Your Security Progress

0 of 0 items completed

Password Security

Strong, unique passwords are your first line of defense

Password managers generate and store unique, complex passwords for all your accounts. They sync across devices and only require you to remember one master password.

CISA Password Guidelines

Reusing passwords means one breach compromises all your accounts. Use passphrases like "Coffee$Morning#Walk2024" instead of complex character combinations.

Default passwords are often well-known or easily guessed (like "admin" or "password"). This includes routers, smart devices, and new accounts.

Two-Factor Authentication (2FA)

Add an extra layer of security to your most important accounts

Email is often used to reset passwords for other accounts, making it a high-value target. Use authenticator apps like Google Authenticator or Authy instead of SMS when possible.

Google Security Center

Financial accounts contain sensitive information and direct access to your money. Most banks and credit cards now offer 2FA options through apps or text messages.

Compromised social media accounts can be used to spread malware, scam your contacts, or damage your reputation through impersonation.

Backup codes allow you to access your accounts if you lose your phone or authenticator app. Store them securely and never share them.

Software Updates & Maintenance

Keep your systems secure with regular updates

Security patches fix vulnerabilities that attackers exploit. Automatic updates ensure you get these fixes as soon as they're available.

Browsers are frequent targets for attacks. Updates include security fixes and new privacy features. Most browsers update automatically by default.

Modern antivirus goes beyond traditional virus detection to include real-time protection, web security, and behavior analysis. Windows Defender is included with Windows and is quite effective.

Safe Browsing Habits

Develop habits that protect you while surfing the web

Look for HTTPS (the lock icon), check for typos in domain names (like "g00gle.com"), and type URLs directly instead of clicking links in emails.

Third-party download sites often bundle malware with legitimate software. Stick to official app stores and vendor websites for downloads.

Data Backup & Recovery

Protect your important files from loss or ransomware

Cloud backups protect against device theft, damage, and ransomware. Most services offer automatic syncing of important folders and files.

Offline backups provide protection even if your internet connection or cloud service is compromised. Follow the 3-2-1 rule: 3 copies, 2 different media types, 1 offsite.

A backup is only useful if it actually works. Periodically try restoring files from your backup to make sure the process works when you need it.