Definition: "Online access" means you can log in to your financial institution’s website or app to view and manage your accounts.
Risk Understood: Having online access increases your exposure if security isn’t robust.
Guiding Questions: Do you use secure networks? Have you noticed any unauthorized transactions?
Definition: "Review" means checking your transaction history or statements for unusual activity.
Risk Understood: Infrequent reviews can delay detection of fraudulent activity.
Guiding Questions: How regularly do you check your accounts? Do you set up alerts?
Definition: A credit report is a summary of your credit history.
Risk Understood: Not monitoring your credit report can cause you to miss signs of identity theft.
Guiding Questions: Do you know how to access your report? How often do you check it?
Definition: "Anomalies" are unusual entries that may indicate errors or fraud.
Risk Understood: More frequent checks help catch unauthorized changes early.
Guiding Questions: Do you check your report more than once a month?
Definition: "Online accounts" include email, social media, shopping, banking, etc.
Risk Understood: The more accounts you have, the greater your exposure if one is compromised.
Guiding Questions: Count the accounts you use regularly.
Definition: Categories may include financial, email, social media, health, government, etc.
Risk Understood: Some account types (e.g., financial) require stronger security.
Guiding Questions: List the types of accounts you maintain and consider the sensitivity of their data.
Definition: Sensitive data can include financial details, personal IDs, health records, private documents, etc.
Risk Understood: Storing such data increases potential damage if breached.
Guiding Questions: What types of data do you store online? Is it protected (e.g., encrypted)?
Definition: Options include cloud services and local devices.
Risk Understood: Each storage method has its own vulnerabilities.
Guiding Questions: Do you use cloud storage, local storage, or both?
Definition: Devices include desktops, laptops, smartphones, tablets, and IoT devices.
Risk Understood: Each device type has unique vulnerabilities if not properly secured.
Guiding Questions: Which devices do you use most often? Are they kept up-to-date?
Definition: Software updates include patches that fix security vulnerabilities.
Risk Understood: Not updating leaves devices exposed to exploits.
Guiding Questions: Do you enable auto-updates?
Definition: Secure connections encrypt your data to protect it from interception.
Risk Understood: Insecure connections may expose your login credentials.
Guiding Questions: Do you use a VPN on public Wi-Fi?
Definition: Public/shared networks are commonly available in cafés, airports, etc.
Risk Understood: These networks are less secure, increasing the risk of interception.
Guiding Questions: Do you use public Wi-Fi often? Do you take precautions?
Definition: Additional measures like 2FA or VPN further secure your connection.
Risk Understood: They help protect your data on insecure networks.
Guiding Questions: Do you enable extra security when on public Wi-Fi?
Definition: Cybercrime includes fraud, identity theft, phishing, and hacking.
Risk Understood: Your personal perception of risk influences your security practices.
Guiding Questions: Do you feel at risk because of your online activities?
This follow-up identifies factors (e.g., high net worth, public exposure) that may increase your risk.
Guiding Questions: Do you have a high net worth, a public profile, or work in a high-risk industry?
Definition: Monitoring means checking your accounts for unauthorized access or unusual transactions.
Risk Understood: Regular monitoring helps detect breaches early.
Guiding Questions: Do you use alerts or third-party tools?
Definition: Additional measures like MFA and password managers add extra layers of security.
Risk Understood: Without these, compromised passwords can lead to full account access.
Guiding Questions: Have you enabled MFA and/or use a password manager?
Definition: This means using your personal smartphone, laptop, or tablet for work-related activities.
Risk Understood: Mixing personal and work data can create security challenges.
Guiding Questions: Do you use personal devices for work? Have you reviewed your employer’s policies?
Definition: "Sync" means automatically updating and storing data across devices.
Risk Understood: Storing work data on personal devices can expose sensitive information if compromised.
Guiding Questions: Do you sync work files to your personal device?
Definition: These policies provide guidelines for safely using personal devices for work.
Risk Understood: Not following these guidelines can increase risk.
Guiding Questions: Have you read your employer's policies? Do you follow them consistently?
Definition: A VPN encrypts your internet connection, adding a layer of security.
Risk Understood: Without secure methods, business data may be intercepted.
Guiding Questions: Do you use a VPN on public networks?
Definition: Separate profiles help keep work and personal data apart.
Risk Understood: Mixing data can lead to accidental exposure.
