Regularly review and update your list of authorized devices

Particularly concerning sensitive accounts, such as your email, online banking and cloud storage, regular reviews and the updating of authorized devices thereof act as a defense against potential security threats. If you identify a new device that you either don’t recognize or no longer use, remove it immediately and file a report if necessary.

Here are some tips for managing your list of authorized devices:

  • Make a list of all the devices you use to access your sensitive accounts.
  • Regularly review the list and remove any devices that you no longer use.
  • If you see a device that you don’t recognize, remove it immediately and contact the account provider to report it.
  • Enable two-factor authentication on all of your sensitive accounts. Two-factor authentication adds an extra layer of security by requiring you to enter a code from your phone in addition to your password when logging in.

By following these tips, you can help to protect your sensitive accounts from unauthorized access.