Simple Steps to Protect Your Privacy
Improving Internet Security in Your Home
Password-Protect Your Wireless (Wi-Fi) Internet Connection
Set Up and Manage User Accounts on a Windows 10 PC
Set Up and Manage User Accounts on a Mac (Running MacOS)
Secure Your Computer’s Web Browser
Customize the Security Settings When Using the Microsoft Edge Web Browser
Customize the Security Settings When Using the Safari Web Browser
Take Advantage of Web Browser Plug-Ins (Extensions)
Take Advantage of Security Tools Offered by Your Mobile Devices
Adjust the Security Settings on Your iPhone or iPad (running iOS 12)
Adjust the Security Settings on Your Android Mobile Device
Use Tools to Manage and Remember Your Passwords
Tips for Creating Secure Passwords
Apply Multiple Strategies to Protect Yourself Online
Using Your Favorite Web Browser
Choosing a Web Browser for Your Computer or Mobile Device
Consider a Specialty Web Browser Built for Privacy
Manage Microsoft Edge’s Cookie-Related Features
Manage Safari’s Cookie-Related Feature(s)
Manage Chrome’s Cookie-Related Feature(s)
Turning on Your Web Browser’s Privacy or Incognito Mode
Turn On Privacy (InPrivate) Mode Using Microsoft Edge
Turn On Private Mode Using Safari
Go Incognito Mode Using Chrome
Turn on Privacy Mode on Your iPhone’s Safari Web Browser
Turn on Privacy Mode on Your iPad’s Safari Web Browser
Turn on Privacy Mode on Your Android’s Chrome Web Browser
Managing Your Web Browser’s History Folder
Work with Microsoft Edge’s History Folder
Work with Safari’s History Folder
Work with Chrome’s History Folder
Managing Bookmarks and Other Information
Expanding Your Web Browser’s Functionality Using Optional Plug-Ins
How to Find, Download, and Install Plug-Ins
Learning the Benefits of Using a Virtual Private Network or Two-Factor Authentication
Using Apps on Your Mobile Device to Better Handle Many Online Activities
3 Protect Your Security When Working with Emails
Determining Where Email Vulnerabilities Can Happen
Preventing Unauthorized Physical Access to Your Computer or Mobile Device
Protecting Your Computer Against Viruses and Malware
Maintaining an Up-to-Date and Reliable Backup
Create a Backup Using a Windows 10 PC
Create a Backup Using MacOS’s Time Machine Feature
Choosing Additional Online Backup Solutions
Protecting Email Content as It’s Moving
Avoiding Phishing Schemes and Spam
Adjusting the Security and Privacy Features When Using Mail
Use the Email Security Features Built in to Mail for Windows 10 PCs
Use the Junk Mail Settings in Mail for the Mac
Use the Email Security Settings for Gmail
Use the Email Security Settings for Yahoo! Mail
Identifying and Avoiding Phishing Schemes
Dealing with a Phishing Scheme Email
Calling a Legitimate Phone Number for a Bank or Credit Card Issuer
Identifying Phishing Scheme Email Messages
Avoiding Email Security Problems Related to Human Error
4 Handling Online Banking Tasks Securely
Sending or Receiving Money Electronically
Addressing Online or Mobile Banking Security Concerns
Protecting Your Online Accounts
Creating a Secure Password and Keeping It a Secret
Changing Your Password Periodically
Using a Credit Card, not a Debit Card, to Make Online Purchases
Using Electronic Payments at Retail Locations or Online
Setting Up and Using Apple Pay
Set Up Apple Pay to Work with Your iPhone
Make a Purchase Using Apple Pay, Google Pay, or Samsung Pay
Using a Virtual Private Network for Online Banking via Wi-Fi
Download and Install a VPN to Your Computer
Download and Install a VPN to Your Mobile Device
Being Aware of Banking-Related Phishing Schemes
Signing Off from Your Online Banking Service When You’re Finished
Reporting a Suspected Problem Immediately
Turning On Two-Factor Authentication for Your Online Accounts
Turn On Two-Factor Authentication for Your Bank’s Website
Managing Credit Card Accounts Online
