Individual Digital Security Survey

This is a self-assessment to evaluate your individual digital security practices. 

After you have completed the assessment, you will receive a set of findings and recommendations based on your responses. 

The more accurate the information you provide, the more helpful the findings and recommendations will be. 

Survey

1

Password Managers

I use a password manager to create, store and manage passwords. 

?

Examples of Password Managers include LastPass, KeePass, 1Password & Dashlane. 

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
2

Two-Factor Authentication

I use Two-Factor Authentication (2FA) for my most sensitive online accounts.

?

Multi-factor authentication is a method of computer access control where a user enters several separate pieces of evidence confirming their identity during an authentication process. The term "two-factor authentication" or "2FA" is widely used. Two-factor authentication uses a combination of two different components. Example: Username/password in addition to entering a numerical pin sent via a text message to a mobile phone.

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
3

ATM PIN

Do you always shield your A.T.M. PIN when entering it at an A.T.M.?

?

Having your ATM card breached can lead to other compromises in personal security such as identity theft or even being wrongly associated with criminal activity.  

Covering your PIN with your free hand as you enter it into an A.T.M. can prevent the number from being recorded over your shoulder or being recorded by an illegal video camera.

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
4

Software Updates

I keep my operating system and applications up-to-date on both my computer(s) and mobile device(s).

?

For example, javascript and flash plugins on web browsers, Antivirus programs, and/or operating systems for PCs or Macs etc. are kept up-to-date with the latest versions installed.

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
5

Antivirus Software

I have antivirus software on my computer and scan regularly for malware. 

?

If you use a Mac or Chromebook as your personal computer and choose NOT to run antivirus, you can choose N/A for your response to this question. 

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
N/A
 
6

Backup

I am confident that my important information would not be lost if I suffered a hard drive failure or other data loss because I back up information that is important to me.

?

For example, I use Crashplan Pro or another service to backup my important files and I test periodically to ensure I can restore important files. 

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
7

Assessing Emails

I review emails carefully before clicking links or opening attachments and verify before clicking or opening if I have any doubts as to authenticity of the message. 

?

Example: Phishing attacks are commonly sent through email using attachments or links. Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. 

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
8

Social Media and Identifying Information

Do you consider what personal information is included in photos, videos and other online posts and remove potentially sensitive identifying information before posting?

?

For example, a photo from your smartphone, by default, includes geotagging indicating where and when the photo was taken, as well as from what type of smartphone. 

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
9

Social Media Connection Requests

Do you check out social media profiles for authenticity before accepting friend/connection requests from people you don't know?

?

People with malicious intent will often seek to infiltrate a target's social network to gain access to information about the individual, their friends, colleagues, etc. Accepting networking requests from unknown or little known people can increase your risk of being compromised. 

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
10

Keeping Work Devices Separate

I do not share my work devices that contain sensitive information with friends or family members. 

?

Communication devices used for work that contain sensitive information are not used by other family members or guests.

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
11

Online Transactions

Do you check online transactions to verify they are accurate?

?

Examples: Reviewing confirmation emails from merchants, and reviewing credit card statements for charges.

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
12

Mobile Phone Passcodes

Are all mobile devices set up with a secure password, pattern or passcode to lock them when not in use?

?

Examples: Mobile phones should be protected using the device features.

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
13

Mobile Phone Apps

Do you remove outdated or infrequently used apps from mobile devices?

?

Since mobile apps can collect personal data, it is recommended to eliminate non-essential and infrequently used apps from your device.

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
14

Keeping Devices Secure in Public Places

Do you secure your devices when in public and ensure they are not left unattended?

?

Example: Devices are never left unattended while logged in.

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
15

Public Wi-Fi and VPN

Do you use a VPN (Virtual Private Network) when connecting to your network from a public Wi-Fi (e.g. a coffee shop)?

?

Using public Wi-Fi when working on sensitive files can expose your data to unwanted eyes who crawl public Wi-Fi connections for information to steal. Emails, passwords, credit cards, and more may all be accessed without your authorization. Protect yourself by turning off sharing and using a VPN (Virtual Private Network). VPNs extend a private network over a public one. 

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
16

Threats to Personal Information

I have considered the threats to my personal information.

?

It is important to consider threats to confidentiality, integrity and availability of information and compare those threats against the in-place safeguards to determine which risks might warrant effort to mitigate. Applying this kind of thinking to one's personal information helps one consider threats and identify actions and behaviors that can minimize risk.

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
17

Covering Your Webcam

I have considered whether to cover my webcam(s) when not using them for video conferencing, recording, or other activities. 

?

Webcams (whether separate devices or built-in to notebook computers) can often be compromised and used to capture private or otherwise sensitive video and audio information. 

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
18

Review Habits

Do you periodically review your personal cybersecurity habits? 

?

For example, do you take time once a year to review your online accounts, passwords, and security practices to determine whether or not you need to make changes?

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
19

Credit Freeze

I have reviewed information about putting a "freeze" in place for my credit report at the four credit bureaus. 

?

Putting a credit freeze in place is recommended as an effective means of preventing identity theft. If you are not planning to apply for credit in the foreseeable future (e.g. credit cards, auto loan, mortgage, etc.) then you may wish to put in place a credit freeze with the four bureaus (Experian, Equifax, Transunion and Innovis)

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
20

International Travel

I have reviewed my personal information and thought about what devices I will bring and how I will respond if asked to provide information or access to devices at borders. (If you do not travel internationally, choose N/A). 

?

Other considerations may be how you manage your personal security if traveling to locations where hacking, theft, kidnapping or other safety risks are increased. 

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
N/A
 
21

Security at Protests/Actions

I have researched and understand the unique cybersecurity threats that can be present at protests/actions in public places and take appropriate precautions to protect my information, privacy and security. (If you do not attend protests - choose N/A)

?

There are different types of cybersecurity threats that can be present at protests in public places and it is important to understand these threats and take appropriate actions to protect your information, privacy and security.

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree
N/A
 
22

Secure Communication

I have reviewed my communications and take appropriate precautions to ensure privacy when engaged in communications that are sensitive and require security. 

?

For example, I have installed Signal on my smartphone and use Signal for chat or voice communications that are sensitive and require privacy.

Strongly Disagree
1
 
2
 
3
 
4
 
5
 
Strongly Agree

* Answer required