Safe Online Habits
Prevent Data Breaches
Dec 18, 2025
10 Quick Wins to Protect Your Personal Data (Without Losing Your Mind)
Protect your personal data with this 10-step checklist. Learn how to use aliases, manage passwords, and prevent data leaks with simple quick wins.

Your personal information is leaking everywhere. Data breaches hit the news weekly, and companies track your every move online. The good news? You don't need a computer science degree to protect yourself.
These 10 strategies take minimal effort but deliver maximum privacy protection. Think of them as digital hygiene—small habits that prevent big problems.
1. Stop Using Your Real Email Address Everywhere
The Problem: You use one email for everything. When any website gets hacked, your entire digital identity is exposed.
The Solution: Email aliases.
Services like SimpleLogin, Addy.io, or Apple's Hide My Email generate unique, random email addresses for every account you create. For example: random.store.x9z2@simplelogin.com.
How it works:
Each alias forwards to your real inbox
If one gets compromised or spammed, delete it
Your real email stays hidden
Real-world benefit: When that random online store gets breached, hackers get a useless alias—not your actual email.
2. Protect Your Phone Number Like It's Your Social Security Number
Because it basically is.
Your phone number is tied to your bank accounts, social media, and even government services. Unlike passwords, you cannot easily change it.
The Fix: Use a "burner" VoIP number for everything except critical accounts (banking, healthcare, government).
Best Options:
Service | Best For | Privacy Level |
|---|---|---|
MySudo | High-security accounts | ⭐⭐⭐⭐⭐ No real phone needed to sign up |
Hushed | Online marketplaces, dating apps | ⭐⭐⭐⭐ Accepts crypto payment |
Google Voice | Spam filtering for loyalty programs | ⭐⭐ Google collects your data |
Burner | Separating work from personal | ⭐⭐ Requires your real number to register |
Why this matters: If your "burner" number appears in a data leak, you can delete it and get a new one in 30 seconds.
3. Delete Risky Browser Extensions Right Now
Browser extensions can see everything you do online—passwords, bank balances, private messages.
Remove These Immediately:
Shopping assistants like Honey
Track your entire browsing history
Sell your shopping behavior to advertisers
Have deep access to every page you visit
Free VPN extensions
Running VPN servers costs money
If it's free, they're selling your browsing data
Many inject ads or malware
Keep These Instead:
✅ uBlock Origin (blocks ads AND malicious code)
✅ Bitwarden (open-source password manager)
That's it. Seriously. Most extensions do more harm than good.
4. Ditch SMS Two-Factor Authentication
SMS codes can be hijacked through "SIM swapping"—where a hacker convinces your phone carrier to transfer your number to their device.
Upgrade to:
For most people:
2FAS (Android/iOS, free)
Raivo OTP (iOS)
Aegis (Android)
For maximum security:
YubiKey (physical security key, $50-70)
Action step: Go to your email and banking accounts today and switch from SMS to app-based authentication.
5. Lie to Websites (Strategically)
Data brokers build profiles by stitching together accurate information from hundreds of sources.
The counter-strategy: Give them junk data.
Safe places to lie:
Retail loyalty programs
Newsletter signups
Online forums
Delivery apps
Random birthday? Fake middle name? Made-up phone number? Go for it.
Important: Never lie on banking, medical, legal, or government forms. But that random e-commerce site asking for your birthday to "send you a discount"? They don't need your real information.
6. Use a Password Manager (And Stop Reusing Passwords)
If you use the same password across multiple sites, one breach compromises all your accounts. This is called "credential stuffing," and it's the #1 cause of account takeovers.
Best options:
Bitwarden (open source, free/paid)
1Password (best user experience)
Proton Pass (from the company behind ProtonMail)
The key feature: Use the random password generator. Every password should look like this: K9$mPq2#vL8@nR4%wE7
Pro tip: Don't rely on your browser's built-in password manager. Malware specifically targets Chrome's password storage.
7. Google Yourself (And Clean Up What You Find)
Open an incognito window. Search for:
Your full name + city
Your phone number
Your email address
Look for "people search" sites like Whitepages, Spokeo, or BeenVerified in the results.
What to do:
Most have an "Opt-Out" link in the footer
Manually remove yourself from the top 5 results
This takes 30-60 minutes but dramatically reduces your exposure
8. Switch Browsers (And Block Ads for Security)
Google Chrome is built by an advertising company. Its default settings are designed to collect your data, not protect it.
Better Options:
Firefox
Enable "Strict" Enhanced Tracking Protection
