mirror of
https://github.com/Lissy93/personal-security-checklist.git
synced 2025-02-18 14:04:16 -05:00
Rename reccomended to essential, to fit new data structure
This commit is contained in:
parent
57c3ed120b
commit
94ef297f52
@ -10,7 +10,7 @@
|
|||||||
2-factor authentication, keep on top of breaches and take care while logging into your accounts.
|
2-factor authentication, keep on top of breaches and take care while logging into your accounts.
|
||||||
checklist:
|
checklist:
|
||||||
- point: Use a Strong Password
|
- point: Use a Strong Password
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
If your password is too short, or contains dictionary words, places or names- then it can be easily
|
If your password is too short, or contains dictionary words, places or names- then it can be easily
|
||||||
cracked through brute force, or guessed by someone. The easiest way to make a strong password, is by
|
cracked through brute force, or guessed by someone. The easiest way to make a strong password, is by
|
||||||
@ -21,7 +21,7 @@
|
|||||||
[securityinabox.org](https://securityinabox.org/en/passwords/passwords-and-2fa/)
|
[securityinabox.org](https://securityinabox.org/en/passwords/passwords-and-2fa/)
|
||||||
|
|
||||||
- point: Don't reuse Passwords
|
- point: Don't reuse Passwords
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
If someone was to reuse a password, and one site they had an account with suffered a leak, then a
|
If someone was to reuse a password, and one site they had an account with suffered a leak, then a
|
||||||
criminal could easily gain unauthorized access to their other accounts. This is usually done through
|
criminal could easily gain unauthorized access to their other accounts. This is usually done through
|
||||||
@ -29,7 +29,7 @@
|
|||||||
too common, but it's simple to protect against- use a different password for each of your online accounts
|
too common, but it's simple to protect against- use a different password for each of your online accounts
|
||||||
|
|
||||||
- point: Use a Secure Password Manager
|
- point: Use a Secure Password Manager
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
For most people it is going to be near-impossible to remember hundreds of strong and unique passwords.
|
For most people it is going to be near-impossible to remember hundreds of strong and unique passwords.
|
||||||
A password manager is an application that generates, stores and auto-fills your login credentials for you.
|
A password manager is an application that generates, stores and auto-fills your login credentials for you.
|
||||||
@ -39,7 +39,7 @@
|
|||||||
[Recommended Password Managers](https://github.com/Lissy93/awesome-privacy#password-managers)
|
[Recommended Password Managers](https://github.com/Lissy93/awesome-privacy#password-managers)
|
||||||
|
|
||||||
- point: Avoid sharing passwords
|
- point: Avoid sharing passwords
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
While there may be times that you need to share access to an account with another person, you should
|
While there may be times that you need to share access to an account with another person, you should
|
||||||
generally avoid doing this because it makes it easier for the account to become compromised. If you
|
generally avoid doing this because it makes it easier for the account to become compromised. If you
|
||||||
@ -47,7 +47,7 @@
|
|||||||
should be done via features built into a password manager.
|
should be done via features built into a password manager.
|
||||||
|
|
||||||
- point: Enable 2-Factor Authentication
|
- point: Enable 2-Factor Authentication
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
2FA is where you must provide both something you know (a password) and something you have (such as a
|
2FA is where you must provide both something you know (a password) and something you have (such as a
|
||||||
code on your phone) to log in. This means that if anyone has got your password (e.g. through phishing,
|
code on your phone) to log in. This means that if anyone has got your password (e.g. through phishing,
|
||||||
@ -58,7 +58,7 @@
|
|||||||
(it works without internet, and the code usually changes every 30-seconds)
|
(it works without internet, and the code usually changes every 30-seconds)
|
||||||
|
|
||||||
- point: Keep Backup Codes Safe
|
- point: Keep Backup Codes Safe
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
When you enable multi-factor authentication, you will usually be given several codes that you can use if
|
When you enable multi-factor authentication, you will usually be given several codes that you can use if
|
||||||
your 2FA method is lost, broken or unavailable. Keep these codes somewhere safe to prevent loss or
|
your 2FA method is lost, broken or unavailable. Keep these codes somewhere safe to prevent loss or
|
||||||
@ -229,7 +229,7 @@
|
|||||||
minimise online tracking and improve privacy.
|
minimise online tracking and improve privacy.
