30 DAY SECURITY CHALLENGE

A 30 DAY CHALLENGE TO HELP YOU GET CONTROL OVER YOUR ONLINE SECURITY AND PRIVACY.

DOWNLOAD THE CHALLENGE

 
 
 

DAY 1: Set Your Intentions & Take Note of Accounts and Devices

What do you intend to accomplish with this 30 day challenge? Write down your goals and mentally prepare yourself for the work ahead.

While you have your notepad out, write down any and every account and device you can think of that you currently own. For devices, collect any unused gadgets that you want to get rid of. We’ll deal with those tomorrow.

Learn More
 

DAY 2: Delete Old Accounts & Factory Wipe Old Devices

Find old accounts and old devices. Use JustDelete.me for help deleting online accounts. If you forgot your password, try to get a new password, log in, then delete those accounts.

Factory wipe old devices for reselling or e-recycling.

Learn More
 

DAY 3: Physical Security + DeleteMe: Opt Out Of Public Information Databases

Data that can be used to steal your identity, like your mailing address and phone number, can be easily hijacked. This is how you replace those by poisoning data with secondary information.

An overview on opting out of "yellow page-type" websites to better protect your personal information.

Learn More
 

DAY 4: Protect Your Network & Create A Guest Network

Your Wifi network is basically the digital front door to your house, so prioritize locking it down with security.

Learn More
 

DAY 5: Who’s On My Network? IoT Security

Log back into your admin interface and check who's on your network. Kick off any unknown devices. If any of 'em were actually your devices, just log them back in with new SSID settings. For IoT / guests - ONLY use the guest network. Your PC and personal devices can be on internal network.

Learn More
 

DAY 6: Smarthome Permissions

Smarthome apps and devices are convenient, but this comes with the cost of privacy. This tutorial covers removing permissions that are too privacy invasive.

Learn More
 

DAY 7: Set Up A Private Cloud Backup Solution

Choose a privacy friendly cloud backup solution that offers zero knowledge policies and encryption in transit. Start encrypting data that is stored in the cloud with non-zero knowledge providers.

Learn More
 

DAY 8: Set Up A Password Manager

Download and set up a password manager of your choice. Add all of your existing passwords to the new password manager.

Learn More
 

DAY 9: Generate New Passwords for ALL of Your Accounts

Generate them with the new password manager if possible, or create your own. EACH ONE MUST BE DIFFERENT.

Learn More
 

DAY 10: Set Up Two Factor Authentication / MFA / Passkeys

Download and install recommended two factor authentication app. Sign up for two factor authentication wherever possible.

Learn More
 

DAY 11: Setting Up Encryption, Lock Screens, FindMyDevice, and Auto Updating

Personal devices - phones / laptops. Set up encryption if not by default. Set up lock screen if not already turned on. Which lock screen option is best? Set up Find My Device accounts so if your device is stolen, you can remotely wipe it.

Learn More
 

DAY 12: Turn Off Bluetooth / NFC / Wireless

How to disable commonly used attack vectors when not in use, and why. Turn off Bluetooth. Turn off NFC. Turn off auto connect to known wireless access points. Forget networks you don't normally connect to. 

Learn More
 

DAY 13: AntiVirus and AntiMalware Software Apps

Choose an Antivirus and Antimalware software app you like and download it. Turn on auto scans. Turn on auto updates. 

Learn More
 

DAY 14: Set Up Privacy Conscious Smartphone Apps

Switch to privacy focused smartphone app providers such as Signal, Brave Browser, and Tunnel Bear. Opt into privacy settings on apps like WhatsApp. Turn on and use a VPN.

Learn More
 

DAY 15: Time For A Better Browser

Use a new, secure browser. Set it as default browser. Port existing bookmarks. Set up auto updates for browser. Set home page as privacy friendly search site. Delete any details saved in browser.

Learn More
 

DAY 16: Set Up Privacy and Security Extensions

Download new extensions for your browser, including HTTPS Everywhere, Privacy Badger, AdBlock, Etc. Use recommended settings, and never run more than 2 to 3 privacy extensions at once.

Learn More
 

DAY 17: AI & Infosec

Learn how to spot AI generated content, and how to avoid sharing data with AI and large language models.

Learn More
 

DAY 18: Using Proper Internet Hygiene

Don’t click on random shit. Practice being skeptical.

Learn More
 

DAY 19: Set Up A VPN

Use a VPN for most, if not all, internet usage. Learn about researching VPNs and where to find information on collected data. Pro Tip: create your own VPN.

Learn More
 

DAY 20: Clean Out Your Friends List

Clean out your friends list so you  have less chance of phishing from old friends, more privacy among smaller group of friends and family.

Learn More
 

DAY 21: Go Through Third Party App Permissions And OAuth Services

Delete any third party permissions from accounts that you no longer need. Check remaining ones for updates.

Learn More
 

DAY 22: Clean Up Social Media Network Privacy Part 1 - Facebook, Threads, Instagram, Bluesky

Double check PW / 2FA, turn off extra services, check privacy settings for playlists, private messages, account tweets or posts.

Learn More
 

DAY 23: Clean Up Social Media Network Privacy Part 2 - Google, Youtube, X, LinkedIn, Discord

Double check PW / 2FA, turn off extra services, check privacy settings for playlists, private messages, account tweets or posts.

Learn More
 

DAY 24: Create An Account on Have I Been Pwned

Learn what accounts have been breached or were part of a leak of data. Sign up for notifications for future hacks.

Learn More
 

DAY 25: Email Privacy and Security

Choose a better email provider, delete old emails and/or accounts that you no longer need. Change other online accounts to new email address. Remove contacts you don't need.

Learn More
 

DAY 26: How To Spot A Phishing Email

Be skeptical of emails, links, and downloads.

Learn More
 

DAY 27: Spot Fake Support Calls / Social Engineering Attacks / Alert Fatigue / SIM Safety

Be skeptical of unsolicited phone calls about computer support, or ultra-friendly strangers asking about commonly used security question / answers. Learn about protecting your SIM from hijack, and how to avoid alert fatigue.

Learn More
 

DAY 28: Spot ATM Skimmers / Freeze Credit History

An overview on freezing your credit history at top credit unions, plus how to spot ATM skimmers.

Learn More
 

DAY 29: Invest In A Faraday Bag / RFID Blocking Wallet / Purse

Where to buy an RFID blocking wallet or faraday bag, and what they are used for.

Learn More
 

DAY 30: Upgrade To A Privacy Friendly Operating System / Change OS Settings

How to change your operating system settings to be more secure and private. Pro Tip: Upgrading to a privacy friendly operating system is also a plus.

Learn More
 

DAY 31: BONUS: Review / Share With Friends / Take It Further With Some Resources

You've completed the challenge! Share this with friends and family, teach others what you've learned, and go farther with links and resources.

Learn more

Congrats! You deserve it!