Change search engine to DuckDuckGo or Startpage
Brave
Privacy-focused by default
Built-in ad/tracker blocking
LibreWolf
Firefox-based with enhanced privacy settings pre-configured
No telemetry collection, uBlock Origin installed by default
The Security Bonus: Protection from Malvertising
You don't even need to click on an ad to get infected. Modern attacks exploit browser vulnerabilities just by rendering the ad on your screen—called a "drive-by download".
uBlock Origin isn't just an ad blocker—it's security software. It stops your browser from even connecting to malicious domains, preventing attacks before they start.
9. Kick Out Old Devices from Your Accounts
That old iPad you sold on Craigslist three years ago? It's probably still logged into your Gmail.
How to check:
Google: myaccount.google.com/device-activity
Apple: Settings → [Your Name] → Scroll down to see devices
Facebook: Settings → Security → Where You're Logged In
What to do: Click "Sign Out" or "Remove" on any device you don't currently own or use.
10. Change Your DNS to Stop Your ISP from Tracking You
Your internet provider sees every website you visit, even if the site uses HTTPS encryption.
The fix: Change your DNS (Domain Name System) server.
Recommended Services:
Quad9: 9.9.9.9
Blocks known malicious sites
Run by a Swiss non-profit
No logging of your queries
NextDNS: nextdns.io
Customizable ad/tracker blocking
Blocks malware at the network level
Free for up to 300,000 queries/month
Where to change it:
Router level: Protects all devices on your home network
Device level: Protects just your phone or laptop
Search "how to change DNS on [your device]" for step-by-step instructions.
Start Small, Build Momentum
You don't need to implement all 10 today. Pick three that seem easiest and start there:
Easiest wins:
Install uBlock Origin (2 minutes)
Run a "device audit" on your Google/Apple accounts (5 minutes)
Switch your browser search engine to DuckDuckGo (30 seconds)
Medium effort:
Set up a password manager (30 minutes)
Create your first email alias (10 minutes)
Weekend project:
Google yourself and opt out of data broker sites (60 minutes)
Get a VoIP number for future signups (15 minutes)
Privacy isn't about perfection. It's about making yourself a harder target than the next person. These 10 steps do exactly that.
About Brightside
Brightside is a digital privacy platform that shows you exactly what information about you is exposed online and helps you secure it.
What Brightside Does
Digital Footprint Scanning
The app scans your complete digital presence across six categories: personal information (email addresses, phone numbers, home addresses), data leaks (compromised passwords, dark web presence, exposed credentials), online services (LinkedIn, Spotify, dating sites), personal interests (forums, hobbies), social connections, and location data.
Data Leak Detection
Brightside identifies compromised passwords, exposed credentials, and whether your information appears on the dark web or in identity document leaks.
Data Broker Removal
The platform identifies which data brokers hold your information and automates removal requests to reduce spam and unwanted exposure.
Personal Safety Score
You get a dynamic risk assessment based on your exposed data points and their relevance to your specific concerns, whether that's identity theft, financial security, or stalking prevention.
Brighty Privacy Companion
When you find exposed data, click on it to launch an interactive chat with Brighty, your privacy companion. Brighty provides step-by-step instructions for securing each issue, explains why it matters in plain language, and offers specific privacy tips like configuring LinkedIn settings or using email aliases.
How It Works
Choose what you want to protect (finances, identity, online visibility, account access) and Brightside tailors its recommendations to those specific goals. Instead of generic advice, you get personalized action plans that match your actual exposure and priorities.
Personal Data & Privacy
Both
How-To Guide
Control My Online Visibility
Stop Doxxing

Social Media Security Checklist: Protect Your Privacy Now
Personal Data & Privacy
,
Control My Online Visibility
Jan 13, 2026
Work & Company
Work Security
How-To Guide
Recognize Phishing at Work
Stay Compliant

Build a Phishing Simulation Program That Drives Real Behavior Change
Work & Company
,
Recognize Phishing at Work
Jan 12, 2026
Personal Data & Privacy
Personal Privacy
Checklist
Secure My Data & Devices
Prevent Data Breaches

Smart Home Security Checklist: How To Stay Safe Without Giving Up All Your Data
Personal Data & Privacy
,
Secure My Data & Devices
Jan 10, 2026
Device & Browser Security
Personal Privacy
Article
Secure My Data & Devices
Avoid Getting Hacked

Are Browser Extensions Spying on You? Safety Guide
Device & Browser Security
,
Secure My Data & Devices
Jan 9, 2026