• CyberGuardian Security Checklist

  • Ord-erCyberGuardian Security Checklist ItemBook SectionPrior-ity GroupWhen To Do
    1Freeze your credit at the 4 credit bureaus and check your credit report frequently at each. R. Financial SecurityVHOnce, then Frequently
    2Install antivirus on personal computer(s) and smartphone(s), so that it runs continuouslyD.8. Antivirus Software to the RescueVHWeekly
    3Encrypt your files on all devices. Consult a professional, if necessary. O.3. Disk (Storage) EncryptionVHOnce
    4Maintain a remote, multi-version backup of personal computer and smartphone files.S.3. Backup StrategyVHContinuously; monthly monitor
    5Create long, unique, memorable passwords for all online accounts. G. PasswordsVHOnce
    6Set up two-factor authentication (2FA; MFA) at all your important online accounts (government, banks, investments, credit cards, …..).G.2. Two Factor Authentication (2FA)VHOnce
    7In email, don’t click on attachments or links unless expected and sure of source.J. EmailVHAlways
    8Keep software (operating system, web browser, apps, …) up to date on all PCs and smartphones using only the native auto-update feature. O. Personal ComputersVHAlways
    9Setup a software firewall on personal devices through operating system or security suite.F.7. FirewallsHOnce
    10Set up non-Administrator accounts for yourself and other users on your PC. O.1. Separate Accounts for Multiple Users on PCsHOnce
    11Set up your home router with a non-personal SSID, strong password, encryption, firewall enabled, and remote management turned off. Login annually to ensure firmware is up-to-date. F.2. A Secure Home Router is a MustHOnce
    12Use Public Wi-Fi only with a secure VPN. Avoid online financial transactions on public Wi-Fi. F.3. Public NetworksHAlways
    13Use a Password Manager, browser-based or add-on, to manage your passwords. G.1. Password ManagersHOnce
    14Set your devices to lock after a short time of inactivity.O.2. Physical Access ControlHOnce
    15Change all potentially compromised passwords when a major breach occurs.D.9. Major Data Breach?HAlways
    16If virus-infected, run antivirus and/or consult a professional .D.8. Antivirus Software to the RescueHAlways
    17When web browsing to a new site, examine the address bar details to ensure security.H. Web BrowsingHAs needed
    18If scam victim, change passwords, run antivirus, call police, contact credit bureaus & financial companies. Consult a professional, if necessary .D.10. Are You a Victim?HAlways
    19Don’t send important personal information in email.J. EmailHAlways
    20Frequently monitor financial accounts and set up automatic alerts.R. Financial SecurityHDaily
    21Avoid sending important personal information in text messages.K. TextingMAlways
    22Avoid entering online contests/surveys, mailing in warranty cards and excessive posting on Social Media. D.7. ScamsMAlways
    23Turn off unnecessary “local” communications features (e.g. Bluetooth, AirDrop, network sharing) when in public places.E.6. The Outside WorldMWhenever
    24Use touch/facial recognition (if available) and a non-obvious pass code for all devices.P.1. Physical Device SecurityMOnce
    25After migrating to a new computer, carefully erase all files. Consult a professional, if necessary. O.4. How do I securely dispose of my old personal computer?MAlways
    26After migrating to a new smartphone, carefully erase all files. Consult a professional, if necessary.P.8. Migrate from Old to New Smartphone (Securely)MAlways
    27Set up a pin access code with your phone service provider.P.5. Telephone Account AccessMOnce
    28Set up a guest network in your home WI-FI router for visitors who might request access. F.2. A Secure Home Router is a MustMOnce
    29If you are investing in a smart home, create a second, separate Wi-Fi network for your IoT devices.Q.8. Dealing with “Leakage”MOnce
    30Secure your web browsing by encrypting your DNS requests.H.2. Securing Your DNS InteractionsMOnce
    31Minimize tracking of your browser activity by going incognito or installing a blocking extension. H4. Minimizing & Avoiding Personal TrackingM 
    32Avoid clicking on ads when browsing – you may be clickjacked! H.4. Minimizing & Avoiding Personal TrackingMWhen- ever
    33If email security is very important, consider an enhanced email service.J.1. Consider Paying for Your Email ServiceMOnce
    34Get involved if your young children are online.M. Parenting Do’s & Don’tsMAlways
    35Review sharing and privacy settings for all social media accounts at least annually. I.1. Social MediaMOnce
    36Ensure that the firmware in your IoT devices is up-to-date. Q.8. Dealing with “Leakage”MAnnually
    37Get an IP Pin annually from the IRS at irs.gov to protect your tax submissions from fraud.R.1. Protect Your IdentityMAnnually
    38Quarterly, check your personal exposure on the Dark Web at https://haveibeenpwned.com . Change passwords as needed.D.5. The Dark WebLOften
    39Protect your employer’s business with secure home computing. N. Working from Home SecurelyLAlways
    40Set up personal email address aliases for your important online accounts.J. EmailLOnce
    41Minimize sharing of your cell phone number.G.3. Minimize Sharing Your Phone NumberLAlways
    42Only use your own cable connected to a traditional (120V) plug if charging device in a public place.E.6. The Outside WorldLAlways
    43Create a smartphone lock screen with alternate phone number and email.P.1. Physical Device SecurityLAlways
    44Delete unnecessary, personal files on all devices periodically.S.1. What to Keep and How Long to Keep It?LYearly
    45Minimize use of contact sharing.P.4. Contact SharingLAlways
    46Minimize use of location sharing.P.3. Location SharingLAlways
    47Create a printable record of personal cyber details ( Kick the Bucket letter) for your family (heirs).T. Kicking the BucketLOnce; update as needed
    48Periodically clean up stale personal data on websites.H.6. Clean Up Stale Digital Haunts and Personal DataLYearly
    49Establish accounts at major, official websites before a scammer does it for you.H.5. Shoppers BewareLOnce
    50Establish accounts at major social media apps before a scammer does it for you.I.1.1 Plant Your Flag!LOnce
    51Reduce stored emails.J.2. Reduce Stored EmailsLYearly
    52If smished, forward the message to 7726 to report it.K.1. Have You Been Smished?LWhen- ever
    53Gamers should document suspected hacking and report it to developers. L. GamingAlways
    54For excessive robo calls, contact phone service providers for blocking services.P.7. Guidance to Minimize Vishing (Spam Calls)LOnce
    55Don’t use your voice assistant to find numbers for important calls.Q.7. Voice Assistant “Leakage”LWhen- ever
    56Use smartphone “Pay” apps for more secure payments.R.4. Making Payments Securely in the 21st CenturyLWhen- ever