Four quick cybersecurity measures that everyone must implement immediately


NEW Fox News articles can now be heard on audio! I must share this tale with you. My college-bound son asked me for the house number of a residence I rented in the region 28 years ago for two months when he relocated to Los Angeles.

I chuckled because I had forgotten it. I was then startled!

Five minutes later, he sent me a text message with a link to a free people search website that had that house number, links to all of my previous addresses, my present address, the ages of my relatives, and even my cell phone number.

There was no paywall covering any of this data. All it took was a simple name search to remove my privacy.
At that point, I decided to disclose the precise methods to remove your information from these ominous persons search websites on my website.


These websites frequently conceal the steps. Don’t worry; we took care of the labor-intensive work.

Tap or click for a list of 13 creepy sites that probably have your phone number, addresses, age, relatives and more, along with steps to remove your info. You might be shocked by what information is publicly available about you online.

Make sure to save this page as a favorite so you can refer to it again.

I bet youll be surprised at what you see online about yourself thats free for the taking by everyone else.

A few minutes from now, your online life will be safer. Pat yourself on the back for taking care of your digital self after going through this list.

HIDE YOUR HOME FROM APPLE AND GOOGLE MAP Despite how useful Google Maps and Apple Maps are, it can be unsettling to know that anyone can find your residence and address online. A little-known fact: A privacy blur can be requested for images of your house.

How to make a request to Google is as follows:
Look up your address in the Google Maps or Street View gallery .
To make a Street View image blurry, tap it. Your face, residence, license plate, or any other identifiable information must be visible in the picture.
To report a problem, click. This can be found in the lower right corner or by selecting the three dots on a picture.
After filling out the form, press “submit.”
You must send an email to for Apple Maps and take the following additional steps:
Request that your house be blurred.
Give Apple your complete address.
Include more information about the place so Apple will know which home to ban.

VERIFY ANY UNUSUAL BEHAVIOR Spyware is harmful software that discreetly monitors your activities in the background and records practically everything you do. If you know what to look for, you can find digital traces of these covert downloads.

You may get a comprehensive view of everything going on with your computer using Task Manager on a Windows computer or Activity Monitor on a Mac.

What to do if you use a PC is as follows:

The Task Manager can be accessed by pressing Ctrl Shift Esc. You can see the apps and background processes that are active on your computer under the Processes tab.

Take a look at the list. If you notice a name that you are unfamiliar with, look it up online to see what comes up. Even if you don’t immediately recognize the names of these programs and background activities, they occasionally are appropriate and not a cause for alarm.

Right-click and select End task to terminate an application or process. If it stops working, check back later to see if it starts.
What to do if you use a Mac is as follows:

Press the Command and Spacebar simultaneously to launch Spotlight Search and the Activity Monitor. Next, enter Activity Monitor by typing it and pressing Enter. Look over the list to see if you can identify anything.

To end an application or process, double-click it, then select Quit.
Tap or click for more signs someone is snooping on your computer.

LOG OFF OF YOUR COMPUTER If you leave your computer open, anyone is welcome to visit and snoop. You can also find yourself in a bad situation if your laptop is stolen or lost.

Yours should be secured with a strong password. So, no repetitions! This password must be easy for you to remember because you must input it each time you turn on your computer.

An even simpler alternative is to use biometrics, such as your fingerprint, to unlock your computer.
If not, use these password recommendations for all online accounts:
Use capital letters, special characters, digits, and a mix of all of them.
Aim for 12 characters or more.

Instead of a password, think about creating a passphrase. These are lengthier, more difficult to guess, and simpler to recall. Tap or click here and scroll to No. 3 for more details on creating one.

The Microsoft headquarters campus in Redmond. Microsoft is one of the worlds largest computer software, hardware and video gaming companies.

To secure your Windows computer:

Access Accounts by going to Start > Settings > Accounts.
From the left pane, select Sign-in options.
Under the Password column, click Add.
Change your password. Click Finish after selecting Next.
Using a Mac, lock it:
You are requested to generate a login password while configuring a Mac. Here’s how to set your computer’s unlocking password:
Click System Preferences after selecting the Apple icon.
Toggle between Security and Privacy.
In the General tab, choose the box next to Require password.
To lock your Mac when it goes to sleep or screensaver mode automatically, set the time of the password to immediately.

BE AWARE OF THIS SECRET WEAKNESS IN YOUR BROWSER With extensions, you can enhance your browser’s functionality. However, not every expansion is beneficial. Some follow you online, use up your computer’s resources, and do worse.

How do you determine what is safe? Extensions that adhere to Google’s “technical best practices and satisfy a high degree of user experience and design” are given the “Featured” label by Google Chrome.

Hey, it’s something, at least.
5 Ways You’re Being Tracked and Must Stop Right Away (Privacy Tip)
Is an extension definitely bad news? Delete it because you don’t remember downloading it.

Additionally, it can be useful to perform a web search for terms like “Is (the extension you’re using) safe to use?” Take a look at what appears and pay close heed to any security alerts.

How to delete an extension from Chrome is as follows:
Launch the Chrome browser. To the right of your profile symbol, tap the trio of vertical dots.
To choose Extensions, hover over More tools.
After selecting the extension you wish to remove, click Remove once more.
employ Safari on a Mac? How to uninstall an extension is as follows:
Choose Preferences under Safari. Toggle to Extensions.
Select the extension you want to remove, then click Uninstall.
Do not end there. Tap or click for 9 more ways to make Chrome safer.

Tim Cook, CEO, speaks during Apple's annual worldwide developer conference (WWDC) in San Jose, California, on June 5, 2017.

KEEP LEARNING ABOUT TECH The name of my well-liked podcast is “ Kim Komando Today .” It’s a good 30 minutes of tech news, advice, and queries from people throughout the nation like you.

Wherever you get your podcasts, look for it.
Please click the link below to view a recent episode.
PICK FOR PODCAST: Ford helps police, another Prime Day, John McAfee’s crazy crimes

Thanks to Ford’s cooperation with the police, get ready for electric pursuits by the police. I know every detail and the inside scoop on the stolen Amazon docs. It appears that another Prime Day is coming. You may now keep cool by wearing fashionable scarves. Wear one when watching the Netflix true-crime documentary about John McAfee, in my opinion. It is a bumpy ride.

Find “Kim Komando Today,” my podcast, on Apple, Google Podcasts, Spotify, or any other podcast player you like.
Just type in “Komando,” which is my last name.


What inquiries do you have about the digital lifestyle? Call Tap or click for a list of 13 creepy sites that probably have your phone number, addresses, age, relatives and more, along with steps to remove your info. 0 and Kim’s national radio show.

On a computer, television, tablet, phone, or other screen, you can listen to or view Tap or click for a list of 13 creepy sites that probably have your phone number, addresses, age, relatives and more, along with steps to remove your info. 1. Tap or click for a list of 13 creepy sites that probably have your phone number, addresses, age, relatives and more, along with steps to remove your info. 2

WestStar Multimedia Entertainment, 2019. Copyright. Toutes droits réservés.

The biggest weekend radio talk show in the country, Tap or click for a list of 13 creepy sites that probably have your phone number, addresses, age, relatives and more, along with steps to remove your info. 1, features all the most recent technological developments. Kim answers phone calls and offers guidance on today’s digital lifestyle, including tablet computers, cellphones, and data intrusions.