0% found this document useful (0 votes)
84 views4 pages

Personal Cybersecurity Checklist

The document provides a personal cybersecurity checklist with tips in several categories: 1) Password care and maintenance, including using unique, long passwords and a password manager. 2) Using multi-factor authentication on important accounts. 3) Basic cyber hygiene such as backing up files, keeping devices updated, and changing default passwords. 4) Being cautious about clicking links and downloading attachments, and avoiding suspicious ads. It also includes cybersecurity best practices for kids, such as only sharing information with permission, treating others kindly online, and using secure passwords.

Uploaded by

Vlad Vikernes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views4 pages

Personal Cybersecurity Checklist

The document provides a personal cybersecurity checklist with tips in several categories: 1) Password care and maintenance, including using unique, long passwords and a password manager. 2) Using multi-factor authentication on important accounts. 3) Basic cyber hygiene such as backing up files, keeping devices updated, and changing default passwords. 4) Being cautious about clicking links and downloading attachments, and avoiding suspicious ads. It also includes cybersecurity best practices for kids, such as only sharing information with permission, treating others kindly online, and using secure passwords.

Uploaded by

Vlad Vikernes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Personal

Cybersecurity
Checklist
Personal Cybersecurity Checklist
At Auth0 we care deeply about cybersecurity, and Privacy
we want to help make the internet safer. Not only • I don’t post private information like my home
by increasing the security of your business through address, private pictures, phone number, or credit
our platform, but also by spreading awareness card numbers publicly on social media.
about cybersecurity.
• I’ve configured my social media privacy settings
So we have prepared an easy checklist to help you, to my preferences.
the people, and the kids you know, stay safe online. • I don’t play with games, or answer surveys on so-
We believe in making cybersecurity accessible for cial media that ask for sensitive private information.
everyone, so we’ve translated it to 9 languages with
You can find more information in our Privacy Guide,
help from Auziros across the world.
and the EFF https://auth0.com/blog/practical-priva-
cy-a-guide-for-everyone/
Password Care and Maintenance
https://www.eff.org/issues/privacy
• I don’t use the same password for different
accounts. Basic Cyber Hygiene
• My passwords are at least 18 characters long • I am cautious about the permissions I accept
whenever possible. for all the apps I use
• I use a Password Manager like 1Password, • I delete the applications that I no longer use
LastPass, Keepass, or keychains supported
• I back up my important files.
by the operating system or browser.
• I have emergency contacts configured on my
• For accounts not in a password manager,
phone.
I create long, unique and memorable passphrases.
• I encrypt my phone, my computer, and my
external hard drives
Multi-factor Authentication (MFA)
• All my important accounts (email, social media, • I have configured https://haveibeenpwned.com/
finance-related apps) are protected with to notify me in case my email appears on a breach.
Multi-Factor Authentication (MFA) through • I keep the operating system of my computer and
an app like Auth0 Guardian, Authy, Duo, Google phone updated with the latest version at all times.
Authenticator, or SMS if there’s no other way. • I change the default passwords of my Internet
• I save my MFA backup codes in a paper stored of Things (IoT) devices.
securely, or in my password manager. • I keep my computer and phone locked with
You can find more information about MFA in our a password, or a pin longer than four numbers.
docs https://auth0.com/docs/multifactor-authen- • I share information like this with friends and family
tication to help them be safe.
When NOT to click Auth0, a global leader in Identity-as-a-Service
(IDaaS), provides thousands of customers in every
• I avoid clicking on suspicious links, or download-
market sector with the only identity solution they
ing suspicious attachments from emails, or text
need for their web, mobile, IoT, and internal appli-
messages I don’t expect.
cations. Its extensible platform seamlessly authen-
• I don’t click on ads that promise free money, ticates and secures more than 2.5 billion logins per
prizes, or discounts. month, making it loved by developers and trusted by
• We invite you to try out Google’s Phishing Quiz global enterprises. The company’s U.S. hea quar-
https://phishingquiz.withgoogle.com/ ters in Bellevue, WA, and additional offices in Bue-
nos Aires, London, Tokyo, and Sydney, support its
global customers that are located in 70+ countries.
For more information, visit https://auth0.com
or follow @auth0 on Twitter.

1
Cybersecurity best practices for kids
(ages 8+)

Sharing about me Keeping it kind (for myself and others)


• I only post pictures or videos of myself online if I • I know that I may not be able to delete things I
have permission from my parents or guardians. post online, and others can copy/repost them. It
could even be connected to me 20 years from now.
• If someone is asking me personal questions like
my home address, where do I go to school, what’s • I ask for help if someone says something hurtful
my phone number, or asking for pictures of me, I to me online. I also report, and block them if I can.
ask for help right away. • I mostly ignore comments, but if they get too
• I know that posting my name, birth date, home scary, I report them.
address, pictures, school address, phone number, • I treat others with kindness online, just like I would
or credit card numbers online can be dangerous for treat them in person.
me and my family.
• How I feel about myself doesn’t depend
• I understand that in the online world, anyone can on other people’s likes or comments on social
pretend to be someone they are not, so I shouldn’t media.
meet with them in person.

Safety Basics
• I only download or install applications when I have
permission from my parents
or guardians.
• I avoid using short and simple passwords like
“test”, “password”, “123456” or
“Charlie1”
• I use passwords consisting of words
united by a dash (-) or a space. For example:
ice-cream-chocolate-is-the-best
• My passwords don’t include my name, birth-
date, pet’s name, or other information that can be
guessed.
• All my accounts use different passwords.
I don’t click on pictures that promise free money,
prizes, or games.

You might also like