Your First 30 Days of Better Security
Starting a security journey can feel overwhelming.
There are hundreds of tools, thousands of best practices, and it seems like you need a PhD in Computer Science just to understand the basics.
Here's the truth: You don't need to do everything at once.
In fact, trying to overhaul your entire digital life overnight is a recipe for burnout. You'll get overwhelmed, do nothing, and end up exactly where you started.
Better approach: One small action every day for 30 days.
By the end of this month, you'll have transformed your security posture from "easy target" to "actually pretty secure."
Each day takes 5-30 minutes max. No technical expertise required. Just follow along.
Let's get started.
Week 1: Foundation Building
Day 1: Enable 2FA on Your Email
Time required: 10 minutes
Why it matters: Your email is the master key to everything else
Action steps:
- Log into your primary email account
- Find Security Settings
- Enable Two-Factor Authentication
- Choose authenticator app (not SMS if possible)
- Save your backup codes somewhere safe
Resources:
- Gmail 2FA Setup Guide
- Outlook 2FA Setup Guide
- Download Google Authenticator or Microsoft Authenticator
✅ Success indicator: You need a code from your phone to log into email
Day 2: Audit Your Passwords
Time required: 20 minutes
Why it matters: Understanding the problem before solving it
Action steps:
- Make a list of your most important accounts
- Honestly assess: Are you reusing passwords?
- Identify your weakest passwords
- Check if you've been in a breach: haveibeenpwned.com
Don't change anything yet—just assess the situation.
Write down:
- How many accounts reuse the same password?
- How many passwords are weak (short, simple, obvious)?
- Which accounts showed up in breaches?
✅ Success indicator: You have a clear picture of your password security
Day 3: Choose and Install a Password Manager
Time required: 15 minutes
Why it matters: You can't fix passwords without the right tool
Action steps:
- Choose your password manager:
- Bitwarden (recommended for most people—free, excellent)
- 1Password (paid, very polished)
- Dashlane (good free tier)
- Download and install on your computer
- Install browser extension
- Install mobile app
- Create your master password (make it STRONG—this is the only one you'll need to remember)
Master password tips:
- Use a passphrase: "BlueCoffee!Runs@Midnight37"
- At least 16 characters
- Mix of words, numbers, symbols
- Memorable but not obvious
- Don't write it down digitally—memorize it or use a physical note in a safe place
✅ Success indicator: Password manager installed and set up
Day 4: Migrate Your Most Important Passwords
Time required: 20 minutes
Why it matters: Start building the new habit
Action steps:
- Open your password manager
- Visit your 5 most critical accounts:
- Primary email
- Banking
- Primary social media
- Work email/accounts
- Cloud storage
- For each account:
- Change to a strong, unique password (let password manager generate it)
- Save in password manager
- Test logging out and back in
Don't try to do all your accounts today—just these five.
✅ Success indicator: 5 accounts now have unique, strong passwords saved in your password manager
Day 5: Enable 2FA on Financial Accounts
Time required: 15 minutes
Why it matters: Money is a prime target
Action steps:
- Log into your bank account
- Enable 2FA (usually in Security Settings)
- Do the same for:
- Credit card accounts
- Investment accounts
- PayPal or Venmo
- Crypto exchanges (if applicable)
✅ Success indicator: All financial accounts have 2FA enabled
Day 6: Enable 2FA on Social Media
Time required: 15 minutes
Why it matters: Compromised social accounts can damage relationships and reputation
Action steps:
- Facebook: Settings → Security → Two-factor authentication
- Instagram: Settings → Security → Two-factor authentication
- Twitter/X: Settings → Security → Two-factor authentication
- LinkedIn: Settings → Account preferences → Two-step verification
- TikTok: Settings → Security → Two-step verification
✅ Success indicator: All social media accounts secured with 2FA
Day 7: Week 1 Review + Backup Codes
Time required: 15 minutes
Why it matters: Don't lock yourself out!
Action steps:
- Review your progress—celebrate what you've accomplished!
