Necessary 60-second security checks: 4 quick cybersecurity steps to take NOW

October 24, 2023

By Kim Komando

I have to tell you this story. When my college-bound son moved to Los Angeles, he asked me for the house number of a place nearby that I rented 28 years ago for two months. I laughed because I couldn’t remember it. Then, I was shocked!

About five minutes later, he texted me a link to a free people search site that showed that house number, along with every address I ever lived, my current address, links to my relatives, their ages, my age and my cellphone number. All this data was not behind a paywall. It took just a search of my name and bam — privacy was gone.

That’s when I started an initiative on my site to list the exact steps to remove your data from these creepy people search sites. These sites often hide the steps. Don’t worry. We did the heavy lifting for you.

A safer online life is just a few minutes away. Follow this list, then pat yourself on the back for caring for your digital self.

1. Hide your home on Google Maps and Apple Maps

As convenient as Google Maps and Apple Maps are, it’s unnerving when your house and address number are visible to anyone online. Here’s a secret. You can request a privacy blur over pictures of your home.

Here is how to submit a request to Google:

For Apple Maps, you must email MapsImageCollection@apple.com and:

2. Check for any strange behavior

Spyware is malicious software that works quietly in the background, tracking almost everything you do. These sneaky downloads leave digital clues if you know what to look for.

Task Manager on a Windows PC and Activity Monitor on a Mac can give you an overview of everything happening on your machine.

If you use a PC:

Look through the list. If you see a name you don’t recognize, search for it online to see what turns up. Sometimes, these programs and background processes are legitimate and of no concern, even if you don’t know the name at first glance.

To close out an app or process, right-click and hit End task. Check again later to see if it is running again.

If you use a Mac:

Double-click to close out a program or process, then hit Quit.

Tap or click for more signs someone is snooping on your computer.

3. Lock down your computer

Leaving your computer unlocked invites anyone to come along and snoop. If your laptop is stolen or lost, it could land you in an awful spot.

Lock yours with a strong and unique password. That means no repeats! Since you need to enter this password each time you open your computer, it needs to be something you can remember.

If your computer allows you to unlock it with biometrics, like your fingerprint, that’s an even easier solution. Otherwise, use the same password guidelines for any online accounts:

Lock your Windows PC:

Lock your Mac:

When setting up a Mac, you’re prompted to create a login password. Here’s how to set your password to unlock your computer:

4. A hidden vulnerability in your browser

Extensions let you customize your browser and add powerful features. But not all extensions are helpful. Some track you across the internet, eat up your computer’s resources, and worse.

How can you tell what’s safe? Google Chrome assigns a “Featured” badge to extensions that follow Google’s “technical best practices and meet a high standard of user experience and design.” Hey, at least it’s something.

A sure sign an extension is bad news? You have no recollection of downloading it, so delete it.

It’s also helpful to search the web for phrases like, “Is (the extension you’re using) safe to use?” See what pops up, and pay special attention to any security warnings.

Here’s how to remove an extension from Chrome:

Use Safari on a Mac? Here’s how to remove an extension:

Don’t stop there. Tap or click for nine more ways to make Chrome safer.

https://www.komando.com/tips/cybersecurity/60-second-security-checks/