Close
My Military
OneSource App
ARTICLE

10 Tips for Safe Internet Browsing

Woman typing

Safety Alert: Computer use can be monitored and it is impossible to completely clear your browser history. If you are afraid your internet usage might be monitored, call the National Domestic Violence Hotline at 800-799-7233 or 800-787-3224 en Español.

Most of us use smartphones, handheld devices and computers without thinking twice about safe internet browsing. But every online interaction leaves a trail of electronic breadcrumbs others can track.

If you feel that your partner is monitoring your online activity, you might be right. Today’s technology has allowed for new forms of domestic abuse, in this case technology (or digital) abuse, by increasing:

  • Access to private information
  • Control over online accounts
  • Use of mobile devices to track a person’s whereabouts

Start practicing safe internet browsing today by following these 10 tips.

The safest way to search for sensitive information on the internet — such as getting help with domestic abuse — is to do so on a device you know your partner won’t be able to access. For example, you may ask a friend who is practicing safe social distancing to use their computer. Libraries can also provide safe computer use.

Web browsing on your smartphone is also easily tracked, as are you through their use. Cellphone GPS and tracking software can make it easy for an abuser to track you. You can turn on airplane mode or completely turn off your phone to disable the tracking. Check out these cellphone safety tips:

  • Lock down your phone: One of the most important things you can do is put a passcode on your phone. This helps prevent someone from going through it and installing unwanted apps or malicious software, such as spyware.

    Most phones unlock with a four- to six-digit code. Pick a code that only you know. Some phones have other lock options, such as a pattern, thumbprint or facial recognition. Be cautious about allowing others to add their thumbprint or facial image to your phone.

    If someone else needs to get into your phone (and you trust them), you can always tell them your code and then change it afterward.
  • Review your iCloud and Google accounts: If you have a cellphone, you likely also have an associated iCloud (for iPhones) or Google (for Android) account. These accounts often hold your phone’s backup information, and depending on your settings, can include sensitive information such as photos, notes, contacts and calendars.

    It is possible to access these accounts from your phone, as well as from other phones and computers. This means that anyone who knows the username and password to your iCloud or Google account can log in and see some of the information that’s on your device.

    To help protect your personal data:
    • Make sure nobody else knows your username and password.
    • Ensure that the email address associated with your account is secure and that only you can access it.
    • If you have other devices connected to your iCloud or Google account, consider disconnecting them when you are not actively using them.
    • Know what information (photos, contacts, notes, etc.) is set to back up to your account. You can choose what information to back up in your phone’s settings.
  • Know the apps on your phone: People download millions of apps each day. Some use information from your phone to function. For example, map apps need to know your location to provide directions. But others may share information in harmful ways. To help increase your phone’s security:
    • Review the privacy settings so you know what information each app can access.
    • Delete apps you are not using, especially if they have a lot of permissions to access your data.
    • Deny access requests for apps that do not need it. For example, a gaming app that doesn’t involve location doesn’t need your location and shouldn’t require it.
    • Be cautious and avoid malware and other malicious apps by:
      • Saying yes when your phone prompts you for a software update. These often include security updates to your phone’s operating system.
      • Not downloading apps outside of official app stores. On Android phones, you can prevent this from accidentally happening by turning off “allow unknown sources” in the security settings. If you have an iPhone, set it to not allow the downloading of apps that are not in the App Store.
      • Turning on Google Play Protect to scan for malicious software before downloading apps.
      • Downloading antispyware and antimalware tools.
  • Choose when to connect to Wi-Fi and Bluetooth: Most cellphones now ask you to confirm if you want to connect with a Wi-Fi network or a Bluetooth-enabled device. But in most cases, if you’ve connected once, it will automatically connect again when you’re within range.

    Unless it’s a secure Wi-Fi network or a Bluetooth device you trust (for example, if you own the other Bluetooth device), consider “forgetting” the network or Bluetooth device after you’re done connecting. You can find this option under settings. Choose when to connect your cellphone, but more importantly, choose when not to connect.

On Military OneSource, the Safe Exit is a white button on a purple bar at the bottom of website content related to domestic abuse. If someone appears to be looking over your shoulder, you can quickly exit the site and your webpage will be redirected to Weather.com.

