This web page provides tips for mitigating technology-related risks while getting the most out of your computing environment. It addresses privacy protection and some common privacy and identity threats.