checklist_lesson5

Checklist: Lesson 5 - Privacy and Security Fundamentals

Managing Your Digital Footprint

Audit your online presence by searching your name
Review privacy settings on all platforms you use
Be selective about what personal information you share online
Consider using privacy-focused service alternatives
Practice data minimization by only providing necessary information
Regularly delete unused accounts and old content

Browser Privacy Techniques

Use private browsing mode for sensitive searches
Clear cookies and browsing history regularly
Install privacy extensions (Privacy Badger, uBlock Origin)
Consider privacy-focused browsers (Firefox, Brave, Tor)
Disable third-party cookies in browser settings
Review and limit site permissions (location, camera, microphone)

Password Management

Create strong, unique passwords for important accounts
Set up a password manager (Bitwarden, LastPass, 1Password)
Enable two-factor authentication (2FA) on critical accounts
Use passkeys when available
Check haveibeenpwned.com to see if your accounts are compromised
Change passwords for any compromised services

Network Security

Use a VPN when on public Wi-Fi
Secure your home network with strong passwords and WPA3
Turn off Bluetooth when not in use
Check for HTTPS before entering sensitive information
Consider using a secure DNS service
Keep your router firmware updated

Device Security

Keep all software and operating systems updated
Use antivirus/anti-malware protection
Enable device encryption
Back up important data following the 3-2-1 rule
Properly wipe data before selling or recycling devices
Set up device tracking and remote wipe capabilities

Recognizing and Avoiding Scams

Watch for urgency, threats, or too-good-to-be-true offers
Be suspicious of requests for unusual payment methods
Verify unexpected communications through official channels
Don’t click links or download attachments from unknown sources
Be wary of unsolicited requests for personal information
Report suspicious communications to relevant platforms

Privacy and Security Balance

Assess the sensitivity of different types of information
Apply stronger measures for more sensitive information
Evaluate the convenience-security tradeoffs for different services
Start with high-impact, low-effort security changes
Schedule regular privacy and security reviews
Stay informed about new threats and protections