- Gather all backup codes from accounts with 2FA
- Store them securely (password manager's secure notes feature works great)
- Print a copy and store physically (fireproof safe, locked drawer)
Week 1 checklist:
- ✅ Email secured with 2FA
- ✅ Password manager installed
- ✅ 5 critical accounts using unique passwords
- ✅ Financial accounts secured with 2FA
- ✅ Social media secured with 2FA
- ✅ Backup codes safely stored
Great work! You're already way more secure than most people.
Week 2: Securing Your Devices
Day 8: Update Everything
Time required: 30 minutes (mostly waiting)
Why it matters: Outdated software = known vulnerabilities
Action steps:
- Update your computer operating system
- Update your phone operating system
- Update your browsers (Chrome, Firefox, Safari, Edge)
- Update important apps
- Enable automatic updates for everything
How to check for updates:
- Windows: Settings → Update & Security
- Mac: System Settings → Software Update
- iPhone: Settings → General → Software Update
- Android: Settings → System → System update
✅ Success indicator: Everything is up to date, auto-updates enabled
Day 9: Secure Your Phone Lock Screen
Time required: 5 minutes
Why it matters: Your phone is your identity
Action steps:
- Set a strong PIN (at least 6 digits, not 123456 or your birthday)
- Enable biometric unlock (fingerprint or Face ID) if available
- Set auto-lock to 1-2 minutes max
- Enable "Find My Phone" feature
- Verify lock screen doesn't show sensitive notification content
Settings:
- iPhone: Settings → Face ID & Passcode
- Android: Settings → Security → Screen lock
✅ Success indicator: Phone locks automatically, requires strong authentication, findable if lost
Day 10: Review App Permissions
Time required: 15 minutes
Why it matters: Apps often request way more access than they need
Action steps:
- Go through apps on your phone
- Check what permissions each has (camera, microphone, location, contacts, etc.)
- Ask yourself: "Does this app actually need this permission to function?"
- Revoke unnecessary permissions
Common over-permissions:
- Flashlight app doesn't need your contacts
- Game doesn't need your location
- Shopping app doesn't need your microphone
How to check:
- iPhone: Settings → Privacy & Security → [Permission type]
- Android: Settings → Apps → [App name] → Permissions
✅ Success indicator: Removed unnecessary permissions from at least 5 apps
Day 11: Secure Your Home WiFi
Time required: 20 minutes
Why it matters: Your home network is the gateway to all your devices
Action steps:
- Log into your router (usually 192.168.1.1 or 192.168.0.1 in browser)
- Change the default admin password (YES, THIS IS IMPORTANT)
- Change your WiFi network name (SSID) to something that doesn't identify you
- Change your WiFi password to something strong (at least 16 characters)
- Enable WPA3 encryption (or WPA2 if WPA3 isn't available)
- Disable WPS (WiFi Protected Setup—it's insecure)
- Update your router firmware if available
Bad WiFi names: "Smith Family WiFi" "123 Main Street"
Better WiFi names: "PrettyFlyForAWiFi" "FBI Surveillance Van"
✅ Success indicator: Router has strong password, WiFi uses WPA3/WPA2, firmware updated
Day 12: Encrypt Your Devices
Time required: 15 minutes (setup) + time for encryption (automatic, runs in background)
Why it matters: If your device is lost or stolen, encryption protects your data
Action steps:
- Windows: Settings → Update & Security → Device encryption (turn on)
- Or BitLocker for Windows Pro
- Mac: System Settings → Privacy & Security → FileVault (turn on)
- iPhone: Automatic if you have a passcode
- Android: Settings → Security → Encryption (turn on if not already)
Note: Encryption happens in the background and doesn't slow down your device in normal use.
✅ Success indicator: All devices are encrypted
Day 13: Set Up a VPN
Time required: 15 minutes
Why it matters: Protection on public WiFi, privacy from your ISP
Action steps:
- Choose a VPN provider:
- Mullvad (privacy-focused, €5/month)
- ProtonVPN (has free tier)
- IVPN (privacy-focused)
- Sign up and download the app
- Install on your computer and phone
- Test it: Turn on VPN, visit ipleak.net to verify it's working
When to use your VPN:
- Public WiFi (always!)
