This checklist is a structured review tool for evaluating your account security,
access permissions, and exposure points. It can be used after a breach or as a periodic review.
This page is educational and informational. It is not a personal risk assessment.
Email Security
Password updated and unique
Multi-factor authentication enabled
Recovery email reviewed
Forwarding rules checked
Unknown sessions logged out
Password Hygiene
No reused passwords
Strong passwords generated
Vault access protected
Backup codes stored safely
Old credentials replaced
Connected Apps & Access
Unused integrations removed
Third-party permissions reviewed
Old devices signed out
API access reviewed
Unknown services revoked
File & Storage Review
Sensitive files identified
Old share links removed
Public links disabled
File access permissions verified
Backups confirmed
Account Structure
Critical accounts separated
Different emails used by category
High-value logins isolated
Temporary accounts segmented
Identity zones reviewed
Connection Safety
Public network logins avoided
Secure connection tools used when needed
Unknown Wi-Fi avoided for sensitive access
Devices updated
Security alerts enabled
Optional Full Reset Approach
Some users choose to rebuild their account environment instead of adjusting individual settings.
This approach focuses on establishing a clean infrastructure for identity, storage, and credentials.