Guiding Questions: Do you maintain distinct profiles for work?
Definition: Training provides best practices for protecting work data.
Risk Understood: Lack of training can increase risk.
Guiding Questions: Have you attended any training sessions or workshops?
Definition: This refers to whether you use secure (private) or public networks for work tasks.
Risk Understood: Public networks can expose sensitive information.
Guiding Questions: Do you primarily use secure home/office networks?
Definition: Your online presence includes social media profiles, blogs, forums, and other public footprints.
Risk Understood: More public profiles mean greater exposure.
Guiding Questions: How many public profiles do you maintain?
Definition: "Sharing credentials" means giving someone else access to your login details or devices.
Risk Understood: Sharing increases the risk of unauthorized access.
Guiding Questions: Do you lend your devices or share passwords?
Definition: A data breach is when sensitive, protected, or confidential data is exposed or stolen.
Risk Understood: Past breaches may reveal vulnerabilities in your security practices.
Guiding Questions: Have you been notified of a breach? What actions did you take?
Definition: Third-party applications are those not developed by your primary service provider (e.g., fitness apps).
Risk Understood: They may request excessive permissions and introduce vulnerabilities.
Guiding Questions: Do you review the permissions these apps request?
Definition: Your approach can range from strict (limiting visibility) to open (public profiles).
Risk Understood: Open profiles may expose too much personal information.
Guiding Questions: How do you configure your privacy settings?
Definition: This includes transactions like online banking, shopping, or subscriptions.
Risk Understood: Frequent transactions increase exposure if security is lacking.
Guiding Questions: How regularly do you perform such activities?
Definition: MFA adds a second verification step beyond your password.
Risk Understood: Without MFA, compromised passwords can lead to full account access.
Guiding Questions: Have you enabled MFA on all your sensitive accounts?
Definition: A password manager creates and securely stores unique passwords for each account.
Risk Understood: Reusing weak passwords increases your risk.
Guiding Questions: Would a password manager help you manage your passwords better?
Definition: Encryption converts your data into unreadable code without the correct key.
Risk Understood: Unencrypted devices can expose your data if lost or stolen.
Guiding Questions: Have you enabled full-disk encryption on your devices?
Definition: Antivirus software detects and removes malware and other threats.
Risk Understood: Outdated antivirus leaves your device vulnerable.
Guiding Questions: Is your antivirus set to update automatically?
Definition: Firewalls and IDS help prevent and detect unauthorized network access.
Risk Understood: Without them, your network may be more vulnerable.
Guiding Questions: Does your router have a built-in firewall?
Definition: This includes updating privacy settings, app permissions, etc.
Risk Understood: Neglecting updates can leave you exposed to emerging threats.
Guiding Questions: How often do you review your settings?
Definition: These services alert you if your data appears in known breaches.
Risk Understood: Early alerts allow prompt corrective action.
Guiding Questions: Do you monitor your email or other credentials using these services?
Definition: Training helps you recognize and avoid phishing and social engineering scams.
Risk Understood: Without training, you are more vulnerable to such attacks.
Guiding Questions: Have you attended cybersecurity workshops?
Definition: Licensed software is legally purchased and receives regular updates.
Risk Understood: Unlicensed software may lack crucial security patches.
Guiding Questions: Are your applications obtained from reputable sources?
Definition: Backups are copies of your important files stored externally (e.g., cloud or external drives).
Risk Understood: Without backups, you risk losing data permanently.
Guiding Questions: Do you schedule automated backups?
Definition: These measures protect your device if it’s lost or stolen.
Risk Understood: Without them, your sensitive data is at higher risk.
Guiding Questions: Do you set strong passcodes or use biometric authentication?
Definition: WPA2/WPA3 are modern Wi-Fi encryption standards that protect your wireless network.
Risk Understood: Insecure Wi-Fi can allow attackers to access your network.
Guiding Questions: Have you changed your router's default settings? Is your Wi-Fi password strong?
Definition: A digital inheritance plan outlines how your digital assets will be managed if you cannot do so.
Risk Understood: Without a plan, your digital legacy may be inaccessible or mismanaged.
Guiding Questions: Have you designated someone to manage your digital assets?
Definition: This checks if your login credentials are stored securely so that a trusted person can access them if needed.
Risk Understood: Proper management ensures your digital legacy is accessible in an emergency.
Guiding Questions: Do you use a secure password manager with shared access?