Top 20 Privacy Tips

First of all you must take your data privacy very seriously!

It is recommended to protect your data now before it is too late! 

SecPoint Privacy Guide

Privacy Tips 

Privacy on the internet is harder to achieve than ever before. Attackers use various techniques to invade your privacy, steal sensitive data, and launch other malicious attacks.

Here are some tips to enhance your online privacy:

1: Use two-factor authentication (2FA) on every site with a login. Avoid email/SMS 2FA and opt for Google Authenticator or Authy.

2: Consider using a privacy-focused operating system like Linux that does not collect your data.

3: Disable the microphone and webcam on your laptops when they are not in use.

4: Strengthen security by disabling booting from USB and setting a BIOS password.

5: Differentiate between work-related tasks and leisure activities by using separate laptops for each purpose.

6: Opt for an unlocked smartphone with a privacy-focused operating system, such as GrapheneOS. Disable unnecessary location tracking and block network access for certain apps.

7: When making calls or sending texts, use privacy-focused apps like Signal or Session.

8: Beware of phishing attempts through email and avoid clicking on links. Instead, visit websites manually and perform actions directly.

9: Never upload sensitive data to cloud storage providers or websites that might store and share it with third parties.

10: Ensure that no Network Attached Storage (NAS) or storage devices are connected to your router to prevent potential data leaks.

11: Avoid uploading sensitive data to websites like cloud virus scanning, pastebin, or temporary data posting sites, as they may retain and share the data.

12: When using public WiFi, always use a VPN software to secure your connection.

13: Refrain from inserting unknown USBs, CDs, or removable media devices into your computer, and if possible, disable USB ports when not in use.

14: Create strong passwords with a minimum of 12 characters, combining words, lowercase and uppercase letters, numbers, and special characters. Avoid reusing passwords across multiple sites.

15: Never write down sensitive data or upload pictures containing sensitive information on social media platforms.

16: Check if your email addresses have been involved in any data breaches at websites like

17: Use privacy-focused email providers such as ProtonMail or Tutanota.

18: Use privacy-focused web browsers on your computer and smartphone, such as Brave, Vanadium, or Firefox.

19: Use privacy-focused search engines, such as DuckDuckGo, and avoid logging into accounts such as Google to prevent being profiled.

20: Consider using privacy-aware DNS services, such as OpenDNS, Cloudflare, OpenNIC, or Quad9.


Stay informed about the latest privacy practices and update your knowledge regularly.

By implementing these practices, you can significantly improve your online privacy and security.


To stay updated on cybersecurity and privacy-related topics, please visit


Malicious attackers can easily get in to your email, gain full access to your phone number.

And in other ways to pretend being you.

This can lead to takeover of your accounts and loss of data.

Every time when downloading a software such as Anti Virus, Malware clean always make sure to download from an official website.

There are fake websites that provide the software with backdoors installed.

So only install from official sources.

Top Privacy Checklists

Password Privacy Checklist 

Personal Computer & BIOS Privacy Checklist

Email Privacy Checklist

Web Browser Privacy Checklist

Internet Privacy Checklist

Smartphone Privacy Checklist

Crypto Currencies Privacy Checklist

Router Privacy Checklist

Public WiFi Privacy Checklis

Cloud Storage Privacy Checklist

Backup Privacy Checklist

Security Cameras Privacy Checklist

Remote Connection Software Privacy Checklist



Password Privacy Checklist

  • Change your password a few times a year and write it down in a safe place so you do not forget it.
  • Be careful not to reuse passwords on multiple sites.
  • Use a strong password minimum 10 characters example 3-4 words combined with small uppercase and special characters.
  • Always use 2FA connected with your password.
  • Do not give out your password on email, social media, over the phone or on instant messaging.

Personal Computer & BIOS Privacy Checklist

  • Always make sure to disable the Microphone in the operating system and in the BIOS.
  • Always encrypt the drive which will require a password to resume or to start up. Example in Linux LUKS.
  • Always set a BIOS password.
  • Always disable booting from a USB drive.
  • Disable Computrace in the BIOS if the option is there.
  • Use a VPN when not at your home network.
  • Use external encrypted DISK drives to backup your data. Often do backups such as on a weekly or monthly basis.
  • Set Cloudflare DNS and

It is recommended running LINUX, MAC or OpenBSD as operating system for less amount of data collection.

It is recommended to using one computer for your professional work and another computer for playing games and entertainment.

Use 2FA Authentication to any service you login to.


  • Deploy Anti Virus. On Windows install a preferred commercial antivirus.
  • In the operating system such as Windows navigate to the privacy menu and disable all data collecting.


  • In the operating system such as Ubuntu navigate to the privacy menu and disable all data collecting.
  • On linux use ClamAV to scan local system clamscan -r -i /  . Clamscan can have false positives always research.
  • On Linux use rootkit hunter ./rkhunter --chceck to scan local system download only from


  • Navigate to Privacy menu and disable all data collecting.
  • If using a MAC it is recommended to not login using an apple id.. You can still get updates only you cant access app store. Instead use Brew.

