Online Safety Checklist

Manage your privacy
& erase your footprint online

These 7 powerful security practices can inspire you to take action & improve your online safety checklist

The internet is a fantastic resource, but it also carries risks. Whether you are working, studying, or simply browsing, your online safety should always be a top priority.

This Online Safety Checklist is designed to help anyone—from teens to seniors—secure their digital lives with tools and strategies that are easy to follow and build on.

Below, on this online safety checklist, you’ll find a mix of free tools, practical tips, and some premium products for enhanced protection.

NOTE: This is not expert advice, but public free will advice from a normal person who will let you create your own online safety checklist.

1. Types of scam

Education and Awareness:

Learn about common types of scams: phishing, smishing (SMS phishing), social engineering, ransomware, etc.

Understanding these can help you recognize warning signs.

Text or SMS scams

Text or SMS was the most reported contact method for scams last year. Scam messages sound urgent to get you to act quickly. They often have a link that will take you to a scam website. Scammers can steal any personal information you enter on these scam websites and use it to steal your money or commit fraud on your behalf.

Phone scams

Scammers call, claiming to be from well-known organisations. This includes government organisations, law enforcement, investment and law firms, banks, telecommunication providers.

Email scams

They use the same logo and a similar email address as the real organization. Scammers can also copy or 'spoof' the email address of an organization or business to make the scam email look more real.

Social media Scams

Scammers set up fake profiles on social media, messaging platforms and apps. They pretend to be from the government, a real business, employer, investment firm, or even a friend, family member or romantic interest.

Website scams

Scammers create fake websites to look like well-known brands. They impersonate famous people and make it look like they recommend the product or service. They use fake reviews to make you trust them.

Investment scams

Scammers use convincing marketing and new technology to make their investment sound too good to miss. They promise you big payouts with little or no risk. They often use pressure tactics to get you to act fast, so they can steal your money.

Face to face Scams

Scammers may knock on your door or approach you in public and ask you to do something.

Romance scams

Scammers will find you on social media, dating or gaming apps and websites. They might also text or email you. They hide behind fake profiles and identities, sometimes of famous people. They’re really good at making you feel special, so you believe the relationship is real.

Product & services scams

Scammers set up fake websites or profiles on actual retailer sites. They then offer products or services at prices that are too good to be true. They also post fake ads and fake reviews. They may use stolen logos, a .com.au domain name and stolen Australian Business Number (ABN). These scams are hard to spot.

Threats & extortion scams

Scammers pretend to be from an organization and claim you need to pay money. They may threaten you with arrest, deportation, or even physical harm if you don’t agree to pay them immediately.

Jobs & employment scams

Scammers pretend to be hiring on behalf of high-profile companies and online shopping platforms. They also impersonate well-known recruitment agencies. Their goal is to steal your money and identity details.

Unexpected money

Scammers try to convince you that you are owed or entitled to, money or winnings that you did not expect to receive. The scammer asks you to pay a fee or to give your financial or identity details so you can get the money or winnings. There is no free money, and you will lose more money trying to get it.

Phishing & social engineering

What is Phishing?

Phishing attempts to trick you into revealing personal information by pretending to be a trustworthy source.

How to Recognize Phishing

  • Be wary of unexpected emails requesting personal information.
  • Check the sender’s email address for suspicious signs.
  • Avoid clicking on links in suspicious emails.

Prevention

  • Use reliable antivirus software, like Norton or Bitdefender.
  • Enable spam filters in your email client.

Social media

Privacy Settings on Social Media

Configure your privacy settings on social media to limit who can see your information:


Sharing Personal Information

Be cautious about what information you share online. Avoid posting sensitive details like addresses, phone numbers, or birthdates.

Frequently asked questions

  • Be cautious of unexpected emails requesting personal information.
  • Check the sender’s email address for legitimacy.
  • Avoid clicking on links or downloading attachments from suspicious emails.
  • Use reliable antivirus software and enable spam filters.
  • Without a VPN, never, conduct important business online, never access financial records or institutions or important government facilities online. Without a VPN, when you are operating in an open, public wifi environment, you should assume your traffic and keystrokes are being monitored. It is extremely easy for anyone to do so.
  • Encrypts your internet connection, protecting your data from hackers.
  • Hides your IP address, enhancing your online privacy.
  • Allows access to restricted content by bypassing geographic restrictions.