Other websites, such as the National Domestic Violence Hotline, use similar Safe Exit buttons.

Other quick-exit keyboard commands include:

  • Press CTRL + W on your PC keyboard to quickly close the current open tab.
  • Press Command + W on your MAC keyboard to quickly close the open tab.

If you are talking to a friend or family member about potential abuse, avoid using email or social media apps. Instead, try to talk in person or over the phone using a secure messenger app such as WhatsApp or Signal.

Also, if you receive abusive emails or texts, you may want to keep a record of them as you seek help for domestic abuse, stalking or harassment (even by a spouse or partner).

If you have logged on to any email account, app or online forum where you may have posted a comment related to domestic abuse, don’t forget to log out when you have finished your browsing session so no one else can log in as you or go through your account and read your posts or messages.

If possible, use a password on your computer so someone else cannot log in and access your browsing history or emails. When you step away from your computer, phone or other device, even if it’s for a few minutes, lock your computer. It’s good practice for everyone to lock any device that is not in use.

Continue to use old email accounts for content that’s OK for your partner to see. Create and use your new email account to sign in to websites, apps, forums, etc. Most email accounts are free. Contacts you share with your abuser should not be given your new email address.

It’s best to make a habit of using the private browsing mode (called “incognito mode” on Google Chrome and “InPrivate” on Internet Explorer). Once enabled, none of the activity on your computer in that browsing window will be stored.

Click the links below to view each browser’s instructions for how to activate its private browsing mode:

After you have researched information on domestic abuse or on how to leave an unsafe relationship, you may want to consider clearing your browsing history. Think of tips 8-10 (clearing the browsing history, cookies and toolbar searches) as a sandwich cookie: you have to eliminate all parts (top, middle and bottom) to get rid of the “evidence.”

Click on the links below to learn how to delete the browsing history for each search engine.

Keep in mind that if someone is monitoring your computer use, deleting all your browser history, cookies and toolbar searches may raise suspicion. Instead, delete just the websites you have visited that might make an abuser take notice. For example, pages that reference help for domestic abuse.

If you plan to clear search information, you must always do it in three locations: clearing the browsing history, cookies and toolbar searches. Cookies are small files stored on your computer that you need to remove. Find the link below for the browser you use and click on it to learn how to clear your cookies.

Keep in mind that if someone is monitoring your computer use, deleting all your browser history, cookies and toolbar searches may raise suspicion. Instead, delete just the websites you have visited that might make an abuser take notice. For example, pages that reference help for domestic abuse.

Toolbars keep a record of the search words you have typed into the toolbar search box. It’s important to remove this information as well. Remember that this is the final step of three when clearing evidence of searches: clearing the browsing history, cookies and toolbar searches.

Review the links below to learn how to erase toolbar searches from your browser.

Keep in mind that if someone is monitoring your computer use, deleting all your browser history, cookies and toolbar searches may raise suspicion. Instead, delete just the websites you have visited that might make an abuser take notice. For example, pages that reference help for domestic abuse.

For more information regarding technology safety, you may wish to consult this compilation of tips and resources from the Safety Net Project at the National Network to End Domestic Violence.

Inclusion of this information does not imply endorsement of the National Network to End Domestic Violence by the Defense Department.

For more resources and support for surviving domestic abuse, contact your local Family Advocacy Program Domestic Abuse Victim Advocate. For immediate support, call the National Domestic Violence Hotline at 800-799-7233.

Hands typing on a laptop computer

Domestic Abuse Victim Advocate Locator

Find help for domestic abuse from the victim advocate closest to you by using the Domestic Abuse Victim Advocate Locator — whether you’re in the United States or overseas.

Search Now

Learn about military bases worldwide. Get installation overviews, check-in procedures, housing, neighborhood information, contacts for programs and services, photos and more.

Find an Installation

SAFETY ALERT: If you need to exit this website in a hurry, click the “Exit Site” button and you will be quickly redirected to Weather.com.

Computer use can be monitored and is impossible to completely clear. If you are afraid your internet usage might be monitored, visit the 24/7 Family Advocacy Program Victim Advocate Locator or call the National Domestic Violence Hotline at 800−799−7233.