Skip to content

Securing Your Privacy

Secure your Internet privacy avoid becoming an identity theft victim

In our interconnected world, your privacy is at risk every time you go online. Fortunately, there are steps you can take to protect it.

Several key features in Trend Micro Security can help you minimize the amount of personal data tracked by websites and services, and tighten the security of your accounts, making sure no data goes out without your consent.

In addition to purchasing Maximum Security, we recommend that you employ some of these tips to help you and your family avoid becoming victims of online identity theft:

  • Use a good spam filter to block phishing emails
  • Contact the company directly if an email requests your personal information (using contact information from a reliable source, not the suspect email, mail, or call) to see if the request is valid
  • Remember if something is too good to be true…it probably is
  • Do not open them if you’re not expecting an email, link ,or attachment
  • Rely more on your credit card than a debit card because you can dispute a fraudulent charge with a credit card agency and not as easily with your bank on a debit card
  • Inquire when you open a new account with a company or website about their security practices: Ask if they encrypt their customer records? What other protections do they have in place to protect against data breach? 

Shop online carefully


  • Learn about a site’s privacy and security policies that tell you what information they collect, how they make sure it is safe, and with whom they share it
  • Use a credit card for shopping, as this is the best way to be covered for any fraud. Check your credit card statement regularly to make sure no one has used it without your knowledge and report any fraud to the company immediately
  • Be aware going online in a public place - Only use a secured Wi-Fi network you trust and be sure you are not publically sharing more of your personal information than you would like. Security products provide a privacy scanner for Facebook, Google+, and Twitter.


Online Shopping – Safety Made Easy

Use Internet security software on your computer

  • Start by protecting your computer from viruses, spyware, spam, and other malicious software designed to steal personal information
  • Keep your security software updated and make sure the firewall feature is on
  • Understand that paid subscription has many advantages over a free antivirus solution, namely the automatic updates that keep you protected when new threats emerge

Be smart about being online

  • Use a secured Wi-Fi network you trust and be sure your Internet security is up to date
  • Opt for private browsing. It allows you to go online without saving your personal information, browsing history, or cache on the device you’re using
  • Use a privacy scanner to check your current privacy settings on websites and get recommendations on what to improve. Trend Micro’s free Privacy Scanner for Facebook lets you monitor and control who can contact you or access your personal information
  • Be sure you are not sharing more of your personal information than you would like. Security products provide a privacy scanner for Facebook, Google+, and Twitter

Familiarize yourself with privacy settings and tools, especially on your mobile devices. Free, high-risk apps pose a number of privacy issues with the amount and type of information they collect. Always take the time to explore and adjust your privacy settings accordingly

Tips for Safely Socializing Online

Social networking sites have revolutionized the way people communicate, making it easier than ever to interact with friends over the Internet. However, this new open communication has also come at a cost, in many instances, to people's privacy and making their sensitive information available to hackers.


In order to use social networks as securely as possible, Trend Micro has compiled tips on how to network safely on the most popular social sites.



The latest social networking site to take off, Pinterest, acts as a virtual pin board of photos and ideas you like online. Pictures and comments are not filtered, so inappropriate material and language can be shared.



Facebook changed the social media landscape and is now more accessible than ever. However, that also makes Facebook a prime target for hackers looking to steal passwords, usernames and credit card information and pesky spammers looking to pollute your Facebook wall.


To prevent yourself from becoming a target on Facebook there are a few things you can do:


  • Switch over to HTTPS – An HTTPS browser address indicates that you are browsing on a secure connection and enabling your Facebook account to use only a secure connection. This is especially helpful for people who access Facebook from public or shared computers. Learn more here
  • Change your password frequently – Changing your passwords on your accounts should be something that you do on a regular basis to keep hackers at bay. Also, get creative with your passwords and add capitalized letters and numbers to make them more challenging and harder to crack
  • Don't click on questionable links – Facebook hackers often use your friends to send you messages or wall posts with harmful links. Usually these can be detected if they seem uncharacteristic for your friends, but beware of generic messages such as "I just found the coolest video!" or "Do you remember when we did this?"

    If ever in doubt, ask them before you open something that could be potentially harmful. Also, be sure to notify Facebook and your friend when you see spam so you can both report it and keep it from spreading further
  • Look at your options – Facebook provides a lot of account options and customizable profiles. Take advantage of these options and limit your personal information to people as you see fit


It only takes 140 characters to Tweet, but one bad shortened URL and you'll have to take your computer into the shop.


Watch out for shortened URLs – Only click shortened URLs from trusted Twitter handles. It can be tempting to click on the "Banned Lady Gage" shortened video link from user EyeMusik41, but more often than not, tweets that sound too good to be true are just that.


Shortened URLs can take you to sites that want you to input private information such as your email address which will be used for a phishing campaign or spam later or a third party who wants access to your Twitter account so they can post messages in your name.



It's important to promote yourself professionally, just be careful of over sharing. Don't post too much information – The biggest threat on LinkedIn is that hackers will search for private information, such as work history and your email address, allowing them to learn about you and making you susceptible to phishing attacks.



Google+ makes privacy customization as easy as dragging friends into different colored circles. Just make sure you're reading up on how else you can protect your private information.


  • Use those circles! – The circles in Google Plus are there for a reason, so you can monitor who sees what. Make sure to only share private information with people who you trust

  • Read up on customizations – Google Plus gives users a bevy of options including deciding who sees what, limiting your profile and hiding your connected accounts. Check out their options and think about what you want shown to the public.


Flag inappropriate content – While YouTube does monitor their content, they give you the option to flag videos that are not appropriate in nature. If you see something that shouldn't be on YouTube, flag it.


Location Applications

While it can be fun to check in at places while out and about, keep in mind that you are sharing your location with all of your friends and followers. Even more importantly, checking in somewhere means you are not home and you are more susceptible to a break-in.



It is much easier to limit who sees your check-ins on Foursquare as most people have less friends on FourSquare, however, the battle for the coveted title of "Mayor" can make your location and daily pattern more susceptible to danger. As people check in daily and battle for mayorship, one's daily patterns can be detected. If you want to fly under the radar, be sure to keep most of your check-ins limited to your friends and not to share check-ins on Facebook, Twitter or LinkedIn.

It's no secret that social networking sites can be used as a cyberbullying tool. Be sure to keep a close watch on your child's accounts to make sure that they are not being cyberbullied or are cyberbullying other kids.

As more kids join social networking sites, like Instagram and Pinterest, watch out for instances of cyberbullying or mean comments on items pinned or photos posted.

Top Tips for Parents

  • Make a deal with your kids that in order to have an account, they have to become your friend and let you see their full profile
  • Keep an eye on your kids' posts and make sure their posts are private. Sit down with them and go through their privacy customization options to ensure that what they post isn't shared over the entire Web
  • If a social networking site has age filters, use them. Also, make sure your children use their real date of birth so they are not exposed to mature content.
  • Use Trend Micro Internet security software- In addition to delivering the fastest protection against new web threats*, Trend Micro Security highlights malicious links before you click on them in social networking sites, instant messages, and email. Be sure to keep your Internet security is up to date

Help protect your kids online

There are security software tools that will assist you in limiting your children’s access to the Internet and others like the robust parental controls that are offered in Trend Micro Maximum Security will help you monitor your children’s behavior.

There's one rule to live by when it comes to kids and social networks and that's to get involved. Live where your kids live; if they are on a social networking site, join, and make sure that you have full access to see what they post, who their friends are and be active in monitoring not only what's on their wall, but what they are posting.

Connect with us on