Personal Cyber Security Toolkit

Cyber, Personal Lines

Protecting your personal cyber security is as critical as ever. Bad actors continue to get creative when it comes to their cyber-attacks, whether they’re using phishing schemes, ransomware, or even more complicated approaches to accessing private data. It’s important to be aware of your personal digital habits, and best practices to protect yourself against identity theft and malicious hacking.

Use the toolkit outlined below as a check-in on the way you store, access, and use digital information. Consider implementing these recommended layers of security, or purchasing coverage that will protect you in the event of a breach.

1.  Email:

  • Use separate email accounts for business, personal and special interest.
  • Recognize email Phishing warning signs such as poor grammar, spelling, urgent language, hyperlinks or attachments, vague email addresses or vague contact information.
  • Encrypt sensitive information
  • Be very cautious on what you click

2. Passwords

  • Change passwords quarterly and never use the same password for different accounts
  • Consider using a reputable password manager company, research a few to find the right mix of features, services and conveniences that will work best for your family. Take advantage of the trials before making your decision.

3. Mobile

  • Keep screen locked
  • Turn Bluetooth off when not needed
  • Back up data at regular intervals
  • Enable remote or device reset strategy in the event you report device as lost

4. Public Wi-Fi/hotspots

  • Minimize use of unsecured, public networks ( hotels, airports, restaurants, stores)
  • Consider using a Juice-Jacking plug in to protect your data when charging your mobile devices any where: Similar product on Amazon:
  • Turn off Auto-Connect to non preferred networks
  • Use a VPN connection help secure your session(Here is the PC Magazine  Best VPN ratings for 2020:
  • Where possible, use the personal hotspot on your cell phone to gain access to the internet on other mobile devices.

5. Home Networks

  • Create one network for you and one for your guests
  • Run real time virus and malware protection

Reach out to your M3 Account Executive for more information on attaining identity theft protection, or implementing best practices to protect yourself in the event of a personal cyber security breach.

Back to Insight Center