-0.9 C
Bucharest
Tuesday, January 14, 2025

How I’m Refreshing My Approach to Security for 2025

Simply using a device with internet access makes you a potential target for a cyberattack. Since data breaches are painfully common and attacks and scams are increasingly sophisticated, I’m making a few useful but simple security tweaks to my digital lifestyle in 2025.

1

Close All Accounts I’m Not Using

gmail account showing sign up search for new accounts

If you’re anything like me, you probably lost track of accounts for services you haven’t logged into in years. It may not seem like a big deal, but consider the following: inactive accounts bloat your overall digital footprint and paint extra targets on your back.

All this data is up for grabs for malicious parties. In the worst-case scenario, if someone compromises these services, they may use your info for nefarious purposes like identity theft.

Even if the worst never happens, you’re still providing a company with data they can use to spam you until the end of time—not as bad as identity theft, but still annoying.

Unfortunately, memory is a fickle mistress, and it’s hard to recall which services I used this year, let alone the last few years. This is why I sift through my inbox and look for welcome emails using specific keywords like “account.” It may take a few hours, but a smaller digital footprint is worth the labor. There are other ways to find old accounts linked to your email address, too.

2

Demand Those Services Delete All My Private Data

When you close the account, there’s a high chance the company is still holding on to your data. Make no mistake, data deletion is a complicated matter and may not be possible in all circumstances, but it doesn’t hurt to try.

Similar to the GDPR in the EU and the UK, many US states have passed privacy laws allowing consumers to send data deletion requests even if they’re not residents of the state.

So, how do I plan on going about this task?

Sometimes it’s simple, since a company may provide a form on their website for data deletion requests. Other times, you may need to get your hands dirty. Residents of California can use the California Consumer Privacy Act (CCPA) sample form, but you can customize it to your needs. Your experience will vary depending on your home state and the state the company is based in.

Moreover, I’ll bolster this legwork with automated data removal services that will help me remove information data brokers already managed to get their hands on.

3

Start Using Gmail Aliases

<div class="responsive-img image-expandable img-article-item" style="padding-bottom:56.25%" data-img-url="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2024/12/google-spam-emails.jpg" data-modal-id="single-image-modal" data-modal-container-id="single-image-modal-container" data-img-caption=""Google””>

Google Spam Emails on desktop and smartphone app

Google

When I checked through my email to get an idea of how much cleanup work I have in front of me, I realized I had been careless all these years without knowing. Not only was my main inbox cluttered because I signed up for too many things, but 50% of all the useless emails resulted from services I used only once or wanted to test out.

I could have significantly cut down on all of this if I used Gmail aliases for new signups. Doing so would have both helped with decluttering and shielded my real email address from shady sites and services. Another good reason to use an email alias is that if a service I signed up for with an alias gets compromised, I can just shut down one account, and my real email and identity remain 100% safe.

It’s also a good trick to weed out the companies that sell your data. For example, if one of your alias email accounts gets bombarded by junk, you can easily identify who’s to blame.

4

Set Up 2FA and Switch to Passkeys or Biometrics

While busting the most common password security myths, I dropped a truth bomb: given time, hackers can compromise even the strongest passwords. It seems scary, sure, but you can minimize the blow by setting up two-factor authentication on services that allow it.

That way, even if you’re hacked or your data is breached, you’ll have an extra line of defense between you and the hacker.

The best way to keep yourself safe online is to avoid using passwords altogether and make the switch to passkeys. Although not perfect, passkeys minimize the chance of falling victim to a phishing attack, as you won’t need to type in your password. Consider passkeys a form of self-care because you’ll spend less time worrying about phishing (which is getting scarier each day).

5

Update My Router’s Firmware

A mock router with four antenna sitting on a table in front of a bookshelf

Yadullah Abidi / MakeUseOf / Leonardo.AI

To cut straight to the chase, criminals love outdated software and hardware because it’s easier to penetrate. Yes, software updates are mostly automatic these days, but let me ask you this: when was the last time you updated your router’s firmware?

That little maneuver will keep this critical piece of hardware up-to-date, boost its security, and protect you from intruders. Plus, it may also improve its performance.

You can never be too diligent in the digital era, and it doesn’t hurt to continuously make improvements in terms of online privacy and security. It’s best to start the new year with a clean slate, which isn’t limited to just your fitness goals but your digital footprint, too.

Link

- Advertisement -
Latest
- Advertisement -spot_img

More Articles

- Advertisement -spot_img