Skip to Main Content

Personal Cyber Security Checklist

Monday, December 2, 2024
Personal Cyber Security Checklist
Print

Unlike physical threats that prompt immediate action — like stopping, dropping and rolling if you catch on fire — cyber threats are often difficult to identify and understand. Cyber threats include dangers such as viruses erasing entire systems, intruders breaking into systems and altering files, intruders using your computer or device to attack others and intruders stealing confidential information. The spectrum of cyber risks is limitless; threats, some more serious and sophisticated than others, can have wide-ranging effects on the individual, community, organizational and national levels.

Before a Cyber Attack

You can increase your chances of avoiding cyber risks by setting up the proper controls. The following cyber security checklist are things you can do to protect yourself, your family and your property before a cyber incident occurs:

  • Ensure your network is protected. Only connect to the internet over secure, password-protected networks.
  • Think before you click. Do not click on links or pop-ups, open attachments or respond to emails from strangers.
  • Safeguard your personal information. Do not respond to online requests for personally identifiable information (PII). Most organizations — such as banks, universities and businesses — will never ask for your personal information over the internet.
  • Adjust your privacy settings. Limit who you are sharing information with by reviewing the privacy settings on your social media accounts.
  • Trust your instincts. If you think an offer is too good to be true, it probably is.
  • Secure your devices. Password-protect all devices that connect to the internet and all user accounts.
  • Make your password hard to guess. Do not use the same password twice — choose a password that means something to you and you only.
    • Change your passwords on a regular basis (every 90 days or so).
    • Create a password that’s between 8-64 characters long.
    • Instead of adding random numbers to your password, try using a combination of words, like a memorable phrase.
    • Avoid using pet or family names, birthdays, dates or common phrases in your password.
  • Multifactor authentication. Add an extra layer of security by using multifactor authentication alongside your password.
  • Report suspicious activity. If you see something suspicious, report it to the proper authorities.

The extent, nature and timing of cyber incidents are impossible to predict. There may or may not be any warning. Some cyber incidents take a long time (weeks, months or years) to be discovered and identified.

More About PII

PII is information that can be used to uniquely identify, contact or locate a single person. PII includes but is not limited to:

  • Full name
  • Social security number
  • Address
  • Date of birth
  • Place of birth
  • Driver’s license number
  • Vehicle registration plate number
  • Credit card numbers
  • Physical appearance
  • Gender or race

Take these steps if you believe your PII has been compromised:

  • Immediately change all passwords, and change your financial passwords first. If you used the same password for multiple resources, make sure to change it for each account, and do not use that password in the future.
  • If you believe the compromise was caused by malicious code, disconnect your computer from the internet.
  • Restart your computer in safe mode and perform a full system restore.
  • Contact businesses, including banks, where you have accounts, as well as credit reporting companies.
  • Close any accounts that may have been compromised. Watch for any unexplainable or unauthorized charges to your accounts.

In the Event of a Cyber Attack

Here are some of the steps you should take during a cyber attack:

Immediate Actions

  • Check to make sure the software on all of your systems is up to date.
  • Run a scan to make sure your system is not infected or acting suspiciously.
  • If you find a problem, disconnect your device from the internet and perform a full system restore.

At Home

  • Disconnect your device (e.g., computers, gaming systems or tablets) from the internet. By removing the internet connection, you prevent an attacker or virus from being able to access your computer and perform tasks such as locating personal data, manipulating or deleting files, or using your device to attack others.
  • If you have anti-virus software installed on your computer, update the virus definitions, if possible, and perform a manual scan of your entire system. Install all of the appropriate patches to fix known vulnerabilities.

After a Cyber Attack

In addition to insuring your home, we’re committed to helping you and your loved ones stay safe when disaster strikes. If you would like more information on how to protect yourself from a cyber attack, please contact us today.

Material posted on this website is for informational purposes only and does not constitute a legal opinion or medical advice. Contact your legal representative or medical professional for information specific to your legal or medical needs.