Digital Hygiene: Protect Your Data through Healthy Interactions Online


What is Digital Hygiene? Digital hygiene is the best practices that promote and preserve the health of the users and their private information when interacting with computers and the internet.

This includes everything from having an organized file structure on your computer, setting the correct level of security permissions on your online accounts, deciding if you will install a new app, or decide the risks of using new technology.
Maintaining good digital hygiene will keep you safer on the internet. Everything you own online can become a source of entry or a piece of information used by a bad actor to launch a scam or cyberattack against you. By getting rid of the junk, tidying up your accounts, and securing the things you actually  use, you reduce both the likelihood of getting attacked and the severity of a successful attack. And just like cleaning your physical house, there’s also an emotional benefit to cleaning up your digital life. Having a world with fewer emails to ignore and more storage on your devices is more efficient and can be highly satisfying!
base64 (2)   1. Let's install some anti-virus software
There are many good options for Anti-Virus, I recommend Bitdefender's free version for home use.
This will work for Windows, Mac, Android, and iOS devices.
base64 (3) 2. Update your devices and software
That update you've been deferring on your phone, computer, or tablet's operating system? Today is the day.
Up-to-date devices generally are
  • Faster
  • More secure
  • Have newer features
  • Have fewer problems
Don't forget your browser! Your browser may have an update and will need to get restarted for it to apply.
While you are at it, let's go through your apps, and uninstall anything you don't need anymore. If you are unsure about an app, program, or utility, try searching for it here on

base64 (4) 3. Clean up your email                             

  1. Learn how to spot a phishing email
  2. Go through your emails and unsubscribe from junk/spam mail that you're not going to read anyway.
  3. This is a great time to make a list of accounts that you have with organizations that have your personal/company information that you never intend to work with again. 
  4. Organize your remaining emails using folders, tags, or labels. 
  5. Achieve "inbox zero" ( if you're having trouble maintaining this try these steps )

7405194. Start using a password manager       

Maybe you've been waiting for a sign from heaven telling you it's time to start. Well, here it is.
Here is your sign.

13205645. Multi-factor authentication

Many of your accounts likely allow you to turn on MFA. MFA is the silver bullet to stopping hackers from getting into your accounts.
Multi-factor authentication means requiring more than just your password to login to something. This is often a text message to your cell phone but can come in other forms, like an email verification, facial recognition, fingerprint, or the use of a token-based authentication app like Authy .

You'll want to turn on MFA for all accounts that have information that is unique to you.

9774796. Review your online accounts                

  1. Get that list of unwanted accounts that you created when going through your inbox. Now's the time to go through it, go log in, find your account settings, and delete that account and all its data for good.
  2. If you can't find a "delete my account" section, consider emailing their support team through their "contact us" page and requesting all data associated with your username and email address to be deleted. 
  3. Next, go to  and enter your email addresses. Write down the accounts that have been breached
  4. Now you'll want to go change your passwords on these accounts and any other accounts that have the same password! Save your new passwords into your password manager.


18028117. Secure your Device                                  

Let's set up a login password on all your devices
Consider the risk of losing your device and what it might mean if a hacker had physical access to your device and all the time in the world. It might be worth it to encrypt your device. Here's how to do it.

21461388. Data in transit                                           

Not all your data lives on your devices. Much of it lives in the cloud accounts that are prevalent in our everyday lives. You may be surprised to know how little of your data is protected in transmission between your devices and these cloud accounts.

It's a good idea to  Enable HTTPS everywhere

And consider subscribing to's solution 

7089209. If you've made it this far.... Congratulations 

How does it feel?

If you'd like security training for you and your team, are interested in cybersecurity for your organization, or want to know how you can better protect yourself visit us at



You may also like

Hosting Your Applications with ...
on October 1, 2021

Also known as Azure, Microsoft Azure is an online platform offering several cloud computing ...

commentIcon 0 Comments
Taylor Wells
5 Exciting New Features of ...
on September 9, 2021

Microsoft, the second-largest provider of unified communications as a service (UCaaS), recently ...

commentIcon 0 Comments
Taylor Wells
5 Lessons from JBS and Colonial ...
on August 31, 2021

Cybercriminals continue to penetrate the security system of business enterprises through various ...

commentIcon 0 Comments
Taylor Wells
5 Ways to Improve Your Security ...
on August 13, 2021

The Health Insurance and Portability and Accountability Act (HIPAA) is a policy that protects ...

commentIcon 0 Comments
Taylor Wells

Want to learn more?

Check out one of our live webinars!

Attend a webinar