Cyber Security!

Big image

Taking inventory of your Digital Footprint!

Your digital footprint is huge and it cannot be erased. There is no way to delete your tracks, with information spread everywhere, it's important to think about what information you have and where it is. For example, how many websites have you stored your credit card info on?

You can keep track of your digital footprint by simply creating a spreadsheet on Microsoft's Excel or even Google's drive feature. If there is no websites you currently use and you have sensitive information on it, then it would be best to remove the information from the site.

Prioritize your sensitive accounts!

You can prioritize your accounts by the sensitivity of data such as personal or financial information. An easy scheme might be a classification of low, medium and high for the levels of data sensitivity associated with each site.

To make the classification, think about your sensitive data such as financial and health information, but also how much of an issue it would be if your account got hacked and someone had access to the information. They could alter the data, buy things or even steal your identity.

Access control!

For priority accounts, elevate your security and privacy settings. This means setting stronger passwords, changing your security questions, moving to higher levels of authentication and higher privacy settings. You will also want to change your passwords more frequently. Many new smartphones offer biometric authentication, which is access by your personal fingerprint.

Keeping up to date!

It is important to keep your operating system, browser and other critical software up to date with the latest patched to minimize threats from viruses and malware.

Disaster Recovery!

It is important to keep an eye on your accounts, watch out for suspicious activity such as monthly subscriptions you didn't know about.

Just like a business, your personal disaster recovery plan should help you continue your operations in the event of an adverse physical event, or if your accounts get compromised by cyber theft.