Information Security
Spring Cleaning Your Digital Life
Spring is often a time when people begin thinking about cleaning up their personal living space and getting rid of old belongings. It is also a good time to tighten your data security. Here are some places you might find some cyber dust bunnies!
- Update Software: If your browser says “update” at the top-right, it only takes a few moments to apply the update. When it reopens, you can restore all your tabs/windows under “history.” Check for Operating System updates and apply them for your computer, installed applications, smartphone, and smart home IoT devices.
- Change Breached Passwords: Most browsers and password managers will tell you if a password was discovered in a data breach. Be sure to use unique or randomized passwords for your accounts. This will prevent a threat actor from accessing other accounts where you reused the same email and password.
- Use Separate Emails: Consider having a separate email account for your most important services, such as your bank, insurance, smartphone login, social media, shopping, and professional communication. This will reduce the amount of personal data a threat actor has access to in the event that your email is compromised.
- Remove Sensitive Emails and Files: Have you ever emailed yourself a photo ID or tax form? Do you keep those files on your computer or phone? Consider sending them to a cloud backup solution and removing the files from your device. Check for any emails you sent to yourself.
- Backup Your Data: Turn on automatic backups for the data that is most important to you—anything you would not want to lose, such as photos, videos, documents, or creative projects. Another option is to use an external Solid-State Drive (SSD) to backup your computer files. This ensures that only you have access to those files.
- Review Privacy Settings: Check your social media account settings to see who or what has access to your data. Also, check your smartphone and computer privacy settings. Limit or remove permission for apps that you no longer use. Just because an app requests permission for your contacts, it does not mean you have to grant it.
- Dispose of Old Electronics Properly: Do you have old personal computers or smartphones stored in a closet? How about tablets, gaming consoles, or wearables you no longer use? Before disposing of it, be sure to always factor reset the device to wipe any personal data.
- Setup Account Recovery: Setting up multiple recovery options for your personal accounts is important if your device is ever locked out or stolen. You may even be able to add a friend or family member as a trusted contact for assisted account recovery. Consider a major life event where you may have to take on the responsibility for a family member’s account.
These are only a few examples of where you may practice more cyber security. When handling sensitive data, be sure to follow any applicable laws and regulations.