In an age where data breaches make headlines weekly, personal cybersecurity isn't optional—it's essential. The average person has 100+ online accounts, each a potential entry point for attackers. This checklist gives you actionable steps to protect your digital life, from basic hygiene to advanced protection, prioritized by impact.
Key Takeaways
- 1Password manager + unique passwords is the single most impactful security improvement you can make
- 2Enable 2FA on email, financial, and cloud accounts—use authenticator apps over SMS when possible
- 3Keep all devices and software updated—updates patch known security vulnerabilities
- 4Never click links in suspicious emails—go directly to websites by typing the URL yourself
- 5Use encrypted backups following the 3-2-1 rule: 3 copies, 2 media types, 1 off-site
- 6Check haveibeenpwned.com regularly and change passwords for any accounts in breached services
1Why Personal Cybersecurity Matters
- **Phishing** — Fake emails/texts tricking you into revealing credentials or clicking malicious links
- **Credential stuffing** — Using leaked passwords from one breach to access your other accounts
- **Malware** — Software that steals data, encrypts files (ransomware), or monitors your activity
- **Social engineering** — Manipulating you into taking actions that compromise security
- **SIM swapping** — Attackers take over your phone number to bypass 2FA and reset passwords
- **Public WiFi attacks** — Intercepting data on unsecured networks
You're Not "Too Small" to Target
2Password Security (Foundation)
Password Security Checklist
Use a password manager
Install a password manager (Bitwarden, 1Password, LastPass, Dashlane). Store all passwords in it. You'll remember one master password; the manager handles everything else. This is the most important step.
Create a strong master password
Use a passphrase: 4-6 random words like "correct horse battery staple" or a sentence you'll remember. Minimum 16 characters. Write it down and store physically in a secure location.
Generate unique passwords for every account
Let your password manager generate random 16+ character passwords. Never reuse passwords across accounts. If one leaks, only that account is compromised.
Change compromised passwords immediately
Check haveibeenpwned.com to see if your email appears in breaches. Change any passwords associated with breached accounts.
Update critical accounts first
Prioritize: email (recovery for everything else), banking/financial, cloud storage, social media. These give attackers the most leverage.
| Password Type | Time to Crack | Security Level |
|---|---|---|
| 6 characters, lowercase | ~1 second | ❌ Terrible |
| 8 characters, mixed case + numbers | ~8 hours | ❌ Poor |
| 12 characters, mixed case + numbers + symbols | ~300 years | ⚠️ Moderate |
| 16+ random characters | ~billions of years | ✅ Strong |
| 4+ random words passphrase | ~550 million years | ✅ Strong |
3Two-Factor Authentication (2FA)
| Feature | Hardware Security Key Physical USB/NFC device | Authenticator App TOTP codes on phone | SMS Codes Text message codes | Email Codes Codes sent via email |
|---|---|---|---|---|
| Protection Level | Highest—phishing-proof | High—local codes, no SMS interception | Moderate—vulnerable to SIM swapping | Low—email is often primary target |
| Ease of Use | Moderate—need physical key | Good—phone always with you | High—no extra app needed | High |
| Price | $25-70 (YubiKey, Google Titan) | Free (Google Authenticator, Authy) | Free | Free |
| Recommended Use | High-value accounts, journalists, activists | General use, most accounts | Better than nothing, last resort | Avoid if possible |
- **Email** — Gateway to resetting all other accounts. Protect with strongest 2FA.
- **Financial accounts** — Banks, investment accounts, payment apps (PayPal, Venmo)
- **Cloud storage** — Google Drive, Dropbox, iCloud—may contain sensitive documents
- **Social media** — Can be used for identity theft, phishing friends, reputation damage
- **Work accounts** — Professional email, company systems
4Device Security
Smartphone Security
Enable screen lock
Use 6+ digit PIN, or biometrics (Face ID/fingerprint). Avoid pattern locks (easy to observe). Set auto-lock to 30 seconds or 1 minute.
Keep OS and apps updated
Enable automatic updates. Updates patch security vulnerabilities. Delaying updates leaves known holes open.
Only install from official stores
App Store (iOS) or Play Store (Android) only. Avoid sideloading apps. Review permissions before installing.
Enable Find My Device
iOS: Find My iPhone. Android: Find My Device. Allows locating, locking, or wiping if stolen.
Encrypt your device
iOS encrypts by default when you set a passcode. Android: Settings > Security > Encryption. Protects data if device is lost.
Review app permissions
Check which apps have access to camera, microphone, location, contacts. Remove unnecessary permissions.
Computer Security
Enable full-disk encryption
Windows: BitLocker. Mac: FileVault. Linux: LUKS. Protects data if laptop is stolen.
Use a standard user account
Don't use admin account daily. Create a standard user for regular tasks. Malware gets admin rights if you're logged in as admin.
Enable automatic OS updates
Windows: Windows Update settings. Mac: System Preferences > Software Update. Keep security patches current.
Use built-in antivirus
Windows Defender is effective. Don't disable it. Third-party antivirus rarely offers meaningful improvement.
Enable firewall
Built-in firewalls (Windows Firewall, macOS firewall) should be on. Blocks unauthorized incoming connections.
Lock when stepping away
Win+L (Windows) or Ctrl+Cmd+Q (Mac). Takes 1 second, prevents opportunistic access.
5Network Security
- **Change router default password** — Default passwords are publicly known. Set a strong, unique password.
- **Use WPA3 (or WPA2-AES)** — Never use WEP or WPA (outdated, easily cracked). Check router security settings.
- **Create a strong WiFi password** — 16+ characters, random. Share it carefully.