|
||||||
checklist:
|
checklist:
|
||||||
- point: Block Ads
|
- point: Block Ads
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Using an ad-blocker can help improve your privacy, by blocking the trackers that ads implement.
|
Using an ad-blocker can help improve your privacy, by blocking the trackers that ads implement.
|
||||||
[uBlock Origin](https://github.com/gorhill/uBlock) is a very efficient and open source browser addon,
|
[uBlock Origin](https://github.com/gorhill/uBlock) is a very efficient and open source browser addon,
|
||||||
@ -261,7 +261,7 @@
|
|||||||
and [how to remove browser malware](https://heimdalsecurity.com/blog/malware-removal).
|
and [how to remove browser malware](https://heimdalsecurity.com/blog/malware-removal).
|
||||||
|
|
||||||
- point: Use a Privacy-Respecting Browser
|
- point: Use a Privacy-Respecting Browser
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
[Firefox](https://www.mozilla.org/en-US/firefox/new) (with a few tweaks) and [Brave](https://brave.com)
|
[Firefox](https://www.mozilla.org/en-US/firefox/new) (with a few tweaks) and [Brave](https://brave.com)
|
||||||
are secure, private-respecting browsers. Both are fast, open source, user-friendly and available on all
|
are secure, private-respecting browsers. Both are fast, open source, user-friendly and available on all
|
||||||
@ -272,7 +272,7 @@
|
|||||||
user.js configs. See more: [Privacy Browsers](https://github.com/Lissy93/awesome-privacy#browsers).
|
user.js configs. See more: [Privacy Browsers](https://github.com/Lissy93/awesome-privacy#browsers).
|
||||||
|
|
||||||
- point: Use a Private Search Engine
|
- point: Use a Private Search Engine
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Using a privacy-preserving, non-tracking search engine, will reduce risk that your search terms are not
|
Using a privacy-preserving, non-tracking search engine, will reduce risk that your search terms are not
|
||||||
logged, or used against you. Consider [DuckDuckGo](https://duckduckgo.com), [Qwant](https://www.qwant.com),
|
logged, or used against you. Consider [DuckDuckGo](https://duckduckgo.com), [Qwant](https://www.qwant.com),
|
||||||
@ -283,7 +283,7 @@
|
|||||||
to a privacy-respecting search engine.
|
to a privacy-respecting search engine.
|
||||||
|
|
||||||
- point: Remove Unnecessary Browser Addons
|
- point: Remove Unnecessary Browser Addons
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Extensions are able to see, log or modify anything you do in the browser, and some innocent looking
|
Extensions are able to see, log or modify anything you do in the browser, and some innocent looking
|
||||||
browser apps, have malicious intentions. Websites can see which extensions you have installed, and may
|
browser apps, have malicious intentions. Websites can see which extensions you have installed, and may
|
||||||
@ -292,7 +292,7 @@
|
|||||||
Check the reviews. Only install extensions you really need, and removed those which you haven't used in a while.
|
Check the reviews. Only install extensions you really need, and removed those which you haven't used in a while.
|
||||||
|
|
||||||
- point: Keep Browser Up-to-date
|
- point: Keep Browser Up-to-date
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Browser vulnerabilities are constantly being [discovered](https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=browser)
|
Browser vulnerabilities are constantly being [discovered](https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=browser)
|
||||||
and patched, so it’s important to keep it up to date, to avoid a zero-day exploit. You can [see which browser
|
and patched, so it’s important to keep it up to date, to avoid a zero-day exploit. You can [see which browser
|
||||||
@ -300,7 +300,7 @@
|
|||||||
for instructions on how to update. Some browsers will auto-update to the latest stable version.
|
for instructions on how to update. Some browsers will auto-update to the latest stable version.
|
||||||
|
|
||||||
- point: Check for HTTPS
|
- point: Check for HTTPS
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
If you enter information on a non-HTTPS website, this data is transported unencrypted and can therefore
|
If you enter information on a non-HTTPS website, this data is transported unencrypted and can therefore
|
||||||
be read by anyone who intercepts it. Do not enter any data on a non-HTTPS website, but also do not let
|
be read by anyone who intercepts it. Do not enter any data on a non-HTTPS website, but also do not let
|
||||||
@ -312,7 +312,7 @@
|
|||||||
for Firefox, Chrome, Edge and Safari browsers on how to enable their HTTPS secure protections.
|
for Firefox, Chrome, Edge and Safari browsers on how to enable their HTTPS secure protections.
