Cybersecurity Checklist: Follow These Simple Steps to Break Bad Habits
Our security experts tell you how to change the way you interact online, lock down your devices, and clean up your digital spaces.
By Kim Key
When my dad built me my first computer and encouraged me to explore online, he didn't post a list of cybersecurity best practice guidelines to follow on my wall. Instead, he gave me several free hours of AOL access via a shiny CD and a noisy modem and told me to have fun. The internet has changed since then, and staying safe online now requires families to adopt a different, more vigilant routine to reduce the risk of falling victim to phishing or another type of scam. Luckily that routine doesn't need to be cumbersome, and even a few small changes to your online behavior—like keeping your browser up to date and using a password manager—can go a long way. This checklist can help you get started.
PCMag's Online Safety Checklist
Complete your monthly cybersecurity checkup in minutes using this handy checklist.
1-Security Software Checks
- Download and install a password manager app on all of your devices.
- Create new, unique passwords with at least 20 characters and store passkeys in the vault.
- Install antivirus software on all your internet-connected devices.
- Check to make sure your antivirus software is running.
- Monitor your credit report and investigate any suspicious activity immediately.
2-Digital Housekeeping Tasks
- Install operating system patches or updates.
- Update your web browser.
- Update your antivirus software.
- Back up your data to an offline source and store it securely.
- Clear the browser cache on all of your devices.
- Browse the library on your mobile devices and delete out-of-date or unused apps.
3-Online Habits Checkup
- Don't open files attached to emails and messages from senders you don't recognize.
- Don't click on links from senders you don't recognize.
- Don't send money online to anyone you've never met in person.
- Don't overshare news about your family, job, vacation, or other personal life events on public social media sites.
- Always enable a form of multi-factor authentication for your online accounts.
- Always turn on multi-factor authentication for your online accounts.
- Always protect your devices with a passcode or biometric authentication.
This is not an exhaustive list of cybersecurity suggestions. You know what's best for you, your family, and your lifestyle, so feel free to add or omit tasks as necessary.
Check Off Your Security Tasks
While putting together this checklist, I sourced some ideas from Google's Workspace Learning Center and a different security checklist from Purdue University's Information Technology division. I also asked some of my PCMag colleagues to tell me about any periodic cybersecurity-related tasks that don't take much time but bring them peace of mind.
Lead software analyst Michael Muchmore said that he keeps up with operating system updates on his devices. Lead security analyst Neil J. Rubenking told me he gets monthly credit score updates via Credit Karma and Experian.
I recommend backing up and deleting old files (especially those with sensitive personal information) from old online accounts yearly and dumping your desktop and mobile browser caches whenever you think about it. I also periodically check the tracking permissions granted to mobile apps since updates can add new default settings that require an opt out.
IRL Tech Safety Suggestions
Work on your security hygiene offline, too. When you get a new computer, remember to back up your files and then wipe the old computer's hard drive. For more, check out our thorough guide to getting your computer ready to recycle or sell.
The same advice applies to mobile devices like phones and tablets, too. Here's a guide to completely erasing your Android or iPhone.
It's a good idea to periodically back up any sensitive files you're storing on your hard drive or phone to an external hard drive. It may sound like overkill, but think about it: You probably keep important paper documents in a fireproof safe in your home. It's a good idea to keep the equivalent virtual documents on an air-gapped storage device. That way, if your system is infected by malware or otherwise compromised by a hacker, they can't access your valuable data.
How to Check Your Privacy Settings on Your Phone
Another critical part of cybersecurity defense is securing the mobile devices used by each household member. We have written about how to maintain privacy by stopping apps from collecting sensitive personal data, and we have tips on locking down a phone quickly in emergencies. Check out the videos below to learn how to customize your phone's privacy settings:
Cybersecurity Requires Vigilance
Bookmark this page so you can review this list once a month. It'll help you develop positive online safety habits. You may not need to perform every action each time, but it can be helpful to remember other security tasks you might need to do in the future.
One more thing: If you don't already have antivirus protection or a password manager, we've reviewed just about all of the major ones, so check out these stories for our top picks.