Before, during & after a scam

Free web scanner

  • Malcure Webscan is a free website security scanner against malware. 
  • VirusTotal will analyze files and URLs for malware using multiple antivirus engines.

  • Sucuri SiteCheck scans websites for malware, blacklisting, server errors, and outdated software.

Free lookup websites

  • Truecaller  is a global phone directory and caller ID service that helps identify unknown callers and block spam calls.

  • Spy Dialer allows you to find phone numbers and owners by entering the phone number.
    It works in many countries.

  • Pipl is a comprehensive search engine to find information about people worldwide by searching name, email, phone number, or username.

Free breach check

  • Have I Been Pwned is a free service that allows you to check if your email addresses or phone numbers have been compromised in known data breaches.

  • Firefox Monitor is a free service from Mozilla that lets you check if your email addresses have been compromised and send alerts about future breaches.

  • DeHashed is a search engine for compromised data, allowing you to search for email addresses, usernames, IP addresses, phone numbers, and more. 

During a scam attempt

  • Scamwatch is an Australian government service providing information and advice on how to avoid and report scams. It offers resources for both consumers and businesses.
  • Globalantiscam is a global anti-scam resource providing information and tools for identifying and reporting scams. It aims to protect users from fraudulent activities worldwide.
  • The European Anti-Fraud Office (OLAF) is the EU’s anti-fraud office offering information and resources on preventing and reporting scams within Europe. It provides support for both individuals and organizations.

  • Go straight to the local police station and make a report on the matter. This must happen as soon as possible!

After a scam attempt

  • IdentityTheft.gov is a U.S. government service that helps identity theft victims report and restore their identity.

  • Action Fraud is the UK’s national reporting center for fraud and cybercrime.

  • Europol EC3 is Europol’s center for combating cybercrime, providing resources and information on how to handle cybercrime.

The FREE Lookup Hub

If you need an overview of free LookUp that provides the necessary information, this security hub will not disappoint you.

10 "musts" for your own online safety checklist

Use strong passwords.

Use a combination of letters, numbers, and special characters.

Change regularly: Update your passwords regularly.

Avoid reuse: Do not use the same password on multiple websites.

Be aware of phishing and suspicious emails.

Do not open attachments or click on links from unknown senders.

Check URLs: Make sure you are visiting the correct website by checking the URL carefully.

Double-check information: If something seems suspicious, contact the company directly via their official contact information.

Update software regularly.

Operating System: Keep your operating system up to date to protect against the latest threats.

Programs: Make sure all your programs and apps are up-to-date.

Antivirus: Install and keep your antivirus software up-to-date.

Use secure networks.

Public Wi-Fi networks: Avoid using public Wi-Fi networks for sensitive activities.

VPN: Consider using a VPN to protect your internet connection when using public networks.

Be aware of your privacy settings.

Social media: Review and adjust your privacy settings regularly.

App Permissions: Give only the necessary permissions to apps.

Information Sharing: Do not share personal information publicly unless necessary.

Be critical of what you read.

Fake news: Be aware of misinformation and verify the sources.

Reviews and recommendations: Read more reviews to get a better overview.

Backup your data.

Regular backups: Take regular backups of your important files.

Use the cloud: Consider using a cloud-based service for your backups.

Be careful with downloads.

Trusted sources: Only download software and files from trusted sources.

Scanned downloads: Use antivirus software to scan downloads for malware.

Understand web page certificates.

HTTPS: Only visit websites with HTTPS in the URL to ensure your data is encrypted.

Certificate details: Click the padlock symbol in the browser’s address bar to view certificate details.

Learn about digital footprints.

Cookies and tracking: Understand how cookies and tracking work and manage your settings.

Anonymous Browsing: Use incognito mode to minimize the traces of your activities online.

2. Secure Proton email built for privacy

Your data is 1000 feet below
with the strongest GDPR law

ProtonMail
Credit: ProtonMail

CERN scientists in Switzerland developed ProtonMail.

Proton Mail is an encrypted email service designed to protect user privacy and ensure secure communication. Created by the team behind Proton Pass, it offers end-to-end encryption and operates under strict Swiss privacy laws.

Proton Mail is perfect for individuals and businesses focused on secure and private communication, though storage limitations and premium costs may deter some users.

Quick Facts

  • Developer: Proton AG (based in Switzerland).
  • Platforms: Web, iOS, Android, and desktop clients.
  • Encryption: End-to-end encryption (E2EE).
  • Pricing: Free plan with limited storage; premium plans offer more features.
  • Additional Features: Custom domains, encrypted contacts, and calendar integration.

