What I set up (A–Z)
The exact list depends on platform and situation, but typical setup includes these blocks:
2FA and login protection
Enable and configure two-factor authentication, backup codes and critical protections.
Recovery methods
Check that recovery email/phone works, belongs to you and is secure.
Contacts and critical data
Review main contact details and settings to eliminate weak points.
Sessions, devices, login history
Log out unnecessary sessions, review devices, suspicious logins and risks.
Alerts and notifications
Enable security alerts so you learn about risks as early as possible.
Third‑party access
Review connected apps, permissions and remove risky access.
If you order this as part of a PROTECT or PRIORITY plan – the process stays the same, only pricing/inclusion is handled per plan.