- When traveling
- When accessing sensitive information
- Whenever you want extra privacy
✅ Success indicator: VPN installed, tested, and working
Day 14: Week 2 Review
Time required: 10 minutes
Why it matters: Consolidate your progress
Week 2 checklist:
- ✅ All devices updated
- ✅ Phone properly locked and secured
- ✅ App permissions reviewed and trimmed
- ✅ Home WiFi secured
- ✅ Devices encrypted
- ✅ VPN set up and tested
You're now more secure than 90% of people. Seriously.
Week 3: Email & Communication Security
Day 15: Clean Up Your Email Inbox
Time required: 20 minutes
Why it matters: Clutter makes phishing emails harder to spot
Action steps:
- Unsubscribe from newsletters you don't read
- Delete obvious spam without opening
- Archive old emails you don't need
- Set up filters to organize important emails
- Create a "Suspicious" label/folder for questionable emails
Use unsubscribe tools:
- Gmail: "Unsubscribe" link appears next to sender
- Unroll.me (third-party tool for mass unsubscribing)
✅ Success indicator: Inbox is organized, easier to spot suspicious emails
Day 16: Learn Phishing Red Flags
Time required: 15 minutes
Why it matters: Phishing is the #1 attack vector
Action steps:
- Review common phishing tactics (see Article 1)
- Quiz yourself: Google's Phishing Quiz
- Forward suspicious emails to:
- Gmail: reportphishing@google.com
- Outlook: phish@office365.microsoft.com
Practice makes perfect—the more you look for red flags, the easier they become to spot.
✅ Success indicator: Scored well on phishing quiz, can identify red flags
Day 17: Secure Your Messaging Apps
Time required: 15 minutes
Why it matters: Private conversations should stay private
Action steps:
- Switch to encrypted messaging for sensitive conversations:
- Signal (gold standard for privacy)
- WhatsApp (end-to-end encrypted)
- iMessage (encrypted if both users have iPhone)
- Download Signal or verify WhatsApp encryption
- Enable disappearing messages for sensitive chats
- Turn on screen security (prevents screenshots)
- Set up a registration lock PIN
Settings in Signal:
- Settings → Privacy → Screen Security
- Settings → Privacy → Registration Lock
✅ Success indicator: Using encrypted messaging, privacy settings configured
Day 18: Review and Revoke App Permissions (Email & Cloud)
Time required: 20 minutes
Why it matters: Third-party apps with access to your email/cloud can be security risks
Action steps:
- Gmail: Google Account → Security → Third-party apps with account access
- Microsoft: Microsoft Account → Privacy → Apps and services
- iCloud: Apple ID → Sign-In & Security → Apps Using Apple ID
- Review each app: Do you still use it? Do you trust it?
- Revoke access to anything you don't recognize or use
Common culprits: Old social media apps, quiz apps, abandoned services
✅ Success indicator: Removed at least 3 unnecessary third-party app connections
Day 19: Set Up Email Forwarding/Aliases
Time required: 15 minutes
Why it matters: Protects your real email address from spam and breaches
Action steps:
- Use email aliases for:
- Shopping sites
- Newsletters
- Any non-critical account
- Options:
- Gmail: Use the + trick (yourname+shopping@gmail.com)
- Apple: Hide My Email (iCloud+ feature)
- SimpleLogin or AnonAddy (dedicated alias services)
- Set up 2-3 aliases for different purposes
Pro tip: If an alias starts getting spam, you know who sold your email address!
✅ Success indicator: Created and using email aliases for non-critical accounts
Day 20: Backup Your Important Data
Time required: 30 minutes (+ time for backup to run)
Why it matters: Security includes availability—don't lose your data!
Action steps:
- Choose backup method:
- Cloud: iCloud, Google Drive, Dropbox (encrypted)
- Local: External hard drive (encrypt it!)