|
||||||
|
|
||||||
- point: Use DNS-over-HTTPS
|
- point: Use DNS-over-HTTPS
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Traditional DNS makes requests in plain text for everyone to see. It allows for eavesdropping and
|
Traditional DNS makes requests in plain text for everyone to see. It allows for eavesdropping and
|
||||||
manipulation of DNS data through man-in-the-middle attacks. Whereas DNS-over-HTTPS performs DNS
|
manipulation of DNS data through man-in-the-middle attacks. Whereas DNS-over-HTTPS performs DNS
|
||||||
@ -321,7 +321,7 @@
|
|||||||
Note that DoH comes with its own issues, mostly preventing web filtering.
|
Note that DoH comes with its own issues, mostly preventing web filtering.
|
||||||
|
|
||||||
- point: Multi-Session Containers
|
- point: Multi-Session Containers
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Compartmentalisation is really important to keep different aspects of your browsing separate. For
|
Compartmentalisation is really important to keep different aspects of your browsing separate. For
|
||||||
example, using different profiles for work, general browsing, social media, online shopping etc
|
example, using different profiles for work, general browsing, social media, online shopping etc
|
||||||
@ -330,35 +330,35 @@
|
|||||||
use different browsers for different tasks (Brave, Firefox, Tor etc).
|
use different browsers for different tasks (Brave, Firefox, Tor etc).
|
||||||
|
|
||||||
- point: Use Incognito
|
- point: Use Incognito
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
When using someone else's machine, ensure that you're in a private/ incognito session. This will
|
When using someone else's machine, ensure that you're in a private/ incognito session. This will
|
||||||
prevent browser history, cookies and some data being saved, but is not fool-proof- you can still
|
prevent browser history, cookies and some data being saved, but is not fool-proof- you can still
|
||||||
be tracked.
|
be tracked.
|
||||||
|
|
||||||
- point: Understand Your Browser Fingerprint
|
- point: Understand Your Browser Fingerprint
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Browser Fingerprinting is an incredibly accurate method of tracking, where a website identifies you
|
Browser Fingerprinting is an incredibly accurate method of tracking, where a website identifies you
|
||||||
based on your device information. You can view your fingerprint at amiunique.org- The aim is to be
|
based on your device information. You can view your fingerprint at amiunique.org- The aim is to be
|
||||||
as un-unique as possible.
|
as un-unique as possible.
|
||||||
|
|
||||||
- point: Manage Cookies
|
- point: Manage Cookies
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Clearing cookies regularly is one step you can take to help reduce websites from tracking you.
|
Clearing cookies regularly is one step you can take to help reduce websites from tracking you.
|
||||||
Cookies may also store your session token, which if captured, would allow someone to access your
|
Cookies may also store your session token, which if captured, would allow someone to access your
|
||||||
accounts without credentials. To mitigate this you should clear cookies often.
|
accounts without credentials. To mitigate this you should clear cookies often.
|
||||||
|
|
||||||
- point: Block Third-Party Cookies
|
- point: Block Third-Party Cookies
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Third-party cookies placed on your device by a website other than the one you’re visiting. This
|
Third-party cookies placed on your device by a website other than the one you’re visiting. This
|
||||||
poses a privacy risk, as a 3rd entity can collect data from your current session. This guide explains
|
poses a privacy risk, as a 3rd entity can collect data from your current session. This guide explains
|
||||||
how you can disable 3rd-party cookies, and you can check here ensure this worked.
|
how you can disable 3rd-party cookies, and you can check here ensure this worked.
|
||||||
|
|
||||||
- point: Block Third-Party Trackers
|
- point: Block Third-Party Trackers
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Blocking trackers will help to stop websites, advertisers, analytics and more from tracking you in
|
Blocking trackers will help to stop websites, advertisers, analytics and more from tracking you in
|
||||||
the background. Privacy Badger, DuckDuckGo Privacy Essentials, uBlock Origin and uMatrix (advanced)
|
the background. Privacy Badger, DuckDuckGo Privacy Essentials, uBlock Origin and uMatrix (advanced)
|
||||||
@ -555,26 +555,26 @@
|
|||||||
|
|
||||||
checklist:
|
checklist:
|
||||||
- point: Have more than one email address
|
- point: Have more than one email address
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Consider using a different email address for security-critical communications from trivial mail such
|
Consider using a different email address for security-critical communications from trivial mail such
|
||||||
as newsletters. This compartmentalization could reduce the amount of damage caused by a data breach,
|
as newsletters. This compartmentalization could reduce the amount of damage caused by a data breach,
|
||||||
and also make it easier to recover a compromised account.