5 Protect Your Privacy and Security When Shopping Online
Avoiding Online Shopping Security Risks
Paying Attention to Product Descriptions
Watching Out for Counterfeit Goods
Ignoring Requests for Too Much Personal Information
Being Careful What You Sign Up For
Understanding Ratings and Reviews
Permitting Cookies When Shopping Online
Looking for Free Shipping Offers
Ensuring a Secure Internet Connection
Use a Price Comparison Website from a Computer
Use a Price Comparison Website from a Mobile App
Taking Advantage of Electronic Payment Options for Added Security
Use PayPal to Pay for Online Purchases
Your Information on Social Media Is Typically Public
Becoming Active on Social Media
Socializing (and More) on Facebook
Discerning Fake News from Real News
Addressing Privacy Concerns on Facebook
Getting Started Using and Staying Secure on Facebook
Set Up a Free Facebook Account
Create Your Public Facebook Profile
Adjust Your Account’s Privacy and Security Settings
Adjust Facebook’s Advertising-Related Settings
Adding Friends to Your Facebook Account
Staying Safe on Twitter and Instagram
Adjusting Twitter and Instagram Privacy and Security Settings
Customize Instagram’s Settings
Understanding What You’re Posting and Who Will See It
Using LinkedIn and Other Social Media Services Securely
Understanding the Pros and Cons of Geotagging
Turn Off Geotagging from Your iPhone/iPad
Turn Off Geotagging from Your Android-Based Mobile Device
Turn Off Geotagging on a Case-by-Case Basis
Weighing the Pros and Cons of Tagging Yourself and Others in Photos
7 Protect Your Privacy When Publishing and Sharing Photos Online
Organizing Your Digital Image Library Can Take Time
Storing, Editing, Organizing, and Sharing Your Digital Images via the Cloud
Using Platform-Related Cloud Photo Storage and Sharing Options
Using Third-Party Cloud Photo Storage and Sharing Options
Use Shutterfly’s Share Sites Feature
Choosing a Cloud-Based Photo Storage and Sharing Service
Sharing Photos via Social Media
Uploading a Photo to Your Instagram Account
Create a Personalized Online Album on Facebook
8 Safely Store Data, Documents, and Files in the Cloud
Benefits of Using Cloud Storage
Understanding Important Cloud Computing Concepts
Configuring Cloud-Based Services
Set Up OneDrive Functionality on Your Windows PCs
Set Up iCloud Functionality on Your Macs
Sharing Content with Others from iCloud Drive
Using iCloud with Other MacOS Apps
Using a Cross-Platform Cloud-Based Service
Sharing Large Files Using Dropbox
Perform a Dropbox Security Checkup
Using Cloud-Based File Sharing Services Safely
9 Customize the Security Settings on Your Smartphone or Tablet
Preventing Unauthorized People from Using Your Mobile Device
Setting Up the Passcode Feature
Set the Passcode (iPhone or iPad)
Turning On the Touch ID (iOS) or Finger Scanner (Android)
Activating Touch ID (iPhone or iPad)
Activating Fingerprint Scan (Android)
Taking Advantage of Face ID (iOS)
Restricting Access to Apps and Content
Taking Advantage of Parental Controls
Adjusting the App-Specific Privacy Settings on Your Mobile Device
Keeping Your Mobile Device’s Operating System and Apps Up to Date
Updating Your iPhone or iPad’s Operating System and Apps
Updating Your Android Mobile Device Operating System and Apps
Managing Your Mobile Device’s Wireless Connections
Send App-Specific Content Using AirDrop
Blocking and Managing Unwanted Calls to Your Smartphone
Block Specific Incoming Calls on Your iPhone
Block Specific Incoming Calls on an Android Smartphone
Bonus Online Chapters
1 How Web Surfing Affects the Online Ads You See
2 Work with Smart Appliances, Smart Speakers, and Home Security Tools
3 Protect Your Kids and Grandchildren Online
To access the online chapters, go to informit.com/onlineprivacy and click the Downloads tab below the book description. Click the link to download the chapters.