- Best: Both (3-2-1 rule: 3 copies, 2 different media, 1 offsite)
- Back up:
- Important documents
- Photos
- Financial records
- Password manager backup (if not cloud-synced)
- Schedule automatic backups
Backup tools:
- Windows: File History or Windows Backup
- Mac: Time Machine
- Cloud: Backblaze, Crashplan, iCloud, Google Drive
✅ Success indicator: Backup system configured and running
Day 21: Week 3 Review
Time required: 10 minutes
Week 3 checklist:
- ✅ Email organized and clean
- ✅ Can identify phishing attempts
- ✅ Using encrypted messaging
- ✅ Third-party app access reviewed
- ✅ Email aliases set up
- ✅ Data backed up
You're now a security-conscious digital citizen!
Week 4: Advanced Protection & Habits
Day 22: Secure Your Browser
Time required: 20 minutes
Why it matters: Your browser knows everything about you
Action steps:
- Clear browsing data (cache, cookies, history if desired)
- Review and remove unnecessary browser extensions
- Install privacy-focused extensions:
- uBlock Origin (ad/tracker blocker)
- Privacy Badger (tracker blocker)
- HTTPS Everywhere (forces secure connections)
- Configure privacy settings:
- Block third-party cookies
- Send "Do Not Track" requests
- Use HTTPS-Only mode
- Consider privacy-focused browser:
- Firefox (privacy-friendly)
- Brave (built-in ad/tracker blocking)
Chrome privacy settings: Settings → Privacy and security → Cookies and other site data → Block third-party cookies
✅ Success indicator: Browser configured for privacy, unnecessary extensions removed
Day 23: Secure Your Social Media Privacy
Time required: 25 minutes
Why it matters: What you share publicly can be used against you
Action steps: For each social platform:
- Review who can see your posts (friends only?)
- Review who can see your personal info (birthday, phone, email)
- Turn off location tagging
- Review photo tagging settings
- Limit past posts visibility
- Check what apps have access to your profile
Facebook: Settings → Privacy → Profile and Tagging
Instagram: Settings → Privacy
LinkedIn: Settings → Visibility
Twitter/X: Settings → Privacy and Safety
Ask yourself: Would I be comfortable with a potential employer seeing this?
✅ Success indicator: Privacy settings reviewed and tightened on all social platforms
Day 24: Create a Digital Inventory
Time required: 20 minutes
Why it matters: You can't protect what you don't know you have
Action steps:
- List all your online accounts (use password manager to help)
- Categorize by importance (critical, important, low priority)
- Note which have 2FA enabled
- Note which have unique passwords
- Identify accounts you no longer use (delete them later)
- Store inventory in password manager's secure notes
Categories:
- Critical: Email, banking, work
- Important: Social media, shopping, utilities
- Low priority: Old forums, trial accounts
✅ Success indicator: Complete inventory of online accounts
Day 25: Delete Unused Accounts
Time required: 30 minutes
Why it matters: Every account is a potential breach point
Action steps:
- Review your account inventory from Day 24
- Identify accounts you haven't used in 6+ months
- Delete or deactivate them
- Use JustDeleteMe for deletion instructions
- Check if your data was involved in breaches: haveibeenpwned.com
Pro tip: Some services make deletion difficult. Be persistent!
