Personal Digital Security Audit

Most people's digital security is worse than they think — not because they're careless, but because the defaults are wrong and the risks are invisible until something goes wrong. Work through this audit to close the gaps that matter most, starting with the changes that give you the most protection for the least effort. For more background and examples, see the guidance below; for built-in tools and options, use the quick tools guide.

Author
Checklistify Editorial Team
Last Updated

Checklist Items

0 done24 left4 of 5 sections collapsed

0%

Who is actually coming for your accounts?

The mental image most people carry of a cyberattack — a skilled individual who has identified and targeted them specifically — describes a vanishingly small fraction of real incidents. The overwhelming majority of account compromises happen through automation: bots that test breached username-password pairs across hundreds of services simultaneously, tools that continuously scan the internet for unpatched software, and phishing campaigns blasted to millions of addresses with no specific target in mind. You are not being hunted. You are being swept. The practical implication matters: you don't need to be impenetrable. You need to be harder to compromise than the millions of people who have done nothing. A relatively modest set of precautions — the kind this audit covers — moves you out of the swept population entirely.

📖 The 47-minute account takeover

A security researcher documented a case where a single breached credential cascaded into complete loss of control across an entire digital life — in under an hour. The attacker found a password in a breach dataset from a defunct gaming forum. That same password opened a secondary email account. From the secondary email, a password reset was triggered on the victim's primary Gmail. With Gmail access came access to the password manager's recovery email. From there, every stored credential became reachable. The original forum breach had occurred three years earlier. The victim had no indication anything was wrong until their bank called about an unrecognized wire transfer. Every link in that chain — the reused credential, the unmonitored secondary account, the unreviewed recovery settings — is something this audit directly addresses.

🔒 Security vs. Privacy — the difference matters

Security means preventing unauthorized access to your accounts and devices. The threat is external actors — bots and criminals. Failures are immediate and concrete: locked accounts, stolen funds, identity fraud that can take months to unravel.

👁️ Privacy is a different problem

Privacy means controlling what data companies collect about you and how they use it. The threat is data brokers, advertisers, and permissive platform terms. Failures are diffuse and invisible — profiles built silently over years, data sold without your knowledge, micro-targeting based on accumulated behavior.

This audit addresses both, but they operate on different timescales. A security failure can drain a bank account this week. A privacy failure compounds quietly over years and is rarely reversible once the data has been collected and sold.

🚨 If something has already gone wrong

This audit is proactive — but if you're reading it because you've already noticed something suspicious, here is the triage sequence. First: change your email password immediately from a device you trust, and in your email's security settings, revoke all active sessions to log out anyone currently inside. Second: contact your bank, flag recent transactions you don't recognize, and ask for a temporary card lock. Third: check whether the recovery phone number or backup email on the compromised account has been changed — attackers modify recovery information first, to prevent you from regaining access. Fourth: run a malware scan on the affected device using Malwarebytes Free before trusting it again for sensitive tasks. Fifth: file a report with your national cybercrime reporting agency — prosecution is unlikely, but the report can support insurance claims or help dispute fraudulent charges with financial institutions.

💡 The technology replacing passwords

Passkeys are a newer authentication standard now supported by Apple, Google, Microsoft, and a growing list of websites. Instead of a password, you authenticate by approving a request with the same biometric — Face ID or fingerprint — you already use to unlock your device. Passkeys are immune to phishing by design: they are cryptographically bound to the exact domain they were registered on, so a convincing fake login page cannot capture or replay the authentication signal. They are also immune to breach exposure, because the site never stores the secret portion. If a service you use offers a 'Create a Passkey' option in its security settings, create one — it is simultaneously more secure and more convenient than any password. The directory at passkeys.directory lists services that currently support them.

🔑 When software 2FA isn't enough

For most people, an authenticator app represents an excellent security ceiling. For specific high-risk profiles — journalists protecting sources, executives targeted by corporate espionage, activists operating in adversarial environments, or anyone who has already been compromised once — a hardware security key provides a category of protection that software cannot replicate. A hardware key (YubiKey is the most widely supported brand, starting at $25–$45) is a physical USB or NFC device you tap to authenticate. Its defining advantage: it is cryptographically bound to the specific domain it was registered on. A sophisticated phishing kit can intercept a software-based 2FA code in real time and immediately replay it — hardware keys cannot be exploited this way, because the authentication signal is device-specific and non-replayable. Hardware keys are supported by Google, Microsoft, GitHub, Cloudflare, and many other services via the FIDO2/WebAuthn standard.

📅 When to re-run this audit

An annual review catches configuration drift and newly discovered attack surfaces. But certain life events warrant an immediate, unscheduled re-check regardless of timing:

  • You leave a job — revoke access to any work tools linked to personal accounts, and change passwords that a colleague may have known or encountered
  • A relationship ends where the other person knew your passwords or had physical access to your devices
  • A service you use announces a data breach — verify whether 2FA was enabled on that account, change the password, and review recent account activity for anything unrecognized
  • You get a new phone or computer — verify encryption and backup are properly configured before migrating your data to the new device
  • You receive a new sign-in notification from an unrecognized location — treat it as real until you have confirmed otherwise directly within the app, not by clicking a link in the notification email

💡 Why good security habits don't stick — and how to make them

Security fatigue is well-documented in behavioral research: people adopt strong practices after a scare or a formal audit, then gradually revert as fear fades and friction accumulates. The most durable security setups are the ones that reduce daily friction rather than add to it. A password manager, done correctly, makes logging in faster than typing a memorized password. Biometric unlock on your phone is more convenient than a PIN. The setup cost is front-loaded; the ongoing cost is close to zero. If a security step feels so annoying that you keep skipping it, the implementation needs to be redesigned — not the goal abandoned. The practical target is not maximum theoretical security. It is the highest level of protection you will actually maintain six months from now.

Master This Checklist Quickly

Every important button and option for this pre-made checklist, shown in a glance-friendly format.

Start Here

  1. 1

    Click any item row to mark it complete.

  2. 2

    Use the note row under each item for quick notes.

  3. 3

    Use the tool row for undo, redo, reset, and check all.

  4. 4

    Use Save Progress when you want to continue later.

Checklist Row Tools

UndoRedoResetCheck allCollapse/Expand sectionsShow/Hide detailsInline notes

Top Action Buttons

Share

Open all sharing and export options in one menu.

Email DraftContinue on another devicePrint or Save as PDFPlain Text (.txt)Word (.docx)Excel (.xlsx)

Add & Ask

Open one menu for apps and AI guidance.

NotionTodoist CSVChatGPTClaude

Copy and customize

Create a new editable checklist pre-filled with your chosen content.

Save Progress

Adds this checklist to My Checklists and keeps your progress in this browser.

Most Natural Usage

Track over time

Check items -> Add notes where needed -> Save Progress

Send or export

Open Share -> Choose format -> Continue

Make your own version

Copy and customize -> Open create page -> Edit freely