Email Privacy Checklist

  • Check your email address at if you are listed there consider change to another email address.
  • Only use a secure email such as Protonmail.
  • Use multiple email addresses. Example one for personal, one for business related, one for trading.
  • Often delete mails older than 1 month stored in the Cloud.
  • Never leave any sensitive data in your email.
  • Be very careful or have as a rule to never click any links coming in email.
  • Enable 2FA authentication. Do not use phone SMS 2FA instead use Google Authenticator or Authy

Web Browser Privacy Checklist

    Firefox Privacy Hardening checklist:
  • Install Malwarebytes plugin.
  • Install uBlock Origin plugin.
  • Enable HTTPS-Only Mode in all windows.
  • Disable all Firefox Data collection minimum 4 menus.
  • Enable DNS over HTTPS a select a vendor as Cloudflare or put a more private custom
  • Change search engine to Duck duck go or another privacy focused search engine & disable the Provide search suggestions option.
  • Set Firefox privacy mode to strict from Standard
  • In the address Bar option disable all suggest such as: Browsing history, Bookmarks, Open tabs, Shortcuts & Search engines.

Internet Privacy Privacy Checklist

*NEVER UPLOAD* any files to websites on the Internet or anywhere else.

This can be sites that keep files temporary or longer times. It can allow malicious actors to gain access to sensitive data.

  • virustotal - - - - - - - - -

Smartphone Android & IOS Privacy Checklist

  • Never use your phone number for authentication. SIM Swapping can be easily done. Use instead 2FA Authenticator apps.
  • Disable GEO location in the camera app. Make sure when you take pictures there is no GEO location data.
  • Disable Bluetooth when not being used.
  • Never call using the normal phone app or SMS. Instead use encrypted services such as Signal, Telegram.
  • Disable location tracking when not needed example if you are not using the GPS app for driving.
  • Disable storing of GEO location tracking in online services such as your Google ID.
  • Always password protect your smart phone with a code instead of fingerprint or face recognition.
  • Install a VPN client when not at your home network.
  • If you do not trust the microphone is turned off you can put in a Mic Blocker. It works the same way as if you put a headset in and the operating system switch to it. And in this case it will block the microphone.
  • Disable WiFi & Bluetooth when travelling to prevent leaking data and be subject to attack.
  • Preferred OS GrapheneOS ( Device. It can convert any traditional Google Pixel Device to a pure Android without any Google services or connections.
  • Disable automatic storing of pictures to the cloud. Some smartphones have enabled by default to upload your pictures to Google Drive, or Apple Cloud.
  • Set Cloudflare DNS and if it is not allowed set or
  • Goto the Privacy menu and disable ads Ads or advertising id.
  • On Android you can run Privacy guide and turn off or set to Paused all options. 

Crypto Currencies Privacy Checklist

  • Never give or show your 12 or 24 word seed phase to anyone.
  • Always store your crypto currencies offline and not leave it on an exchange.
  • Have written down in one or more secure place your seed phases for recovery.
  • Never have any crypto currency on your smart phone.
  • If storing on a computer only have it stored on a separate computer. Do not store it on the computer you play games on. 

Router Privacy Checklist

  • Make sure to limit access to the web interface.
  • Disable UPNP.
  • Do not connect any Network Enabled Harddrives example for movie or picture storing.
  • Disable access to the USB port on the router.
  • Set a strong WPA2 Password.
  • Lower the WiFi Signal strength so it can only be accessed in a short range. Making it harder for attackers to reach it.

Public WiFi Privacy Checklist

  • Be careful to connect to any public WiFi. Instead tether Internet from your phone.
  • Always use a VPN.
  • Do not click any popups  or update requests when on a public WiFi. 

Cloud Storage Privacy Checklist

  •  When using cloud providers such as , , google drive etc. do not store any sensitive data.

Backup Privacy Checklist

  • Always perform offline backup of your key files. It is not recommended to do backup to online Cloud services.
  • Perform backup on multiple encrypted USB hard drives which you can store in different locations.
  • Be sure to have the password for the drives in a safe place.

Security Cameras Privacy Checklist

  • First make sure your security cameras do not have an easy to access web interface that is widely accessible on the Internet. Multiple web cameras allows for attackers to easily gain access to the web interface and use search engines such as Shodan to discover them. 

Remote Connection Software Privacy Checklist

  • Be very careful if connecting with any remote desktop software such as Anydesk, Teamviewer etc. 
  • Always disable your microphone since it can be recording audio without you being aware.
  • If you need to use remote connection software for support be sure to exit the software after use.
  • Disable any automatic startup of the remote connection software when the operating system starts or it can leave you open to connection.