VIDEO

Afterlife Access: Cybersecurity Planning for When You’re Gone

Video Summary:
What happens to your digital world when you die? In this episode of Cyberside Chats, LMG Security’s Tom Pohl joins the conversation to discuss the often-overlooked cybersecurity and privacy implications of death. From encrypted files and password managers to social media and device access, we’ll explore how to ensure your loved ones can navigate your digital legacy—without needing a password-cracking expert. Learn practical strategies for secure preparation, policy design, and real-world implementation from a security professional’s perspective. Takeaways 1) Take a Digital Inventory of Your Assets ▪ Include details like account recovery options, two-factor authentication settings, and related devices. ▪ Update the inventory regularly and store it securely. ▪ Create a comprehensive list of your digital assets, including accounts, devices, files, cloud services, and subscriptions. 2) Implement Emergency Access Protocols in Password Managers ▪ Use features like 1Password’s Emergency Kit or designate trusted emergency contacts. ▪ Store emergency credentials securely (e.g., safe deposit box) and reference in legal documents. ▪ Ensure all critical credentials are actually stored in your password manager—don’t leave them in separate notes or documents. 3) Establish a Digital Executor ▪ Choose a trusted individual to manage your digital assets after death or incapacitation. ▪ Document access instructions and store them securely, such as in an encrypted file with a shared key. ▪ Ensure your digital executor knows where these instructions are located—or give them a copy in advance. 4) Prepare Recovery Access for Critical Devices ▪ Ensure recovery keys and PINs for devices (e.g., smartphones, laptops, smart home hubs) are stored securely and can be accessed by designated individuals. ▪ Register a Legacy Contact for Apple and other cloud services. 5) Create a Plan for Your Online Presence ▪ Decide whether your social media and email accounts should be memorialized, deleted, or handed over. ▪ Use services like Google Inactive Account Manager or Facebook’s Legacy Contact feature. 6) At Work, Develop Internal Organizational Policies ▪ Implement IT procedures for handling the death or incapacity of key personnel. ▪ Regularly audit and securely store credentials for essential systems, especially for sole-proprietor scenarios. References: How to Add a Legacy Contact for Your Apple Account: https://support.apple.com/en-us/102631 Get To Know Your Emergency Kit: https://support.1password.com/emergency-kit/ Wayne Crowder’s LinkedIn Page: https://www.linkedin.com/in/wcrowder Digital Afterlife Planning Checklist: https://www.lmgsecurity.com/resources/digital-afterlife-planning-checklist/ #Cybersecurity #cyberaware #cyber #digitalplanning
CONTACT US