Apply Critical Security Updates Promptly

Remember

Prioritize the installation of security updates, especially those labeled as ‘critical’ or addressing known vulnerabilities. Enable automatic updates where feasible, but remain vigilant for manual prompts if auto-updates are delayed or require intervention.

Why

Promptly applying security updates is one of the most effective defenses against malware and cyberattacks. Attackers quickly exploit known vulnerabilities, and delaying updates leaves your devices and data exposed to unnecessary risks.

Be Mindful of AI Interactions

Remember

When using AI tools (chatbots, assistants, image generators, etc.), consciously avoid inputting sensitive personal information like full names, addresses, financial details, or private matters. Reflect: “Could this information be used to identify me or compromise my privacy if stored or misused?”

Why

AI systems often learn from user inputs, and this data may be stored, analyzed, or used in ways that could compromise your privacy. Being mindful of what you share with AI helps protect your personal information from unintentional exposure or misuse.

Be Mindful of Photo Metadata When Sharing

Remember

Before sharing photos online, especially on public platforms, be aware that they may contain hidden metadata (EXIF data) such as location, date, time, and device information. Consider stripping this metadata if it could compromise your privacy.

Why

Photo metadata can inadvertently reveal sensitive personal information. While some platforms automatically strip this data, not all do. Being mindful of what your photos might be sharing helps protect your privacy and security. A more thorough review or stripping of metadata can be done less frequently or as needed.

Be Selective with Apps & Limit Permissions

Remember

Be selective about which apps you install - each new app increases your attack surface. Before installing any app, browser extension, or signing up for a new service, ask yourself if you truly need it. When you do install something, carefully review the permissions it requests and grant only those essential for its intended function. Regularly review and remove apps you no longer use.

Why

Every app is a potential security risk and privacy concern. Fewer apps mean fewer opportunities for data breaches, malware, and privacy violations. Many apps request excessive permissions beyond what they need to function. By being selective with installations and strict with permissions, you minimize your digital footprint and reduce the risk of compromised accounts or data exposure.

Practice Mindful Information Sharing

Remember

Regularly ask yourself: “Is it necessary to share this piece of personal information? What are the potential risks?” Strive to provide only the minimum information required in any interaction, whether online or offline.

Why

Every piece of personal information shared increases your digital footprint and potential exposure to identity theft, scams, or unwanted tracking. Practicing mindful sharing—consciously deciding what, where, and with whom you share—is a fundamental aspect of maintaining privacy and security.

Practice Secure Logout Habits

Remember

Make it a habit to log out of websites and applications when you’ve finished using them, particularly on shared or public computers. On personal devices, still consider logging out of sensitive accounts if the device might be accessed by others. Also, lock your screen when stepping away from your devices.

Why

Active sessions can be exploited if a device is lost, stolen, or accessed by an unauthorized person. Logging out terminates these sessions, adding a critical layer of security, especially for sensitive accounts like email, banking, and social media.

Practice Vigilant Email Hygiene

Remember

Always be skeptical of unsolicited emails, especially those urging immediate action, requesting personal information, or containing unexpected attachments/links. Verify sender addresses carefully. When in doubt, do not click or respond; instead, contact the alleged sender through a known, legitimate channel.

Why

Email is a primary channel for phishing scams, malware distribution, and other cyberattacks. Consistent email hygiene—such as scrutinizing senders, avoiding suspicious links, and not downloading unexpected attachments—is critical to protecting your accounts and personal information.

Regularly Restart Devices

Remember

Restart your primary devices (computers, smartphones, tablets) at least once a week. This simple maintenance step clears temporary files, resolves minor software glitches, applies pending updates, and improves overall system performance.

Why

Regular restarts help prevent system slowdowns and stability issues. Many updates and system optimizations only take effect after a restart, and accumulated temporary files can degrade performance over time.

Respond Promptly to Security Alerts

Remember

Treat all security alerts with urgency, but be extremely cautious about text messages and emails claiming to be security alerts. Never click links or call phone numbers provided in these messages - they are often phishing attempts. Instead, manually navigate to the official website or app of the service in question to investigate any claimed issues. Ensure legitimate alerts are enabled for all critical financial and online accounts.

Why

Timely responses to genuine security alerts are crucial - they warn you of unauthorized access, fraudulent activity, or data breaches. However, scammers frequently impersonate security alerts via text and email to steal credentials or personal information. By always going directly to the source rather than trusting incoming messages, you can act quickly on real threats while avoiding sophisticated phishing scams.

Think Before You Share Online

Remember

Before posting any personal information, opinions, photos, or videos online, take a moment to consider its necessity, potential audience, and long-term implications. Ask yourself: “Am I comfortable with this being public and permanent?”

Why

Information shared online can be difficult, if not impossible, to completely retract. It can affect your reputation, privacy, and even physical safety. Cultivating a habit of thoughtful online sharing helps protect your digital footprint and personal well-being.

Use Public Wi-Fi Securely

Remember

When connecting to any public Wi-Fi network, always use a trusted VPN (Virtual Private Network) to encrypt your connection. Avoid accessing sensitive accounts (banking, email) or performing financial transactions. If a VPN is unavailable, use your mobile data instead for such activities.

Why

Public Wi-Fi networks are inherently insecure and can be easily monitored by malicious actors. Using a VPN encrypts your data, protecting it from eavesdropping. Avoiding sensitive activities further minimizes risk, as no public network should be considered completely safe.

Utilize Private Browsing Appropriately

Remember

Use private browsing modes when you want to prevent your browsing history, cookies, or site data from being saved on your local device. This is useful for sensitive searches or when using a shared computer. However, understand that it does not make you anonymous online; your ISP, employer (on work networks), and websites can still track your activity.

Why

Private browsing offers a degree of local privacy by not storing session data on the device. This can be helpful for specific situations, but it’s important not to mistake it for comprehensive online anonymity or security, which require tools like VPNs and other privacy-enhancing practices.

Sign up for monthly reminders

Protect yourself with monthly updates highlighting recent hacks, common scams to watch out for, and emerging threats.