Reporting Elections, Safety and Security of Journalists or visible on screens in a photo. Even the type of laptop, email client, browser or phone system you use could fuel an informed and convincing phishing attack. Personal posts can result in professional attacks: a new car photo in front of your house can reveal your address and other information. Credit cards, driver’s licenses, passports, and any other personal identifiers can be found in the background (or forefront) of images on social media. All of this personally identifiable information (PII), can put your identity at risk, and it can be used to impersonate you to your employer for a corporate attack. Any photo with geolocation enabled can let criminals know you’re out of town and your home is empty. And photos can be easily reverse searched to find out additional information. Having a phone number and email address associated with your social media accounts may be required for the account or requested for security purposes, but check the settings to make sure they don’t make you or the account vulnerable. 1.2 Practice good account hygiene Because software that cracks passwords is always getting better, what we used to think was a strong password may no longer be enough to keep us safe. Passphrases are much stronger than passwords – the more 45