5 Steps to Protecting Your Digital Home

  1. Secure Your Wi-Fi Network

    Your home’s Wireless Access Point (WAP) is the primary entrance for cybercriminals to access all of your connected devices. Secure your Wi-Fi network and your digital devices by changing the factory-set default password and username. To keep your wireless communication confidential, ensure your WAP is using Wi-Fi Protected Access 2 (WPA2). When configuring WPA2, use a strong passphrase of 20 characters or more. Change the default SSID to something unique and nondescript so that anyone scanning Wi-Fi networks in your area cannot equate the SSID with you and your home.

  2. Use MFA

    Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device such as your smartphone.

  3. If You Connect, You Must Protect

    Whether it’s your computer, smartphone, game device, smart home devices or other network devices, the best defense is to stay on top of things by updating to the latest security software, web browser, and operating systems. If you have the option to enable automatic updates to defend against the latest risks, turn it on. Protect your devices with antivirus software and be sure to periodically back up any data that cannot be re-created such as photos or personal documents. Always change default passwords for all of your devices with ones that are unique and strong.

  4. Keep Tabs on Your Apps

    Most connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with suspicious apps running in the background or using default permissions you never realized you approved—gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and use the “rule of least privilege” to delete what you don’t need or no longer use. Learn to just say “no” to privilege requests that don’t make sense. Only download apps from trusted vendors and sources.

  5. Employ Firewall Capabilities

    Ensure that your personally-owned routing device supports basic firewall capabilities. Verify that it includes Network Address Translation (NAT) to prevent internal systems from being scanned at the network boundary. If your ISP supports IPv6, make sure your router supports IPv6 firewall capabilities.