The “Digital GoBag” addresses the physical components required in an emergence. The question is:
How do you protect then and the information they access?
Whether a Techy or a Layperson, understanding the components required to secure you Devices and Information can be very overwhelming and intimidating. Below is a high-level checklist, the first step…
Passwords
– Do you have strong passwords? Length | Unique | Complex | …
– Do you use a Password Manager?
– Are you using Two-factor authentication (2FA)? aka: Multi-factor Authentication (MFA)
Devices
– Are your Operating System, Software, and Browsers up to date?
– Are you using ant-virus software?
– Is your Wi-Fi Network protected? Password | Firewall | Antivirus software | …
Information
– Is your Personally Identifiable Information (PII) secure?
– Is your Data Backed Up and do you have a Disaster Recovery Strategy?
– Are you giving the minimum levels of access? Principle of Least Privilege (PoLP)
– Are you Monitoring your accounts? Financial |Medical |Social | Travel | …
– Are you careful with your Email? Unsolicited | Links | Attachments | …
– Do you review Data Sharing /Privacy Settings? Application | Social Media | …
Best Practices
– Are you keeping up to date with the latest security practices?
– Do you avoid using Public Wi-Fi Hotspots and Charging Stations?
– Do you report Suspicious Activity?
– Do you Trust your Instinct?
As stated earlier: An emergency raises the risk because you may be using unknown resources, but the risk there is regardless. Knowledge /Awareness is critical.
The bottom line: Your Devices, Networks, Applications, Accounts must be protected…
