Skip to main content
BCIT News

Forensically speaking – 9 simple rules for using your online gadget

three smiling young adults posing for selfie photo

Seasonal special by guest author David McKay, BCIT Forensics Program Head, Forensic Science Option

In 2025, our digital lives are more interconnected than ever. From smartphones and laptops to smart home devices and wearables, our personal and professional information is constantly at risk from evolving cyber threats. Protecting your devices and personal data is no longer optional—it’s essential. This guide provides the latest strategies to safeguard your devices, avoid online scams, and stay safe on social media.

Cybercriminals now use advanced tools like artificial intelligence to craft convincing email phishing messages, deepfake videos, and voice clones. Scams are increasingly delivered via text (“smishing”), social media, and messaging apps, making them harder to spot and more dangerous than ever.

Anticipated key threats in 2026:

  • AI-powered phishing and deepfakes
  • Ransomware and malware targeting all devices
  • IoT vulnerabilities (smart devices)
  • Social media scams and impersonation
  • Smishing (SMS phishing) and vishing (voice phishing)

With the holiday season coming up, many of us may be receiving new digital devices and gadgets. Before you power them on, it’s time to think about how to protect your digital identity.

I discussed this recently with Marty Hurst, instructor of the BCIT Social Media and Open-Source Investigative Techniques course. Luckily, he’s one of the good guys (depending which side you’re on) and has years of experience sifting through social media posts, blogs, and other nefarious regions of the net to seek out criminals as part of his work as a police officer specializing in internet investigations.

Tips for how users of social media can protect their online presence while using their new device:

1. Carefully choose your surroundings when taking a selfie or posing with your new gadget.

Given the HD resolution used with the majority of electronic devices, it is easy than ever to spot items in a background or even a reflection. These could include bills, legal documents, or computer monitors with social media applications or banking software opened.

2. If your gadget is internet-enabled and requires username and password protection, choose uncommon ones.

Human nature typically predisposes us to choose usernames and passwords that are easy to remember. As a result, many of us have Facebook, Instagram, and Twitter accounts with identical or similar user credentials. However, choosing unique usernames and passwords reduces the ability of a hacker attempting to acquire your personal data.  You also want to use multi-factor authentication whenever you can.

3. Choose carefully where you post pictures of your recently acquired gifts.

Be cautious when attributing hashtags to describe a gift, and consider enhancing the privacy level of the audience reviewing your online photo. It can be easy for others to determine who you are, what your travel patterns might be, and eventually use your information to attempt theft.

4. Think twice before making an online customer reviews via a social media account.

Yes, it is good to share your experiences (within reason) with others online about how good, or how bad, the gadget you acquired is. Be careful when doing so directly from an identified social media account. Using this method opens your online world up to a variety of people who may want to further harvest your personal data.

5. Use software that disables web-tracking.

Using disabling software such as Ghostery reduces the ability for 3rd party applications from analyzing your web-browsing habits. Once habits are analyzed, you may find advertising for a product you have been searching for shows up on random websites. The less they know, the more in control you are.

6. Protect your information when you sell used gadgets via online marketplaces.

Make sure you use your device’s factory reset to remove all personal information and data from your old device. Depending on the model and device type, in some cases this still may not be enough – you may need to use a third party software or app that is made for wiping sensitive information from devices.

7. Protect yourself when trying to sell older model gadgets or trading up, via online marketplaces.

You have a new gadget, and now you need to get rid of the older model you still have. Selling it online is efficient, but be careful with the information you place in the online ad. Consider creating a new email address for the sales ad, since using the same singular email address allows others to triangulate your various social media platforms.

8. Protect others’ privacy when uploading photos with your gadget.

Are you at a social function showing off your gadget? Be mindful of other people who may be in your photograph, and obtain their consent if sharing the photograph online. The last thing you want to do is expose your friend’s personal lives without their consent.

9. Do not identify that you are away from your home on holidays when posting information about your gadget.

Curb your online enthusiasm and do not post that you are away – otherwise you’re potentially alerting others that your home is ripe for the picking. In extreme cases, such information can even be used against you when filing a claim with an insurance agency for items stolen from your home.

So there you have it. Tips from a pro, tips from someone who actually harvests data from online platforms. Some good rules to follow. Now go post that selfie, safely.

Sign up for the twice-yearly Forensics Investigator and keep up with the latest from BCIT Forensics

Feature photo by Scott McAlpine