are a victim of ransomware. One approach is to subscribe to a cloud-based
service that automatically maintains current copies of your files. Learn
more.
Products in this category enable you to find out if your email address, password
or accounts have been compromised in a data breach and posted on the Dark Web.
Learn more about the Dark Web.
Identity theft occurs when someone uses your personal identifying information,
such as your social security number, for their own fraudulent purposes, such as
to claim your income tax refund. Get advice on identity theft recovery
steps.
Encryption is used to prevent email from being read by anyone other than the
intended recipient. While most emails are encrypted during transmission, some
email providers go a step further and store your messages in encrypted format.
ManyMe works with all of the latter email systems, too. Learn more about encryption
technology.
Private search engines do not track your searches, log any of your personal
data, or share information with third parties. In some cases, they will even
protect your identity when you click on a link to visit a site. Learn more.
Products in this category typically provide secure access from public access
points, hide your IP address and location, and prevent third parties from
tracking your online activity. Virtual private networks (VPNs) are a popular
option. Learn
more.
Tracking blockers prevent hidden programs from tracking your online activity,
while ad blockers detect and block the ads that are displayed based on your
online activity; both products may work in conjunction with a VPN. Blockers are
often provided as browser extensions, and some websites won't work unless ad
blockers are disabled. Learn
more.
Password managers provide secure storage for the usernames and passwords that
you use to access online sites, making it easier for you to use strong, unique
passwords and simplifying the log-in process. Learn
more.
Studies show that data breaches often occur long after a vulnerability in a
software program has been fixed ("patched") by the vendor. Products in this
category automatically install software updates to promptly close security
holes. Learn
more.
Having backup copies of your important files is particularly important if you
are a victim of ransomware. One approach is to subscribe to a cloud-based
service that automatically maintains current copies of your files. Learn
more.
Products in this category enable you to find out if your email address, password
or accounts have been compromised in a data breach and posted on the Dark Web.
Learn more about the Dark Web.
Identity theft occurs when someone uses your personal identifying information,
such as your social security number, for their own fraudulent purposes, such as
to claim your income tax refund. Get advice on identity theft
recovery steps.