Security Details

  • Encryption: AES-256 and OpenPGP for strong protection.
  • Zero-Access Design: Proton cannot read or access your emails.
  • Swiss Jurisdiction: Data is protected by strong privacy laws.
  • Open Source: Audited for transparency and trustworthiness.
  • Anti-Phishing: Advanced tools to detect and block malicious emails.

Price

  • Free, but with a premium plan, it will start at €5 per month.
Safety first

All in on ProtonMail

Take control of yourself, your data, and your e-mails today with PROTON for FREE!

Email  VPN  Cloud storage
 Password manager  Calender  Wallet 

Premium plans start at €5 per month.

3. Privacy-focused Proton password management

Hide & seek
against a proactive ghost

Proton-Pass
Credit: ProtonPass

Proton Pass is a secure password manager developed by Proton AG, the same company that created Proton Mail. It offers end-to-end encryption for password storage, secure notes, and autofill features, ensuring your sensitive data remains private.

Proton Pass is ideal for users who value security and privacy, but it may not yet meet the needs of power users requiring extensive features.

Quick Facts

  • Developer: Proton AG (based in Switzerland).
  • Platforms: Web, iOS, Android, and browser extensions.
  • Encryption: End-to-end encryption (E2EE).
  • Pricing: Free version available; premium plans for advanced features.
  • Additional Features: Secure storage for notes and multi-factor authentication support.

Security Details

  • Encryption: AES-256, bcrypt, and secure autofill mechanisms.
  • Zero-Access Design: Proton cannot access your stored data.
  • Open Source: Code is publicly available for audits.
  • Multi-factor authentication: Enhanced security against unauthorized access.
  • Phishing Protection: Secure autofill guards against malicious attacks.

Price

  • Free, but with a premium plan, it will start at €5 per month.
Safety first

All in on ProtonPass

Take control of yourself, your data, and your e-mails today with PROTON for FREE!

Email  VPN  Cloud storage
 Password manager  Calender  Wallet 

Premium plans start at €5 per month.

Read TOP 5 most secure email platforms

Always run a background check on email platforms to ensure the security of your data and communication.

4. Two-Factor Authentication(2FA): Enhancing account security

Extra layer of security can stop
a malicious person from gaining access

Google 2FA
Credit: Google 2FA

Google Two-Factor Authentication (2FA) adds an extra layer of security to your Google account, requiring a second verification step beyond your password. It helps protect your account from unauthorized access, even if your password is compromised.

Google 2FA is an effective and accessible way to secure your account, but its reliance on devices and manual setup may pose challenges for some users.

Quick Facts

  • Developer: Google.
  • Supported Methods: SMS codes, authenticator apps, security keys, and prompts.
  • Availability: Free for all Google account users.
  • Setup: Easy integration via account settings.
  • Compatibility: Works across most devices and Google services.

Security Details

  • Second Verification: Adds an additional step beyond your password.
  • Multiple Options: Includes SMS, Google Authenticator, and physical security keys.
  • Phishing Resistance: Advanced methods like security keys are highly resistant to attacks.
  • Device Awareness: Detects suspicious login attempts and notifies users.
  • End-to-End Integration: Fully integrated into the Google ecosystem.

Price

  • Free
Safety layers next

Two-factor: Two layer

5. Bitdefender: Ultimate cybersecurity for a safer digital life

Extra layer of security can stop
a malicious person from gaining access

Bitdefender
Credit: Bitdefender

Bitdefender is a world-class cybersecurity solution designed to protect your digital life with cutting-edge technology. From real-time malware defense to privacy tools like a VPN and webcam protection, Bitdefender keeps you secure while offering a seamless user experience. It’s a shield for your online world, empowering you to browse, work, and play with confidence.

With Bitdefender, you’re not just getting antivirus protection—you’re investing in a smarter, safer, and simpler way to enjoy the digital world. It’s the perfect choice for anyone who values security without compromising convenience.

Quick Facts

  • Developer: Bitdefender (founded in 2001, trusted globally).
  • Platforms: Windows, macOS, Android, iOS.
  • Core Technology: AI-driven threat detection, cloud-based scanning.
  • Plans: Free and premium options.
  • Extra Tools: VPN, anti-tracking, and parental controls.

