Member-only story

My Cybersecurity Checklist

Laura Ward
8 min readJan 23, 2024

--

A simple guide to keep your identity secure

Photo by sebastiaan stam on Unsplash

Last night, I updated my phone to Apple’s iOS 17.3 and saw that it included a new feature: Stolen Device Protection. After doing some research, I turned it on for my phone, and I recommend you turn it on, too. A new security feature release from Apple is an excellent reason to review all your security practices, so I’ll share a straightforward checklist so you can do the same.

Before the checklist, let’s get familiar with the most common risks to your online security: social engineering scams, identity theft, and brute-force attacks.

The most common risks to your online security are social engineering scams, identity theft, and brute-force attacks.

Social engineering scams start with an email or text that sounds urgent, telling you to take immediate action. These criminals are betting that you won’t look closely at the link they are sending and will click it to fix the problem. The best way to avoid scams is to pause when something that uses urgent language is sent to you. If you need more clarification, confirm the information by visiting the website directly instead of using the link in the message.

Identity theft happens when vital information about your identity, such as your social security number or other personal identifying details, has been…

--

--

Laura Ward
Laura Ward

Written by Laura Ward

Design the things you want to see in this world

No responses yet