Skip to main content

One-page printable checklist: protect yourself from account takeover and modern scams

Photographer: Jakub Żerdzicki | Source: Unsplash

One-page printable checklist: protect yourself from account takeover and modern scams

Print this page and keep it near your desk. Share it with family members (especially anyone who’s been targeted by scam calls/texts).

The 5-step protection checklist

1) Turn on multi-factor authentication (MFA) — start with email

  • Turn on MFA for your email first (Gmail, Outlook, iCloud).
  • Then turn on MFA for: banking, Apple ID / Google account, social media, shopping sites.
  • Prefer an authenticator app when available.
  • Never share MFA codes with anyone who contacts you.

Done when: Email + banking + Apple/Google accounts have MFA enabled.

2) Use strong, unique passwords (with a password manager)

  • Stop reusing passwords across sites.
  • Use a password manager to generate long random passwords.
  • Make your master password long and memorable (a passphrase).
  • If a site offers passkeys, consider using them.

Done when: Every important account has a unique password stored in a password manager.

3) Lock down what you share publicly

  • Set social profiles to friends-only where possible.
  • Avoid posting: birthdate, hometown, school, address, daily routine, travel plans in real time.
  • Remove old public posts that reveal personal details.
  • Watch what’s visible in photos (mail, license plates, house numbers, badges).

Done when: Privacy settings reviewed + “about me” sections cleaned up.

4) Treat “helpful strangers” + investing as a red flag

  • Be cautious with new online friends or romantic connections.
  • Red flags include: crypto trading “tips,” a “special platform,” pressure to move to WhatsApp/Telegram, promises of guaranteed returns.
  • If you can’t verify the person in real life, assume the relationship could be fake.

Done when: You’ve decided: “I never invest based on advice from a stranger online.”

5) Verify unusual requests (this stops a huge percentage of scams)

If you get a message/call asking for money, gift cards, wire transfers, crypto, login codes, or sensitive info:

  • Pause.
  • Hang up.
  • Call back using a trusted number you already have (contact list, the back of your card, or theofficial website).
  • Don’t use links or phone numbers sent in the suspicious message.

Done when: You always “break the channel” before sending money or info.

Quick “stop signs” (when to slow down immediately)

  • The message creates urgency: “act now,” “account will be locked,” “don’t tell anyone.”
  • You’re asked to pay with gift cards, crypto, or wire transfer.
  • You’re asked for a one-time code, password, or “verification” details.
  • The story is emotional and time-sensitive (family emergency, legal trouble, missed delivery).

If you think you were compromised (fast response)

  • Change your email password first.
  • Turn on MFA (or reset MFA if you suspect it was changed).
  • Check account recovery options (backup email/phone).
  • Review recent logins and devices; sign out of all sessions.
  • Contact your bank/credit card issuer if money is involved.

Fill-in section (keep this updated)

  • Email provider support page/login: _______________________________
  • Bank fraud phone number (back of card): __________________________
  • Mobile carrier support number (SIM swap help): ____________________
  • Trusted family contact to verify requests: _________________________

Comments

Popular posts from this blog

How AI-powered social engineering exploits help desk staff and what tech companies can do to stay ahead

Photographer: Centre for Ageing Better | Source: Unsplash In today’s digital world, technology advances swiftly, bringing both opportunities and challenges. Businesses and individuals alike rely on tech for solutions and support. However, cybercriminals have adapted, using artificial intelligence (AI) to conduct sophisticated social engineering attacks targeting help desk staff. Understanding these threats and implementing effective countermeasures is crucial for companies aiming to bolster their cybersecurity. Understanding AI-powered social engineering AI-powered social engineering involves using AI tools to mimic human-like interactions, exploiting the natural trust help desk staff have in their clients. These attacks can be compelling, as AI can generate language patterns and adapt quickly to responses, making it difficult for employees to distinguish between legitimate queries and those of malicious actors. AI's ability to learn and adapt in real-time makes these attacks part...

NVMe vs SSD: Understanding the Differences and Choosing the Best Drive Type for Your Needs

Photographer: Michael Kahn | Source: Unsplash Delve into the world of hard drive storage and discover the differences between NVMe drives and SSDs, the fastest storage solutions available for your desktop or laptop. Understanding Hard Drive Storage: A Brief Overview Hard drive storage is an essential component of desktop and laptop computers. It refers to the space for storing files, documents, and software. Different hard drives exist, including traditional spinning drives, solid-state drives (SSDs), and NVMe drives. Understanding the basics of these storage solutions is crucial for making informed decisions about upgrading or purchasing a new computer. Traditional spinning drives, or hard disk drives (HDDs), utilize a spinning magnetic disk to store data. They have been around for decades and offer ample storage capacities at affordable prices. However, they are relatively slower compared to SSDs and NVMe drives. SSDs, on the other hand, use flash memory to store data. They have no ...

The AI Revolution: Who's Leading the Charge in 2025

Photographer: Igor Omilaev | Source: Unsplash Hey there, tech enthusiasts! As someone who's been tracking the AI landscape closely, I wanted to share some exciting developments happening in the world of artificial intelligence this year. 2025 has already seen some game-changing partnerships and product launches that are reshaping our perspective on technology. Let's break it down in simple terms! The Big Tech Players: What They're Up To Google's Bold Moves Google isn't holding back! They've rolled out Gemini 2.5 Pro and Gemini 2.5 Flash, which are now top performers in learning and coding benchmarks. What I find most exciting is Gemini Live, which lets you interact with AI in real-world situations through multiple formats (text, images, voice). They've also launched an AI-powered TV and enhanced their search with a new AI Mode. Remember Project Starline? It has evolved into Google Beam, offering incredibly realistic 3D video calls. Nvidia: Powering th...