✅ Success indicator: Deleted at least 5 unused accounts
Day 26: Set Up Security Alerts
Time required: 15 minutes
Why it matters: Early warning of suspicious activity
Action steps:
- Enable login alerts for critical accounts:
- Gmail: Settings → See all settings → Forwarding and POP/IMAP → Enable "Notify me of new sign-ins"
- Facebook: Settings → Security → Get alerts about unrecognized logins
- Banking: Enable mobile alerts for transactions
- Set up Google alerts for your name and personal info
- Consider credit monitoring (free options available)
- Enable breach notifications: haveibeenpwned.com/NotifyMe
✅ Success indicator: Alert systems configured for critical accounts
Day 27: Review Your Digital Footprint
Time required: 20 minutes
Why it matters: Know what others can find about you
Action steps:
- Google yourself: "Your Name" "Your City"
- Check people search sites: Spokeo, Whitepages, BeenVerified
- Review what personal info is publicly available
- Opt out of people search sites (tedious but worth it)
- Remove personal info from old social media posts if needed
Use opt-out services:
- PrivacyDuck (paid)
- Manual removal (free but time-consuming)
✅ Success indicator: Know what your digital footprint looks like, started removal process
Day 28: Create a Security Routine
Time required: 15 minutes
Why it matters: Security is a practice, not a destination
Action steps:
- Schedule monthly security check-ins in your calendar
- Create a security checklist for monthly reviews:
- Check for software updates
- Review financial accounts for suspicious activity
- Check credit report (free annually)
- Update passwords for high-value accounts
- Review app permissions
- Check for data breaches
- Set reminders for quarterly deep-dives:
- Full password audit
- Digital inventory update
- Privacy settings review
✅ Success indicator: Monthly security routine scheduled and documented
Day 29: Share Security Knowledge
Time required: 20 minutes
Why it matters: Your security is only as strong as your weakest link (family, friends, coworkers)
Action steps:
- Help one person in your life improve their security
- Walk them through:
- Setting up 2FA on their email
- Installing a password manager
- Recognizing phishing emails
- Share this 30-day guide with them
- Create a family security plan if applicable
Remember: Be patient and encouraging. Not everyone is tech-savvy, and that's okay!
✅ Success indicator: Helped at least one person improve their security
Day 30: Celebrate & Plan Ahead
Time required: 15 minutes
Why it matters: Acknowledge your progress and commit to continued improvement
Action steps:
- Review everything you've accomplished this month (seriously, look at the full list below!)
- Identify areas where you still want to improve
- Set 3 security goals for the next 30 days
- Join a security community (CypherHarp Discord, Reddit's r/cybersecurity, etc.)
- Consider upgrading your security knowledge with courses or certifications
Your 30-Day Transformation:
✅ Week 1: Foundation
- Email secured with 2FA
- Password manager installed and in use
- Critical accounts using unique passwords
- Financial accounts secured with 2FA
- Social media secured with 2FA
- Backup codes safely stored
✅ Week 2: Device Security
- All devices updated with auto-updates enabled
- Phone properly secured
- App permissions reviewed
- Home WiFi secured and encrypted
- Devices encrypted
- VPN set up
✅ Week 3: Communication Security
- Email organized and clean
- Phishing awareness developed
- Encrypted messaging in use
- Third-party access audited
- Email aliases implemented
- Data backed up
✅ Week 4: Advanced Protection
- Browser secured and privacy-optimized
- Social media privacy settings tightened
- Digital inventory created
- Unused accounts deleted
- Security alerts configured
- Digital footprint reviewed
- Monthly security routine established
- Shared knowledge with others
You did it! 🎉
You're now more secure than 95% of internet users. That's not an exaggeration—most people never take even a fraction of these steps.
What's Next?
Keep the momentum going:
Monthly tasks:
- Run through your security checklist
- Review new accounts for 2FA setup
- Check for data breaches
- Update important passwords
Quarterly tasks:
- Full security audit
- Review and update backups
- Check privacy settings on all platforms
- Review credit reports
Continuous learning:
- Follow security news and blogs
- Stay updated on new threats
- Learn about emerging technologies
- Consider advanced security training
Want to go deeper? Check out:
- CypherHarp Membership Options for courses and mentorship
- Follow @cypherharp for daily security tips
- Subscribe to the newsletter for weekly security insights
Final Thoughts
Security isn't about being paranoid—it's about being prepared.
You've invested 30 days in protecting your digital life. That's 30 days many people will never invest. You should be proud.
But remember: security is a journey, not a destination. Threats evolve, technology changes, and your security needs to evolve with them.
The habits you've built this month will serve you for life. Keep them up, stay curious, and stay secure.
Share your success! Drop a comment below:
- Which day was most impactful for you?
- What surprised you most?
- What are you tackling next?
I'd love to hear about your journey.
Stay secure!
Harper
Ready to level up even more? Join Silver membership for exclusive intermediate tutorials, live Q&A sessions, and a community of security-minded people just like you.
Member discussion