Security Details

  • Real-Time Defense: Stops malware, ransomware, and phishing instantly.
  • Privacy Protection: Safeguards webcams, microphones, and personal data.
  • Threat intelligence: AI-powered detection for advanced and evolving attacks.
  • Secure Browsing: Blocks malicious websites and trackers.
  • Encrypted Storage: Protects sensitive files from unauthorized access.

Price

  • Free Plan: Basic malware protection.
  • Premium Plans:
    • Bitdefender Antivirus Plus: Starting at $19.99/year.
It could be around you everyday day, & its

A little bit defensive, but mostly aggressive

6. Brave Browser: Fast, private, & rewarding browser

Stop ads, tracking & enjoy strong privacy
while earning Bat Coin

Brave Browser
Credit: Brave Browser

Brave Browser is a cutting-edge web browser built for speed, privacy, and security. With built-in ad blocking, advanced anti-tracking technology, and a unique rewards system, Brave puts you in control of your online experience. It’s not just a browser—it’s a gateway to a faster, safer, and more private internet.

Brave Browser is perfect for anyone who values speed, privacy, and transparency. It transforms your online experience into something faster, safer, and even rewarding—proving that you can browse smarter without sacrificing your privacy.

Quick Facts

  • Developer: Brave Software (founded in 2016).
  • Platforms: Windows, macOS, Linux, Android, iOS.
  • Core Features: Ad blocking, anti-tracking, and built-in VPN (optional).
  • Unique Feature: Brave Rewards lets you earn cryptocurrency (BAT) for viewing privacy-respecting ads.
  • Focus: Speed, privacy, and security.

Security Details

  • Ad & Tracker Blocking: Shields you from intrusive ads and trackers by default.
  • HTTPS Everywhere: Forces secure connections for safer browsing.
  • Fingerprinting Protection: Prevents websites from tracking your unique device.
  • Private Browsing: Offers a TOR-based private browsing mode for extra anonymity.
  • No Data Collection: Your browsing data stays private, stored only on your device.

Price

  • Free: Brave is completely free to download and use.
  • Optional Services:
    • Brave VPN: $9.99/month for secure browsing and device protection.
A lot of privacy for your own online safety checklist

Brave anti-wall protection, VPN, tor search & more

7. Truecaller: Your ultimate caller ID & spam blocker

Safe time & energy
by letting truecaller do your research

Truecaller
Credit: Truecaller

Truecaller is a powerful app that helps you take control of your calls and messages. By identifying unknown numbers and blocking spam and robocalls, Truecaller ensures that your phone remains a tool for meaningful conversations, not interruptions. It’s like having a personal assistant for your phone, protecting you from unwanted calls while keeping your communication seamless.

Truecaller is perfect for anyone tired of spam and nuisance calls, offering powerful protection and smart caller identification. It simplifies your phone experience, letting you focus on the calls that matter most.

Quick Facts

  • Developer: Truecaller (founded in 2009).
  • Platforms: Android, iOS.
  • Core Features: Caller ID, spam blocking, call recording, and contact management.
  • Data Source: Uses a vast database of numbers from global users to identify spam and unknown callers.
  • Languages: Available in over 20 languages.

Security Details

  • Spam Protection: Automatically detects and blocks spam, scam calls, and robocalls.
  • Caller Identification: Identifies unknown numbers with crowd-sourced data and user reports.
  • Privacy Control: Allows you to control what information is visible to others, ensuring you remain in control.
  • Encryption: Calls and messages are not stored or shared without your consent.
  • No Access to Contacts: Your contacts remain private, and Truecaller uses a local database for number identification.

Price

  • Free Plan: Includes basic spam blocking and caller ID features.
  • Premium Plans:
    • Truecaller Premium: $4.99/month or $29.99/year, offering additional features like call recording, premium support, and an ad-free experience.
Who´s that on the line?

Know your caller before they know you do

Conclusion

Whether you choose the FREE online security pack or the paid route, prioritizing your online safety is not just wise—it’s essential. The risks of being unprotected are significant, and once damage is done, it can be difficult, if not impossible, to reverse without the right tools and knowledge.

We encourage you to research this topic and evaluate available products carefully. While some options may be pricier, they are minor investments compared to the risks of financial loss or identity theft.

Think about the risks of leaving your security to chance. Free products offer basic protection, but for those who value online safety, premium options provide better coverage. 

Investment in digital security is essential.

Stay safe and protected online with this FREE online security pack list!

Scroll to Top