Skip to Main Content

Clear Out Your Cyber Clutter With a Digital Spring Cleaning

Bruin bear head in front of a background of binary code


Many of us are familiar with the concept of spring cleaning. This year, consider taking some time to spring clean your digital life, too. Just like your home, your digital life can become cluttered; things pile up, get out of date, get lost, are no longer needed or need some care.

A good digital spring cleaning can help keep your devices and information safe and secure year-round. It can also help improve the speed and performance of the devices and services that you use, and reduces the risk that a hacker could access old information that you’ve forgotten about.

Here are a few tips for refreshing, renewing, and reinvigorating your cyber life:

  1. Review your online accounts.
    • Delete any you no longer use.
    • Remove information in any of your accounts that isn't needed anymore, such as saved credit cards or old documents in cloud storage.
  2. Update your devices.
    • Update the apps and operating system on all Internet-connected devices – including PCs, smartphones, tablets, home wifi routers, smart TVs, and other internet-connected devices that can be updated – to reduce risks from malware and infections.
    • Delete unused apps.
  3. Tune up web browsers.
    • Check your browser settings. Clear out old data, such as stored passwords and old autofill information, and ensure your browser is set not to store passwords.
    • Delete unused browsers.
  4. Purge old digital files.
    • Clean out your old email, files, and downloads. Always empty the trash when you’re done.
    • Unsubscribe from newsletters, email alerts and mailing lists you no longer read.
  5. Lock down your login.
    • Use a password, passcode, fingerprint, or facial recognition to log into all of your devices. Enable the strongest authentication tools available.
    • Turn on multi-factor authentication ‒ also known as two-step verification or two-factor authentication ‒ on critical accounts like email, banking and social media where available. Learn more by visiting https://stopthinkconnect.org/campaigns/lock-down-your-login
    • Take an inventory of your passwords. Are they all long and strong? Change any that aren’t.
    • Use a unique password for each account.
    • Consider using a password manager to store and protect your passwords.
  6. Refresh your online presence.
    • Review and update your online profiles on social media sites.
    • Review your privacy and security settings on social media sites and other sites you use. Set them at your comfort level for sharing.
    • Delete old photos, posts, etc. that are embarrassing or no longer represent who you are.
    • Review friends on social networks and contacts on phones and other devices. Does everyone still belong?
    • Actively manage your location services, Bluetooth, microphone and camera – making sure apps use them appropriately.
  7. Back up your files.
    • Make a complete backup of important files. Copy important data to a secure cloud site, another computer or external hard drive where it can be safely stored. Password protect backup drives.
    • Back up your files before disposing of a device.
    • Be sure you can restore the files from your backup; a backup that you can't use isn't very helpful!
    • Keep UC security requirements in mind if you make your own backups of work files. Contact your IT department for assistance.
  8. Dispose of electronic devices securely.
    • Inventory your devices and media, and take the following steps:
      • Securely dispose of electronic information you no longer need, just as you would shred sensitive paper information. Anything that has the ability to store information can retain that information even after you have deleted it, including ones that aren’t obvious, such as phones, wearables, networking equipment, copiers, printers and fax machines.
      • Thoroughly wipe all electronic devices or have them shredded by a trusted vendor before disposal.
      • Contact your IT department for information about secure data or device disposal.


Related Information:
This web page is adapted from articles by UC Office of the President, the Better Business BureauThe National Cyber Security Alliance, STOP. THINK. CONNECT., StaySafeOnline.org, and MS-ISAC Center for Internet Security.