Listen

Description

What happens to your digital world when you die? In this episode of Cyberside Chats, LMG Security’s Tom Pohl joins the conversation to discuss the often-overlooked cybersecurity and privacy implications of death. From encrypted files and password managers to social media and device access, we’ll explore how to ensure your loved ones can navigate your digital legacy—without needing a password-cracking expert. Learn practical strategies for secure preparation, policy design, and real-world implementation from a security professional’s perspective. 

Takeaways 

1) Take a Digital Inventory of Your Assets 

2) Implement Emergency Access Protocols in Password Managers 

3) Establish a Digital Executor 

4) Prepare Recovery Access for Critical Devices 

5) Create a Plan for Your Online Presence 

6) At Work, Develop Internal Organizational Policies 

 

References: 

How to Add a Legacy Contact for Your Apple Account: https://support.apple.com/en-us/102631 

Get To Know Your Emergency Kit: https://support.1password.com/emergency-kit/  

Wayne Crowder’s LinkedIn Page: https://www.linkedin.com/in/wcrowder 

Digital Afterlife Planning Checklist: https://www.lmgsecurity.com/resources/digital-afterlife-planning-checklist/ 

#Cybersecurity #Cyberaware #Cyber #DigitalPlanning