This is the second tip of five and discusses prioritizing your online information.
This is the second of a 5-part series on “Cybersecurity.”
For those of you who have been following this series, you should now have a pretty good idea of the extent of your “Digital Track in the Wild”. As suggested in that first post, you should also have an electronic spreadsheet or word processing document, protected by a “password” of course, listing all of your online accounts and login credentials saved in an inconspicuous manner.
Now that you have an inventory of your online accounts, it is time to prioritize your most sensitive accounts and begin to apply greater security levels to ensure their protection. For example, you should prioritize your accounts by most sensitive to least sensitive, such as personal financial information and health records being most sensitive and LinkedIn profile information being least sensitive. You can add another column to your spreadsheet or word processing document that is labeled “Security Level” and place a value of low, medium, or high. High for financial and health and low for LinkedIn.
Once you have completed this priority, you can then begin to elevate the level of authentication required to log into these more sensitive online accounts.
Please be on the lookout for series #3 in a couple of weeks when we will share and recommend access controls and authentication tips surrounding your Internet presence.