Deretti Cyber Labs/Privacy & Identity/Identity Security Checklist

03 — Interactive Tool

Practical Identity Security Checklist

34 prioritized items organized by threat category. Start with your primary email — it recovers everything else. Check off items as you complete them. Progress is tracked in session.

34 Items5 CategoriesFamilies & SMBs
01

Secure Your Primary Email First

Critical Enable passkey or hardware security key on your primary email

Your email recovers everything else. SMS or authenticator app MFA is not sufficient here. Google and Microsoft both support FIDO2 passkeys natively.

Critical Remove your phone number as a recovery factor

Phone number recovery enables SIM swap bypass of all other authentication. Replace with a backup email or authenticator app recovery code.

High Generate and securely store backup codes

Store in a password manager, not in your email inbox. Print one copy; store in a physically secure location.

High Check forwarding rules and connected apps

Attackers who previously accessed your email may have set silent forwarding rules. Review in settings: Filters → Forwarding or Gmail/Outlook forwarding settings.

02

Protect Your Financial Identity

Critical Freeze credit at all three bureaus

Free, effective, and reversible. Prevents new accounts being opened in your name. Equifax · Experian · TransUnion

Critical Get an IRS Identity Protection PIN

Prevents someone else from filing a tax return in your name. Free at irs.gov/ippin. Must renew annually.

High Enable passkey or TOTP MFA on bank and brokerage accounts

Most major financial institutions now support TOTP; some support FIDO2 passkeys. If SMS is the only option, combine with a carrier account PIN.

High Set up transaction and login alerts

Real-time push alerts on all financial accounts. Minimize detection time if an attacker gains access.

Medium Use a dedicated email address for financial accounts

A separate email that is not used for social media or commercial registrations reduces its exposure surface.

03

Accounts, MFA, and Passwords

Critical Use a password manager for all accounts

1Password, Bitwarden, or equivalent. Unique, generated passwords for every account. If you are reusing passwords, this is the most impactful change you can make.

Critical Enable MFA on all accounts that support it

Prioritize email, financial, social media, and cloud storage. Passkey > hardware key > TOTP authenticator app > push notification > SMS.

High Set a carrier account PIN

Call your mobile carrier or set online. A PIN requirement for account changes dramatically reduces SIM swap risk.

High Check HaveIBeenPwned for breached credentials

haveibeenpwned.com — check your email addresses. Any matches: change that password now, and any account where you reused it.

High Audit and revoke unused app permissions

Google: myaccount.google.com/security. Microsoft: myaccount.microsoft.com. Revoke any app you no longer use, especially those with email or calendar access.

Medium Set up passkeys on high-value accounts

Google, Apple, Microsoft, GitHub, and most major financial institutions support passkeys. Enroll where available.

Medium Review and disable SMS account recovery everywhere

Systematically remove phone number as a recovery or fallback factor across all accounts. Replace with an authenticator app or backup email.

Medium Know what to do after identity theft

Bookmark identitytheft.gov. FTC-managed step-by-step recovery guide for accounts, credit, and SSN fraud.

04

Digital Exposure and Data Brokers

High Check what data brokers know about you

Search your name on Spokeo, WhitePages, Intelius, BeenVerified. Use an opt-out service (DeleteMe, Privacy Bee) for systematic removal across dozens of brokers.

High Audit app location permissions

iOS: Settings → Privacy & Security → Location Services. Android: Settings → Privacy → Permission Manager. Most apps should be set to "Never" or "While Using."

High Use a secondary phone number for registrations

Google Voice (free) or MySudo for forms, online orders, and services that do not require your primary number. Keeps your real number off commercial databases.

Medium Review public social media visibility

What is visible without being logged in? Name, employer, city, phone number, family members? Reduce what is searchable. Family member names and locations are attack intelligence.

Medium Opt out of people-search sites directly

Spokeo, WhitePages, Intelius, and BeenVerified all have opt-out forms. Manual process; re-aggregation requires periodic re-submission or an opt-out service.

Medium Consider a PO Box or virtual address for commercial use

Keeps your home address off commercial databases, data broker profiles, and online directories. Particularly relevant for executives, public figures, and remote workers.

05

Family and Behavioral Defenses

Critical Establish a family verification phrase

One word or short phrase, agreed in advance, known to all family members. Anyone can ask for it in an unexpected contact. AI voice clone scams rely on the absence of this habit.

High Know your account recovery procedures before you need them

What do you do if your email is compromised? Do you know your recovery backup email? Your backup codes? Do not discover these gaps under pressure.

High Brief family on phone verification habits

Unexpected calls from banks, utilities, government, or IT support: hang up, call back on a number from their official website. Never provide credentials, PINs, or MFA codes to inbound callers.

High Have a plan for elderly relatives

Elder fraud is the fastest-growing identity crime category. Discuss gift card payment requests (always a scam), IRS impersonation, grandchild-in-crisis calls, and tech support scams. Practice the verification phrase habit.

Medium Review children's digital footprint

Children's names, schools, ages, and locations posted publicly compound over time into a discoverable profile. Consider family-wide social media visibility review.

Medium Use a separate email for loyalty programs and commercial signups

Limits breach exposure from high-volume commercial email. Your primary email appears in fewer data breach dumps when you keep it off commercial subscription lists.

Medium Know the gift card and wire transfer scam signatures

Legitimate organizations never request gift card payment. Unexpected wire transfer requests from executives require phone verification on a known number, not a reply to the email.