Afterlife Access: Cybersecurity Planning for When You’re Gone Podcast Por  arte de portada

Afterlife Access: Cybersecurity Planning for When You’re Gone

Afterlife Access: Cybersecurity Planning for When You’re Gone

Escúchala gratis

Ver detalles del espectáculo

Acerca de esta escucha

What happens to your digital world when you die? In this episode of Cyberside Chats, LMG Security’s Tom Pohl joins the conversation to discuss the often-overlooked cybersecurity and privacy implications of death. From encrypted files and password managers to social media and device access, we’ll explore how to ensure your loved ones can navigate your digital legacy—without needing a password-cracking expert. Learn practical strategies for secure preparation, policy design, and real-world implementation from a security professional’s perspective.

Takeaways

1) Take a Digital Inventory of Your Assets

  • Include details like account recovery options, two-factor authentication settings, and related devices.
  • Update the inventory regularly and store it securely.
  • Create a comprehensive list of your digital assets, including accounts, devices, files, cloud services, and subscriptions.

2) Implement Emergency Access Protocols in Password Managers

  • Use features like 1Password’s Emergency Kit or designate trusted emergency contacts.
  • Store emergency credentials securely (e.g., safe deposit box) and reference in legal documents.
  • Ensure all critical credentials are actually stored in your password manager—don’t leave them in separate notes or documents.

3) Establish a Digital Executor

  • Choose a trusted individual to manage your digital assets after death or incapacitation.
  • Document access instructions and store them securely, such as in an encrypted file with a shared key.
  • Ensure your digital executor knows where these instructions are located—or give them a copy in advance.

4) Prepare Recovery Access for Critical Devices

  • Ensure recovery keys and PINs for devices (e.g., smartphones, laptops, smart home hubs) are stored securely and can be accessed by designated individuals.
  • Register a Legacy Contact for Apple and other cloud services.

5) Create a Plan for Your Online Presence

  • Decide whether your social media and email accounts should be memorialized, deleted, or handed over.
  • Use services like Google Inactive Account Manager or Facebook’s Legacy Contact feature.

6) At Work, Develop Internal Organizational Policies

  • Implement IT procedures for handling the death or incapacity of key personnel.
  • Regularly audit and securely store credentials for essential systems, especially for sole-proprietor scenarios.

References:

How to Add a Legacy Contact for Your Apple Account: https://support.apple.com/en-us/102631

Get To Know Your Emergency Kit: https://support.1password.com/emergency-kit/

Wayne Crowder’s LinkedIn Page: https://www.linkedin.com/in/wcrowder

Digital Afterlife Planning Checklist: https://www.lmgsecurity.com/resources/digital-afterlife-planning-checklist/

#Cybersecurity #Cyberaware #Cyber #DigitalPlanning

adbl_web_global_use_to_activate_T1_webcro805_stickypopup
Todavía no hay opiniones