Skip to main content

Online Security Best Practices

How to Keep Your Personal Information Safe

At Select Health, we’re committed to protecting your personal information, and that starts with these essential cybersecurity best practices.

What is Cybersecurity?

Just like how a security system protects your home from unwanted visitors, cybersecurity is used to keep your digital information safe. This includes all the things people do to protect their computers, phones, passwords, and more.

Enable two-step verification

As the name implies, two-step verification uses two systems to confirm your identity and protect your sensitive information. For example, in addition to entering your password, you’ll be asked to verify your identity through a secondary method, like a code sent to your phone or email.  

To enable two-step verification, log in or create a Select Health account and navigate to Settings. Then, select “Two-Step Verification,” and follow the on-screen instructions. 


Additional steps to keep your information sescure

Strong Passwords
Create passwords using a mix of uppercase and lowercase letters, numbers, and symbols. Avoid using the same password for multiple accounts, and update your passwords regularly. Consider using a password manager to keep track of them. 

Stay alert for suspicious activity 
Do not give away your personal information, including your username or password, over email or on the phone. If you encounter any suspicious activity, please report it to Select Health.  

Maintain Your Devices 
Make sure your devices have the latest security patches by checking in their settings for any missing updates.

Secure Your Wi-Fi 
Make sure your home Wi-Fi network has a strong, unique password. 

Be Cautious with Emails 
Watch out for unexpected emails, especially those with urgent requests or attachments. Double-check the sender’s address and avoid clicking on links from unknown sources. 

Limit What You Share Online 
Be mindful about sharing personal information on social media or public platforms, and adjust your privacy settings so only trusted contacts can see your details. 

By following these best practices, you can lower your risk of cyberattacks and help protect your valuable information.