<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=H8._Clean_up_your_devices_and_accounts</id>
		<title>H8. Clean up your devices and accounts - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=H8._Clean_up_your_devices_and_accounts"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=H8._Clean_up_your_devices_and_accounts&amp;action=history"/>
		<updated>2026-04-29T13:44:16Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=H8._Clean_up_your_devices_and_accounts&amp;diff=233994&amp;oldid=prev</id>
		<title>Tgbenson: Created page with &quot;  '''Description:''' Just as some people enjoy clutter-free, organized living spaces while some enjoy a more “livable” space, the same is true of your computers and accoun...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=H8._Clean_up_your_devices_and_accounts&amp;diff=233994&amp;oldid=prev"/>
				<updated>2017-10-02T20:51:55Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;  &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; Just as some people enjoy clutter-free, organized living spaces while some enjoy a more “livable” space, the same is true of your computers and accoun...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
'''Description:''' Just as some people enjoy clutter-free, organized living spaces while some enjoy a more “livable” space, the same is true of your computers and accounts. You wouldn’t leave opened mail from your bank or stockbroker laying around the house for any visitor to look at. The computer is no different.  Cleaning up after yourself reduces the places a nosey attacker can try to violate your privacy. There are many ways to clean up after yourself, but not all of them are obvious.&lt;br /&gt;
&lt;br /&gt;
'''Threats:''' Leaving unused personal data, accounts, or systems accessible without protection can result in unauthorized use. Accounts left logged on after being used can lead to successful client-side attacks, such as CSRF, clickjacking, or XSS.&lt;br /&gt;
&lt;br /&gt;
'''Impact:''' Data, systems, and accounts not properly secured when not in use can lead to the exposure of confidential data, unintended actions, destruction, or theft.&lt;br /&gt;
&lt;br /&gt;
'''Recommendations:'''&lt;br /&gt;
&lt;br /&gt;
Consumers should focus on:&lt;br /&gt;
 1. Logout of accounts when you are done using them&lt;br /&gt;
 2. Periodically review and delete online accounts no longer needed or used&lt;br /&gt;
 3. Delete files no longer needed, including temporary files, text messages and chat logs, email (don’t forget sent mail), recycle bins, and old SSH keys&lt;br /&gt;
Tech-savvy users should also:&lt;br /&gt;
 1. Periodically review and delete system accounts no longer needed or used&lt;br /&gt;
 2. Periodically clean your browser cache&lt;br /&gt;
 3. Properly clean and sanitize computer equipment before discarding&lt;br /&gt;
'''Example:''' Logging into an online site on a friends computer, phone, or a public computer and not logging out allows others you may not intend to view your personal information and make changes to your account.&lt;/div&gt;</summary>
		<author><name>Tgbenson</name></author>	</entry>

	</feed>