When someone tries to reset a password, they’re often able to do so by answering security questions. Unfortunately, many of these questions are asking for information that’s either publicly available or very easy to find: Your date of birth, the name of your first pet, or your mother’s maiden name, for example. If an account doesn’t have two-step verification and you’re concerned about the possibility of someone trying to reset your account, consider giving the wrong answers for these questions.


You can make up a false location, date, or name, or answer a different question than the one asked—giving a place of birth when asked about a maiden name, for example. The only drawback with this approach is that can, of course, be difficult to remember what your security answers are, so make sure to store them in a safe place. You can store your strong security questions and answers on your password manager.

Check out more digital hygiene tips:

  1. Removing public data
  2. Privacy protection on domain names
  3. Https everywhere
  4. Anonymous “Tor” cloak or VPN
  5. Prepare for a DDos attack
  6. Two-step verification
  7. Privacy plug-ins/cookies
  8. Third-party permissions
  9. Image “hidden pixels”
  10. Links and attachments
  11. Install patches and updates
  12. Use a password manager/strong password
  13. Strengthen security questions
  14. Encrypt hard drive/backup data
  15. Click to play
  16. Use end-to-end encryption

Published by michelleferrier

Executive Director, Media Innovation Collaboratory; Founder, Troll-Busters.com | Online Pest Control for Women Writers and Journalists;

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: