Cybersecurity Pros Reveal 7 Smart Ways to Protect Your Personal Data
Many people turn first to their browser’s “Incognito” or “Private Browsing” mode, but the name can be misleading..
Figure 1. Top 7 Ways to Safeguard Your Personal Information.
“Private browsing isn’t actually that private,” says Jake Moore, a cybersecurity expert at ESET. “It simply stops your browser from storing your search history, cookies, and autofill data on your device.” Figure 1 shows Top 7 Ways to Safeguard Your Personal Information.
This can be handy when using a shared computer—say, when shopping for a surprise gift and wanting to hide your searches—but it does little to prevent outside parties from tracking your activity.
“It won’t conceal your identity from websites, your ISP, or advertisers,” Moore explains. “They can still view your IP address and track your activity if they choose to.”
Search engines are the front door to much of the internet, but many people are uneasy with how much data tech companies collect and use to fuel targeted advertising—ads that then seem to trail them across the web.
“Google gathers an enormous amount of user data for profiling and targeted ads, which is a major revenue source for them,” Moore says. “This level of data analysis can be extremely intrusive, and many users have no idea how closely their online activity is being monitored.”
Privacy-focused search engines offer strong alternatives. “I would always recommend DuckDuckGo,” says Alan Woodward, professor of cybersecurity at the University of Surrey.
In addition to its search engine, DuckDuckGo also provides a privacy-oriented web browser that can replace Google Chrome, Microsoft Edge, or Apple Safari. Both Moore and Woodward endorse these options for users seeking greater online privacy.
Although Big Tech isn’t poring over every line of your festive family email, your data is still being scanned for advertising purposes — “and it has been for years,” Moore notes.
This practice is what allows Gmail, Outlook, and Yahoo to provide free email services. For many people—myself included—the convenience outweighs the privacy trade-off. But if it doesn’t for you, there are alternatives.
Proton Mail is the most well-known option, offering end-to-end encryption and built-in anonymity. Its free tier includes 1GB of email storage plus an additional 5GB via Proton Drive. That’s roughly a third of what Google provides, but still more than enough for most users.
Many people are still uneasy about paying for things online, even though it’s becoming increasingly unavoidable. One reliable option is PayPal.
“PayPal is very convenient, and I’ve never had any issues with them selling my data or treating me as a commodity,” says Woodward.
Moore notes that PayPal can be a safer choice than entering your card details directly on retail sites, simply because you’re not handing over your information each time. And for those concerned about credit card data being intercepted, many banks now offer virtual cards for occasional or one-time use through their banking apps.
Apple or Android?
The rivalry between Apple and Android loyalists can be as intense as a local football feud, and experts are similarly split.
“One thing about Apple is that you’re locked into their ecosystem, so they do control you—but everything’s a bit tighter, and I personally feel safer,” says Woodward.
Apps on Apple’s App Store typically undergo slightly more rigorous vetting, which can make the platform feel more secure. Still, “Apple and Android both battle it out to learn what they can about their users,” Moore adds. “Both want as much user data as possible, because knowledge translates to power.”
Stay away from social media
The same issues apply to social media. While it’s undeniably woven into modern life, there’s no real middle ground between participating in online conversations and protecting your identity—or preventing platforms from harvesting your data.
Source: NETWORK WORLD
Cite this article:
Priyadharshini S (2025), Cybersecurity Pros Reveal 7 Smart Ways to Protect Your Personal Data, AnaTechMaz, pp.177

