The digital age brings a wealth of opportunity, but like any technology, it’s important to keep security top of mind. In recent months tech-leaks continue to make headlines. While it’s startling and at times intimidating, most people, brands, and businesses require an online though so removing your digital footprint altogether rarely stands as a viable option. Therefore, I won’t make the radical suggestion that you delete everything. (With cloud-based technology and other advancements ‘deleting everything’ isn’t even that plausible). That being said, I do suggest taking a few extra steps to protect you and your information within the digital sphere.

Name, Birth Dates and Children don’t make for Solid Security

In today’s day and age, everyone used their name or birthday for a password at some time or another. I urge you to break the cycle. I know what you’re thinking. ‘But how will I remember Xkhd6Kvz!9S?’ The answer is you won’t, but you also don’t have to. Nowadays a plethora of password encrypted apps exist on the market, and a lot of them are free like this one here. They even generate strong passwords for you and all you have to do is remember a single password for the app itself.

Set Up Alerts and Run Checks

Similar to programs where you can receive alerts each time a card was used, or a computer is logged into in a new place; you can set up similar alerts for most of your social media accounts. These monitoring systems act as backup and supervise aspects of your accounts you might not think of or have time to account for. As Charli Day instructs, “Consider installing intrusion detection apps on your phone. These apps will detect suspicious activity and unauthorized access to your online accounts.

Also, remember that most highly publicized leaks setup a means for customers to check if they are susceptible to it. Equifax launched a program to find out if your data was stolen and Facebook is set to launch something similar early next week. If you think you might have exposure, it can’t hurt to run yourself through their programs.

Limit Access

This goes for people, apps, and software. If an employee no longer needs to access accounts then change the passwords. Even if you trust them, things change, and an added login credential drifting around only opens the door wider for hackers. The same goes for apps and software. If you no longer use a posts scheduler, disable the access to your information. These fee programs can often become easily hacked because they don’t have the time or investment to increase security. As mentioned here, “Audit which tools have access to your accounts—regulate tools that help with posting since they might be vulnerable to attacks.”

These small, simple steps only serve to help you and secure your accounts.