Tools, Checklists & Protection Kits
Download comprehensive security checklists, guides, and tools to enhance your cybersecurity posture.
Data Breach Checker
Check if your email has been compromised in known data breaches
Note: This is a simulation. Use HaveIBeenPwned.com for real checks
Essential Security Resources
Access our comprehensive collection of cybersecurity tools, checklists, and protection kits designed to help you implement robust security practices across all areas of your digital life.
Comprehensive Security Tools
Security Audit Checklist
Complete checklist to audit your personal or business cybersecurity posture and identify vulnerabilities.
View Checklist →Password Hygiene Checklist
Master password security with best practices for creating, managing, and protecting your credentials.
View Checklist →Privacy Settings Templates
Step-by-step privacy configuration templates for Facebook, Google, Apple, Instagram, and more.
View Templates →Breach Response Kit
Step-by-step response plan for data breaches, account compromises, and security incidents.
View Response Kit →Cyber Insurance Basics
Understanding cyber insurance coverage, what it protects, and how to choose the right policy.
Learn More →Data Removal Templates
Ready-to-use templates for requesting data deletion from companies, data brokers, and services.
View Templates →Security Vendor Directory
Curated directory of trusted cybersecurity vendors, tools, and service providers.
Browse Directory →Quick Reference Guides
Phishing Detection Guide
Learn to identify and avoid phishing emails, messages, and websites with red flags to watch for and real examples.
Secure Remote Work Setup
Complete guide to setting up a secure home office environment with network security and device protection.
Social Media Privacy Guide
Platform-specific instructions for securing Facebook, Instagram, Twitter, LinkedIn, and other social networks.
Data Breach Response Plan
Step-by-step instructions for what to do when you're notified of a data breach affecting your accounts.
Safe Online Shopping Guide
Tips and checklists for secure e-commerce transactions and protecting payment information.
Security Assessment Tools
Personal Security Audit
Comprehensive self-assessment to identify security gaps in your digital life.
Privacy Score Calculator
Evaluate your current privacy posture and get personalized recommendations.
Password Strength Analyzer
Check the strength of your passwords and learn how to improve them.
Device Security Scorecard
Assess the security configuration of your devices with our evaluation tool.
Emergency Response Resources
Identity Theft Recovery Plan
Detailed step-by-step process for recovering from identity theft with contact information for credit bureaus and authorities.
Account Compromise Checklist
Immediate actions to take when an online account has been hacked or compromised.
Device Loss or Theft Guide
Critical steps to take immediately after losing a phone, tablet, or laptop.
Ransomware Response Protocol
Actions to take if your device or business is infected with ransomware.
Recommended Security Tools
We've compiled a list of trusted, industry-leading security tools across different categories:
Password Managers
- 1Password: User-friendly password manager with family sharing and travel mode
- Bitwarden: Open-source password manager with free and premium options
- Dashlane: Password manager with dark web monitoring and VPN
- LastPass: Feature-rich password manager with free tier available
VPN Services
- NordVPN: Fast, secure VPN with large server network
- ExpressVPN: Premium VPN service with excellent speeds
- ProtonVPN: Privacy-focused VPN from the makers of ProtonMail
- Mullvad: Anonymous VPN that doesn't require personal information
Antivirus & Security Suites
- Bitdefender: Comprehensive protection with minimal performance impact
- Norton 360: All-in-one security suite with VPN and backup
- Kaspersky: Strong malware protection with advanced features
- ESET: Lightweight antivirus with excellent detection rates
Two-Factor Authentication Apps
- Authy: Multi-device 2FA with cloud backup
- Google Authenticator: Simple, reliable authenticator app
- Microsoft Authenticator: Integrated with Microsoft accounts
- YubiKey: Hardware security keys for ultimate protection
Educational Resources
Security Awareness Training
Interactive courses covering essential cybersecurity topics for individuals and teams.
Video Tutorials
Step-by-step video guides for implementing security measures and using security tools.
Webinar Library
Recorded webinars on current threats, trends, and best practices in cybersecurity.
Security Glossary
Comprehensive glossary of cybersecurity terms and concepts explained in plain language.
Reporting Resources
Know where to report different types of cyber incidents:
Identity Theft
Report to Federal Trade Commission at IdentityTheft.gov and file police report in your jurisdiction.
Internet Crime
File reports with the FBI's Internet Crime Complaint Center (IC3) at ic3.gov.
Phishing & Scams
Report to Anti-Phishing Working Group at reportphishing@apwg.org and the Federal Trade Commission.
Financial Fraud
Contact your financial institution immediately and report to local law enforcement.
Stay Protected
Cybersecurity is an ongoing process, not a one-time fix. Use these tools and resources regularly to maintain strong security practices. Bookmark this page and return often as we continually update our resources with the latest tools and information.
Need Personalized Guidance?
Every situation is unique. If you need help implementing these security measures or have questions about specific threats, explore our comprehensive guides in each security category: