Dr Greg Gogolins No Brainer to Advanced Cyber Security Best Practices

During a recent podcast episode with Dr. Greg Gogolin, a nationally recognized cybersecurity and digital forensics expert, we discussed the everyday mistakes people make online and both the simple and advanced steps anyone can take to dramatically reduce their risk.

To help you stay protected, we created this Cybersecurity Safety Checklist based on that conversation. These are real-world, high impact habits you can start using today to safeguard your identity, finances, and personal information.

No-Brainer

1. Use Strong, Unique Passwords

What to do:

·         Create long passwords (10–12+ characters) using a mix of symbols, numbers, and letters.

·         Use a different password for every important account.

·         Avoid using personal information like birthdays or names.

·         Example – i&me#LOVE50beetles


Why it helps:
If one password is stolen, criminals can’t break into all your accounts.

 

2. Use Fake Answers for Security Questions (next to username and password)

What to do:
Avoid using real personal details.


How to implement:

·         Use creative answers like MyShoesAreTooBig or RedCar77.

 

Why it helps:
Real answers are often easy for criminals to discover.

 

3. Avoid Basic or Predictable Usernames

What to do:
Do not use your email address, your first name, last name, or any combination of your name as your username.

How to implement:

·         Create usernames that do not reveal anything about your identity

·         Example - RiverTrail47

·         Avoid using usernames found on social media or public accounts.


Why it helps:
Hackers routinely guess usernames using emails or names—they’re the most predictable targets. A unique username makes your account far harder to breach.

 

4. Password & Username Storage

What to do: Avoid storing passwords or usernames in unsecure locations such as your phone’s contacts or photo gallery.

How to implement:

• Keep sensitive credentials written only in a secure offline location.
• Do NOT store passwords in Contacts—many apps can access them.
• Avoid taking photos of passwords or important documents – many apps can access them.
• For your most sensitive accounts, consider writing down credentials on a sheet mixed with unrelated notes, stored safely at home.

Why it helps: Criminals and even legitimate apps can easily access contacts or photo galleries. Avoiding digital storage reduces exposure if your device is lost, hacked, or compromised. Storing sensitive information offline lowers the risk of passwords being discovered or scraped.

 

5. Use an Authenticator App

What to do:

Enable two-factor authentication (2FA) using an authenticator app instead of text messages.


How to implement:

·         Download apps such as Authy, Google Authenticator, or Microsoft Authenticator.

·         When your bank or financial institution asks for 2FA, select “Use authenticator app.”


Why it helps:
Authenticator codes are much harder for hackers to intercept than text messages.

Best Cybersecurity Practices

1. Monitor Your Accounts Regularly

What to do:
Stay aware of transactions and account activity.


How to implement:

·         Set up alerts for withdrawals, transfers, or purchases.

·         Check your balances weekly.

·         Use a read-only financial dashboard for easier monitoring.


Why it helps:
Fraud is easier to stop when caught early.

 

2. Freeze Your Credit

What to do:
Place a freeze on your credit file.


How to implement:

·         Contact either TransUnion, Equifax, or Experian.

·         They will notify the others automatically.

·         Temporarily “lift” the freeze when applying for a loan.


Why it helps:
Prevents criminals from opening loans or credit cards in your name.

 

3. Limit Social Media Sharing

What to do:
Be mindful of what you share online.


How to implement:

·         Avoid real-time vacation posts.

·         Don’t share your full birthdate, address, or workplace.

·         Ask friends and family not to post your personal details.


Why it helps:


Criminals use social media to profile and impersonate people.

 

4. Help Aging Parents Stay Safe from Impersonation Scams

What to do:
Talk with your parents about how they know who they talk to online or phone is legit.


How to implement:

·         Create a family code word for verification.

·         Set up read-only account access so you can help monitor.

·         Encourage them to verify legitimacy before sending money.


Why it helps:
Older adults are frequent scam targets. This protects vulnerable adults from impersonation scams.

 

5. Avoid Clicking “Unsubscribe” on Suspicious Emails

What to do:
Don’t interact with junk email.


How to implement:

·         Mark suspicious emails as Junk or Block Sender.

·         Never click links unless you trust the sender.


Why it helps:
Scammers use unsubscribe links to confirm your email is active.

 

Hardware Best Practices

1. Secure Your Home Wi-Fi

What to do:
Make sure your home network is safe and up to date.


How to implement:

·         Replace routers older than 4–5 years.

·         Change the default password on your router. Default passwords are usually found on the back of the router.

·         Install firmware updates regularly.

·         Create a Guest Network for visitors and smart devices.


Why it helps:
Old or default routers are one of the easiest ways criminals gain access to your home network.

 

2. Use a Dedicated Device for Financial Accounts

What to do:
Use one device only for banking, retirement accounts, and taxes.


How to implement:

·         Use an inexpensive Chromebook, iPad, or tablet.

·         Do not browse the web, check email, or use social media on this device.

·         Avoid installing apps that aren’t absolutely necessary.

o   Why: aps can scrape data and provide another access point to your device to those that wish to do you harm


Why it helps:
Reduces exposure to malware and keeps financial activity isolated and safe.

 

3. Use a VPN on Public Wi-Fi (Advanced)

What to do:
Turn on a Virtual Private Network (VPN) whenever you're on public Wi-Fi.


How to implement:

·         Install a reputable VPN on your phone or laptop

·         Turn it on before logging into email or financial accounts.

·         Trusted No-Log VPN Providers:
- ProtonVPN – Based in Switzerland; strong privacy protections
- Mullvad VPN – Extremely privacy-focused; no email required
- NordVPN – Independently audited no-log policy
- IVPN – Transparent ownership, strong privacy stance


Why it helps:
VPNs encrypt your internet traffic, keeping hackers from seeing your activity on public networks.

If you’d like to dive deeper into these best practices, we encourage you to listen to our full conversation with Dr. Greg Gogolin, where we discuss real-world examples, practical tips, and how to stay protected in a fast-changing digital world.

·         YouTube

·         Spotify

·         Apple Podcast

Next
Next

The Best Gift You Can Give a Young Investor: Time