Ally logo. Go to Ally.com
security

Your cybersecurity checklist: Assessing online safety

·4 min read

Whether you’re paying bills, connecting with friends or keeping up with the news, you probably spend a lot of your time in the digital world. But how much time do you spend checking your online safety? Help keep yourself and your information secure by taking stock of your security with these best practices.

15 cybersecurity best practices

1. Automate your operating system updates

If a widespread vulnerability arises, security updates are released quickly to address it. Enabling automatic updates ensures you don’t miss a crucial new safeguard.

2. Use a secure file-sharing platform

Want to share documents and photos with friends and colleagues? The internet makes file-sharing a snap, but if you don’t want your pics shared beyond your intended audience, it’s important to use a secure platform. A safe service will encrypt data as it’s being transmitted and preserve data integrity.

3. Build strong passwords

Not all passwords are created equal. Ironclad passwords are original and use a mix of letters, numbers and symbols. Make your passwords at least 15 or 20 characters long - the longer your password is the harder it will be to crack.

4. Don’t use the same password twice

As tempting as it is, don’t reuse passwords across multiple sites and platforms. If you need help remembering your password, turn a sentence or phrase into a password, and you’re more likely to remember it. You might also consider a password manager, which creates and stores passwords for your various accounts.

5. Enable MFA when possible

Double down on access control for your online accounts with multi-factor authentication, also known as MFA, when it’s available. With this protection, you need to use a combination of factors to access your account. You will most commonly enter a knowledge factor, a possession factor or an inherence factor. A knowledge factor requires you to answer a security question or enter a pin, while a possession factor could include a physical item like a badge, token or SIM card. Examples of inherence factors include a fingerprint scan or facial recognition.

If you need help remembering your password, turn a sentence or phrase into a password, and you’re more likely to remember it.

6. Don’t share passwords

Your passwords are only as safe as the people who have access to them, so avoid sharing them with others unless necessary. Others may not take security as seriously as you, so don’t give them the chance to put your information at risk.

7. Use encrypted email or messaging

Digital communications like email and text messages will always be more secure when encrypted. That’s when the information contained within the communication is coded, hidden or distorted to make it tougher for cybercriminals to access. You likely have some kind of encryption through your email and text providers, but it never hurts to check.

8. Learn how to recognize phishing and smishing

Odds are, you or someone you know has been targeted by phishing (aka cybercriminals pretending to be someone else via email or text). If something seems off or too good to be true, it probably is. Don’t take the bait. Use caution when opening messages or emails from unfamiliar addresses, and don’t click on any suspicious links.

9. Be conscious of social scammers

When savvy hackers use deception to get personal information and use it for fraudulent purposes, it’s known as social engineering. From sweetheart scams to get-rich-quick schemes and bank impersonators, beware of signs of these strategies when interacting with people you haven’t met in person — like pleas for your passwords or to wire money.

10. Back up data to an encrypted drive

You already know encryption can protect your emails and messages. It can do the same for your data in the cloud. Encrypting your cloud backup makes your personal info unreadable so it cannot be intercepted.

11. Download antivirus software

Even if your operating system has built-in antivirus protection, additional software may be beneficial since new threats are constantly emerging. More than 350,000 new pieces of malware and potentially unwanted applications are registered each day, so it’s crucial to stay on top of potential problems.

12. Dispose of data securely

Just like you cut up an old credit card or shred your bank statements before disposing of them, tossing digital data should also be secure. You might consider using a data destruction or disk wipe service for old computers or hard drives. If you stop using a cloud service, be sure to retrieve all your data and close the account to avoid hackers finding your old information.

13. Use automatic locks on your devices

You wouldn’t leave your house without locking the front door, use the same amount of caution with your devices. Set up your smartphone or computer to automatically lock after it’s been idle for a minute or more to make sure your devices are not vulnerable. It’s particularly important in case you lose your device or it’s stolen.

14. Skip third-party app stores

When you download a new game, messaging platform or any other new app, be sure it’s from a reputable source and avoid lesser-known third-party app stores. Beware of apps that pop up and encourage you to download them. They may have dangerous malware.

15. Check your privacy settings

Whether on social media, online games or any other accounts where you input your personal information, the easiest way to protect it is to avoid giving it away in the first place. Strict privacy settings help you limit what you share with companies. And don’t just set it and forget it. Privacy settings frequently change, so do regular checkups to make sure you’re comfortable.

Check all the cybersecurity boxes

By having a comprehensive understanding of these steps, you can help protect yourself and your private information from the latest scams and security vulnerabilities online.

Explore more