Tips for Conducting a Personal Online Security Audit to Protect Yourself from Threats This Year

Tips for Conducting a Personal Online Security Audit to Protect Yourself from Threats This Year

What can you do to protect your personal data in 2019?

Billions of consumers worldwide were impacted by security breaches in 2018, with hackers stealing everything from credit card numbers and passport numbers to social security numbers and home addresses. One of the most recent breaches, the Marriott hotel chain breach in November, exposed 500 million people’s information. In this attack, nearly 6.5 percent of the world’s population had their names, phone numbers, email addresses, passport numbers or credit card details exposed.

And if last year was any indicator, 2019 won’t be any safer. Unfortunately, many Americans are confused regarding data breaches. In fact, a recent survey by my firm Lexington Law found that a majority of Americans (56 percent) have never checked if they’ve been affected by a data breach. In addition, only 20 percent of respondents checked for a breach within the last month and 66 percent don’t know what to check if a breach occurs.

So with all this uncertainty, what can you do to protect your personal data in 2019? I recommend conducting a simple personal online security audit, which will help you avoid becoming a victim of cybercrime, including identity theft and identity fraud. Here are three ways you can kick it off: 

Review Your Passwords

This may sound like a no-brainer, but many people use the same passwords for multiple accounts, which automatically puts them at a higher risk to be hacked. Review your passwords to see how many you use on a regular basis, what you use to keep track of passwords and how long it has been since you changed them. Also, avoid using identifying information such as your birthday, age, the current year or address for passwords. Once you’ve had the chance to dig deeper into your arsenal of passwords, I’d recommend changing them and using a reliable password manager to help keep track of logins for the hundreds of accounts that many people have. 

Take a Look at Your Social Media Accounts

While social media may seem safe enough, unfortunately people unknowingly can give the public a lot of information through social media. Confirm all of the social media platforms that you use and how many social media accounts are yours on each platform. It’s also very important to review social media platforms that you haven’t used in a while or that are outdated to see if any fake accounts exist with your name or face. In addition, review your previous posts for sensitive information such as locations that you’ve tagged to posts and the types of photos you’ve posted recently. Last but not least, double-check your privacy settings for each social media platform. Many social media accounts have the option to limit the people who see your posts to your confirmed friends, which can keep your information more secure.

Check Your Credit Report for Signs of Identity Theft

One of the most unfortunate repercussions of identity theft is how it can damage someone’s credit report. People need good credit to do everything from purchases homes and cars to opening credit card accounts and securing jobs. If someone is a victim of identity theft, their credit score is at risk of plummeting through no fault of their own. To help avoid this issue, regularly check your credit report for signs of inaccuracies or potential fraud and report anything as soon as you see it. Also, for additional peace of mind consider identity theft protection tools such as Lexington Law’s recently upgraded Lex OnTrack, the only product on the market to combine identity protection and credit repair.

Make Sure Your Computer’s Software and Mobile Apps are Up to Date

It’s easy to forget to update your computer’s software and your mobile apps regularly, especially if it requires you to restart your computer or phone. While updating these things can be an inconvenience, the longer you hold off on doing it, the more you’re potentially putting yourself at risk to be hacked. Many software and app updates include enhanced security features and help everything run smoother. After ensuring that all of your apps and software are up to date, check to see if the updates are installed manually or automatically. If you’re the type of person that forgets to manually update, changing the settings to automatic updates could be helpful.

Conducting a personal online security audit does take time, but will give you peace of mind that your sensitive personal information is safe from hackers. I’d recommend conducting an audit like this a couple of times a year, because one small slip up could result in credit corruption, data exposure, a stolen identity or more. By being vigilant you can make sure that your data stays yours alone.

Featured

  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West
  • New Report Says 1 in 5 SMBs Would Be Forced to Shutter After Successful Cyberattack

    Small and medium-sized businesses (SMBs) play a crucial role in the U.S. economy, making up 99.9% of all businesses and contributing to half of the nation's GDP. However, these vital economic growth drivers face an escalating threat—cyberattacks that could put them out of business. Read Now

  • The Yellow Brick Road

    The road to and throughout Wednesday's and Thursday's ISC West was crowded but it was amazing. Read Now

    • Industry Events
    • ISC West
  • An Inside Look From Napco at ISC West

    Get a look into the excitement at ISC West 2025 from Napco. Hear from some of their top-tech executives live from the show floor. Read Now

    • Industry Events
    • ISC West
  • Upping the Ante

    I am not a betting man in terms of cards, dice, blackjack or that wheel with the black marble racing around the circumference of a spinning wheel, but I would bet on the success of ISC West this year. Read Now

    • Industry Events
    • ISC West

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.