- **Update router firmware** — Log into router admin panel, check for updates. Auto-update if available.
- **Disable WPS** — WiFi Protected Setup has vulnerabilities. Disable it in router settings.
- **Consider a guest network** — Keep IoT devices (smart speakers, cameras) on separate network from computers/phones.
- **Rename your network** — Don't use identifying info (name, address). "FBI Surveillance Van" is a classic.
Public WiFi Dangers
| When to Use VPN | When VPN Not Necessary |
|---|---|
| Public WiFi networks | Home network you control |
| Accessing sensitive accounts on untrusted networks | Normal browsing at home |
| Traveling internationally | Using mobile data (carrier network) |
| Wanting to hide activity from ISP | HTTPS sites already encrypt data in transit |
6Email Security & Phishing Defense
- **Check sender address carefully** — Look at actual email address, not display name. "PayPal Security" might be security@paypa1.com (with a "1")
- **Hover over links before clicking** — See the actual URL destination. Phishing links often go to misspelled domains.
- **Be suspicious of urgency** — "Your account will be closed in 24 hours!" is designed to bypass careful thinking.
- **Don't download unexpected attachments** — Especially .exe, .zip, .js files. Even PDFs and Office docs can contain malware.
- **Verify requests independently** — Got an email from your bank? Don't click links—go directly to bank website or call number on your card.
- **Report phishing** — Forward to your email provider's abuse address. Gmail: report button. Helps train filters.
| Red Flag | Why It's Suspicious |
|---|---|
| Generic greeting ("Dear Customer") | Real companies know your name |
| Spelling/grammar errors | Legitimate companies proofread |
| Mismatched URLs | Link text says PayPal, actual link goes elsewhere |
| Threatening language | Creates urgency to bypass thinking |
| Request for password/PIN | Real companies never ask via email |
| Unexpected attachments | Common malware delivery method |
7Privacy Settings & Data Minimization
Social Media Privacy
Review privacy settings
Limit who can see your posts, friends list, personal info. Set profiles to private where possible.
Be careful what you share
Birthdate, pet names, schools attended—these are often security questions. Attackers research targets on social media.
Disable location tagging
Geotagged photos reveal where you live, work, travel. Disable automatic location on photos.
Audit app connections
Review which apps have access to Facebook/Google accounts. Remove any you don't actively use.
- **Use a privacy-focused browser** — Firefox or Brave for daily use. Avoid Chrome if privacy is a priority (Google tracking).
- **Install uBlock Origin** — Blocks ads and trackers. Available for all major browsers.
- **Use HTTPS everywhere** — Most browsers now warn about non-HTTPS sites. Avoid entering data on HTTP sites.
- **Clear cookies regularly** — Or use containers/profiles to separate browsing contexts.
- **Consider DNS-level blocking** — NextDNS or Pi-hole blocks trackers at network level.
Remove Yourself from Data Brokers
8Backup & Recovery
The 3-2-1 Backup Rule
| Backup Method | Pros | Cons |
|---|---|---|
| Cloud backup (iCloud, Google Drive) | Automatic, off-site, accessible anywhere | Ongoing cost, requires internet, privacy considerations |
| External hard drive | One-time cost, fast, private | Can fail, can be lost/stolen, requires manual action |
| NAS (Network storage) | Local + automatic, large capacity | Higher upfront cost, technical setup |
| Physical media (USB) | Cheap, portable | Easy to lose, not for large data |
- **Enable automatic cloud backup** — iCloud, Google Drive, or dedicated backup service (Backblaze, Carbonite)
- **Backup critical files locally** — External drive for photos, documents, irreplaceable files
- **Test your backups** — Can you actually restore from them? Test quarterly.
- **Encrypt backups** — Especially if storing off-site or in cloud. Protects if backup media is compromised.
- **Backup 2FA recovery codes** — Store in password manager AND printed in secure location
9Ongoing Security Hygiene
| Frequency | Action | Notes |
|---|---|---|
| Weekly | Check for software updates | OS, browsers, key apps |
| Monthly | Review account activity | Bank statements, login history |
| Monthly | Check haveibeenpwned.com | See if you appear in new breaches |
| Quarterly | Review app permissions | Remove unnecessary access |
| Quarterly | Audit 2FA coverage | Add to new important accounts |
| Yearly | Review connected apps/services | Remove unused OAuth connections |
| Yearly | Update recovery information | Phone numbers, backup emails current |
If You're Breached
Don't panic, but act quickly
Speed matters, but thoughtful action beats frantic clicking.
Change passwords immediately
Start with compromised account, then email, then financial accounts.
Enable/review 2FA
If not enabled, add it now. If enabled, check for unauthorized sessions.
Check for unauthorized activity
Review login history, sent emails, financial transactions.
Monitor credit if financial data exposed
Freeze credit at bureaus, monitor for new accounts in your name.
Report if serious
Identity theft: FTC at identitytheft.gov. Financial fraud: police report.
Advanced Protection (For High-Risk Users)
- **Hardware security keys for all accounts** — YubiKey or Google Titan on every important account. Phishing-proof.
- **Google Advanced Protection** — Requires hardware keys, blocks most phishing, restricts third-party app access.
- **Separate identities** — Different emails for different purposes. Don't link professional and personal.
- **Compartmentalization** — Different devices for different activities if warranted.
- **Physical security** — Laptop lock cables, privacy screens, awareness of shoulder surfing.
- **Secure communications** — Signal for messaging. Encrypted email (ProtonMail) for sensitive correspondence.
- **Tor Browser** — For anonymous browsing when needed. Slow but private.
- **Consider threat modeling** — What are you protecting? From whom? What's the realistic threat?