Comprehensive Security Checklist
This list is an attempt to consolidate best practices (outlined by credible security resources such as EFF and DDF) for digital security for devices, accounts, platforms, networks, finances, and emergency preparedness. All reference materials used in the creation of this checklist are listed in the Sources & Further Reading section below.
Devices
Smart Phones
- Disable location services for apps that don't need it
- Turn off location history and tracking in system settings
- Disable biometric unlock (fingerprint/face unlock)
- Use a strong PIN or password instead of patterns
- Enable automatic screen lock with short timeout (1–2 minutes)
- Disable lock screen notifications or limit what's shown
- Turn off voice assistant on lock screen (Siri / Google Assistant)
- Disable automatic Wi‑Fi connection to open networks
- Turn off Bluetooth when not in use
- Regularly review and revoke app permissions
Computers
- Enable full disk encryption; This protects all the data on your computer's hard drive by scrambling it with a key that only you have. (FileVault for mac users, VeraCrypt for windows/linux users)
- Set up automatic screen lock with timeout
- Disable webcam/microphone when not needed (physical covers recommended)
- Turn off automatic login
- Enable firewall
- Disable unnecessary startup programs
- Install regular security updates and patches
Accounts
Passwords & Authentication
- Use unique, strong passwords for every account
- Use a zero-knowledge encrypted password manager, such as Bitwarden
- Enable two‑factor authentication (2FA) on all important accounts
- For 2FA, use authenticator apps over SMS (Authy,1Password, etc.)
- Regularly audit and delete unused accounts
- Check if your email has appeared in data breaches: Have I Been Pwned
- Consider encrypted email providers, such as Proton Mail, or Tutanota
- Enable 2FA on email accounts
- Be cautious when forwarding emails
- Regularly delete emails containing sensitive info from inbox and archive
Platforms & Services
Communication
Web Browsing
- Use privacy‑focused browsers (Firefox or Brave)
- Install privacy extensions, such as uBlock Origin, Privacy Badger
- Use search engines that don't track you or sell your data, such as DuckDuckGo, or Startpage
- Browse with a VPN, especially on untrusted networks Mullvad, ProtonVPN
- Clear cookies and browsing data regularly (most browsers have a setting you can apply which will auto-delete cookies when the browser closes)
- Disable third‑party cookies (activate this in browser settings)
- Use private/incognito mode for ephemeral searches (note: this is not a replacement for a privacy browser, but it wont store cookies, save your history, or collect any autocomplete data)
Cloud Storage
- Use end‑to‑end encrypted cloud storage options, such as pCloud Crypto, Tresorit, Proton Drive
- Regularly audit what's stored in cloud accounts
Social Media
- Make profiles private
- Use different usernames across platforms
- Minimize the amount of personal details you add to your profile
- Disable location tagging in posts
- Turn off facial recognition and face‑mapping features
- Don't use face-mapping features (filters such as the ones that add makeup or change your facial appearance)
- Opt out of people‑finder/data broker sites — examples: Whitepages, Spokeo
- Disable ad personalization and third‑party data sharing on platforms
- Download and review platform data regularly
Network Security
Home
- Change default router password and admin credentials
- Use WPA3 (or WPA2 if WPA3 unavailable). WPA3/WPA2 are WiFi security protocols that encrypt the data traveling between your devices and your router. They're what keep folks from easily snooping on your internet traffic.
- Set up a guest network for visitors. This might be over kill for most folks. However, some of the benefits are:
- Guests can't see or access your personal devices, files, or smart home stuff
- If a guest device has malware or gets hacked, it can't spread to your main network
- Check and install router firmware updates from your router manufacturer regularly (or enable automatic updates if available)
- Consider mesh routers with built‑in security features (more expensive, might be overkill depending on your needs)
Public Wi‑Fi
- Always use a VPN on public networks
- Avoid accessing sensitive accounts on public Wi‑Fi
- Turn off automatic Wi‑Fi connection and forget public networks after use
- Use mobile hotspot when possible instead of public Wi‑Fi
Financial Security
- Use cash or prepaid cards for sensitive purchases
- Use your bank's official app for online banking instead of a browser when possible
- Set up account alerts for all transactions (or for transactions over a certain amount)
- Use virtual/temporary card numbers for online shopping to obscure your credit card info from the vendor, and prevent the purchase from appearing on your main credit card statement
- might be available for free with your bank, but there are subscription services you can use like Privacy.com
- Avoid saving payment methods in browsers or websites; Instead, use password‑protected autofill services like Bitwarden.
- Monitor credit reports regularly and freeze credit when not applying for new accounts
Emergency Preparedness
Data Protection
- Maintain offline backups of critical data
- Store backup recovery codes in a secure physical location
- Document emergency contacts and account recovery methods
- Create a digital estate plan for important accounts
- Test backup and recovery procedures periodically
Identity Protection
- Know how to quickly freeze credit and contact banks if needed
- Have contact information for banks and credit card companies
- Keep copies of important documents in secure location
- Know steps to take if accounts are compromised
Note: this checklist is a practical, high‑level guide. Adjust measures based on your individual threat model and operational needs.
Sources & Further Reading
- EFF — How to Disable Ad ID Tracking on iOS and Android
- EFF — How Ad Tech Became Cop Spy Tech
- EFF — Debunking the Myth of ‘Anonymous’ Data
- Digital Defense Fund — Digital Security Guides
- Academic Study — Goodbye Tracking? Impact of iOS App Tracking Transparency
- Academic Study — From Ad Identifiers to Global Privacy Control
- Cornell Research — What Mobile Ads Know About Mobile Users