• CyberGuardian Security Checklist

  • Book SectionSecurity Checklist Item Priority When
    D.10. Are You a Victim?If scam victim, change passwords, run antivirus, call police, contact credit bureaus & financial companies. Consult a professional, if necessary .MAlways
    D.5. The Dark WebCheck your personal exposure on the Dark Web at https://haveibeenpwned.com .MOften
    D.7. ScamsAvoid entering online contests/surveys, mailing in warranty cards and excessive posting on Social Media.MAlways
    D.8. Antivirus Software to the RescueInstall antivirus on personal computer(s) and smartphone(s) and run it weekly.VHWeekly
    D.8. Antivirus to the RescueIf virus-infected, run antivirus and/or consult a professional (W.1. Consulting a Professional).HAlways
    D.9. Major Data Breach?Change all passwords when a major breach occurs.HAlways
    E.6. The Outside WorldOnly use your own cable connected to a traditional (120V) plug if charging device in a public place.MAlways
    E.6. The Outside WorldTurn off your “local” communications features (e.g. Bluetooth, AirDrop, network sharing) when in public places.LWhenever
    F.2. A Secure Home Router is a MustSet up your home router with a non-personal SSID, memorable and strong password, WPA2 encryption, firewall enabled and remote management turned off. Consult a professional, if necessary .VHOnce
    F.2. A Secure Home Router is a MustLogin to your home router to perform needed maintenance (e.g. update firmware) annually. Consult a professional if necessary MYearly
    F.2. A Secure Home Router is a MustSet up a guest network in your home WI-FI router if visitors request access.LOnce
    F.3. Public NetworksUse Public Wi-Fi only with a secure VPN. Avoid online financial transactions on public Wi-Fi.HAlways
    F.7. FirewallsSetup a software firewall on personal devices through operating system or security suite.HOnce
    G. PasswordsCreate long, unique, memorable passwords for all online accounts.VHOnce
    G.1. Password ManagersUse a Password Manager, browser-based or add-on, to manage your passwords. HOnce
    G.2. Two Factor Authentication (2FA)Set up two-factor authentication (2FA) at all your important online accounts (government, banks, investments, credit cards, …..).VHOnce
    G.3. Minimize Sharing Your Phone NumberMinimize sharing of your cell phone number.MAlways
    H. Web BrowsingWhen web browsing to a new site, examine the address bar details to ensure security.MAs needed
    H.1. Securing Your DNS InteractionsSecure your Web browsing by encrypting your DNS requests.LOnce
    H.3. Minimizing & Avoiding Personal TrackingMinimize tracking of your browser activity by going incognito or installing a blocking extension.LAs needed
    H.3. Minimizing & Avoiding Personal Tracking Avoid clicking on ads when browsing – you may be clickjacked!LWhen- ever
    H.4. Shoppers Beware;Establish accounts at major, official websites before a scammer does it for you.LOnce
    H.5. Clean Up Stale Digital Haunts and Personal DataClean up stale website personal data.LYearly
    I.1. Social MediaReview sharing and privacy settings for all social media accounts at least annually.LOnce
    I.1.1 Plant Your Flag!Establish accounts at major social media apps before a scammer does it for you.LOnce
    J. EmailIn email, don’t click on attachments or links unless SURE of source.VHAlways
    J. EmailDon’t send important personal information in email.MAlways
    J. EmailSet up personal email address aliases for your important online accounts.MOnce
    J.1. Consider Paying for Your Email ServiceIf email is important, upgrade to business service for nominal cost.MOnce
    J.2. Reduce Stored EmailsReduce stored emails.LYearly
    K. TextingDon’t send important personal information in text messages.MAlways
    K.1. Have You Been Smished?If smished, forward the message to 7726 to report it.LWhen- ever
    L. GamingGamers should document suspected hacking and report it to developers. LAlways
    M. Parenting Do’s & Don’tsGet involved if your young children are online.MAlways
    N. Working from Home SecurelyUse your employer’s VPN when working remotely.HAlways
    O. Personal ComputersKeep software (operating system, web browser, apps, …) up to date on all PCs using only the native auto-update feature.VHAlways
    O.1. Separate Accounts for Multiple Users on PCsSet up non-Administrator accounts for yourself and other users on your PC.HOnce
    O.2. Shutdown WeeklyShutdown your Windows PC or Mac weekly to remove any lingering malware in computer memory.LWeekly
    O.3. Physical Access ControlSet your devices to lock after a short time of inactivity.LOnce
    O.4. Disk (Storage) EncryptionEncrypt your files on all devices. Consult a professional, if necessary MOnce
    O.5. How do I securely dispose of my old personal computer?;When migrating to a new computer, carefully erase all files. Consult a professional, if necessary .MAlways
    P. Smartphones and TabletsKeep software (operating system, web browser, apps, …) up to date on all smartphones using only the native auto-update feature.VHAlways
    P.1. Physical Device SecurityCreate a smartphone lock screen with alternate phone number and email.MAlways
    P.1. Physical Device SecurityUse touch/facial recognition (if available) and a non-obvious pass code for all devices.MOnce
    P.3. Location SharingMinimize use of location sharing.MAlways
    P.4. Contact SharingMinimize use of contact sharing.MAlways
    P.5. Telephone Account AccessSet up a pin access code with your phone service provider.MOnce
    P.7. Guidance to Minimize Vishing (Spam Calls)For excessive robo calls, contact phone service providers for blocking services.LOnce
    P.8. Migrate from Old to New Smartphone (Securely)When migrating to a new smartphone, carefully erase all files. Consult a professional, if necessary MAlways
    Q.6. Voice Assistant “Leakage”Don’t use your voice assistant to find numbers for important calls.LWhen- ever
    Q.7. Dealing with “Leakage”If you are investing in a smart home, create a second, separate Wi-Fi network for your IoT devices and check that your devices adhere to cybersecurity standards (e.g. UL 2900).LOnce
    R. Financial SecurityFreeze your credit at the 4 credit bureaus and check your credit rating annually at each.VHOnce, then Yearly
    R. Financial SecurityFrequently monitor financial accounts and set up automatic alerts.HDaily
    R.1. Protect Your IdentityGet an IP Pin annually from the IRS at irs.gov to protect your tax submissions from fraud.LAnnually
    R.4. Making Payments Securely in the 21st CenturyUse smartphone “Pay” apps for more secure payments.LWhen- ever
    S.1. What to Keep and How Long to Keep It?Purge unnecessary files on all devices periodically.LYearly
    S.3. Backup StrategyMaintain a remote, multi-version backup of personal computer and smartphone files.VHContinuously; monthly monitor
    T. Kicking the BucketCreate a printable record of personal cyber details ( Kick the Bucket letter) for your family (heirs).HOnce; updated as needed