|
and also make it easier to recover a compromised account.
|
||||||
|
|
||||||
- point: Keep Email Address Private
|
- point: Keep Email Address Private
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Do not share your primary email publicly, as mail addresses are often the starting point for most
|
Do not share your primary email publicly, as mail addresses are often the starting point for most
|
||||||
phishing attacks.
|
phishing attacks.
|
||||||
|
|
||||||
- point: Keep your Account Secure
|
- point: Keep your Account Secure
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Use a long and unique password, enable 2FA and be careful while logging in. Your email account
|
Use a long and unique password, enable 2FA and be careful while logging in. Your email account
|
||||||
provides an easy entry point to all your other online accounts for an attacker.
|
provides an easy entry point to all your other online accounts for an attacker.
|
||||||
|
|
||||||
- point: Disable Automatic Loading of Remote Content
|
- point: Disable Automatic Loading of Remote Content
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Email messages can contain remote content such as images or stylesheets, often automatically loaded
|
Email messages can contain remote content such as images or stylesheets, often automatically loaded
|
||||||
from the server. You should disable this, as it exposes your IP address and device information, and
|
from the server. You should disable this, as it exposes your IP address and device information, and
|
||||||
@ -709,7 +709,7 @@
|
|||||||
intro: ''
|
intro: ''
|
||||||
checklist:
|
checklist:
|
||||||
- point: Only Use Fully End-to-End Encrypted Messengers
|
- point: Only Use Fully End-to-End Encrypted Messengers
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
End-to-end encryption is a system of communication where messages are encrypted on your device and
|
End-to-end encryption is a system of communication where messages are encrypted on your device and
|
||||||
not decrypted until they reach the intended recipient. This ensures that any actor who intercepts
|
not decrypted until they reach the intended recipient. This ensures that any actor who intercepts
|
||||||
@ -717,43 +717,43 @@
|
|||||||
data is stored.
|
data is stored.
|
||||||
|
|
||||||
- point: Use only Open Source Messaging Platforms
|
- point: Use only Open Source Messaging Platforms
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
If code is open source then it can be independently examined and audited by anyone qualified to do
|
If code is open source then it can be independently examined and audited by anyone qualified to do
|
||||||
so, to ensure that there are no backdoors, vulnerabilities, or other security issues.
|
so, to ensure that there are no backdoors, vulnerabilities, or other security issues.
|
||||||
|
|
||||||
- point: Use a "Trustworthy" Messaging Platform
|
- point: Use a "Trustworthy" Messaging Platform
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
When selecting an encrypted messaging app, ensure it's fully open source, stable, actively maintained,
|
When selecting an encrypted messaging app, ensure it's fully open source, stable, actively maintained,
|
||||||
and ideally backed by reputable developers.
|
and ideally backed by reputable developers.
|
||||||
|
|
||||||
- point: Check Security Settings
|
- point: Check Security Settings
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Enable security settings, including contact verification, security notifications, and encryption.
|
Enable security settings, including contact verification, security notifications, and encryption.
|
||||||
Disable optional non-security features such as read receipt, last online, and typing notification.
|
Disable optional non-security features such as read receipt, last online, and typing notification.
|
||||||
|
|
||||||
- point: Ensure your Recipients Environment is Secure
|
- point: Ensure your Recipients Environment is Secure
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Your conversation can only be as secure as the weakest link. Often the easiest way to infiltrate a
|
Your conversation can only be as secure as the weakest link. Often the easiest way to infiltrate a
|
||||||
communications channel is to target the individual or node with the least protection.
|
communications channel is to target the individual or node with the least protection.
|
||||||
|
|
||||||
- point: Disable Cloud Services
|
- point: Disable Cloud Services
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Some mobile messaging apps offer a web or desktop companion. This not only increases attack surface but
|
Some mobile messaging apps offer a web or desktop companion. This not only increases attack surface but
|
||||||
it has been linked to several critical security issues, and should therefore be avoided, if possible.
|
it has been linked to several critical security issues, and should therefore be avoided, if possible.
|
||||||
|
|
||||||
- point: Secure Group Chats
|
- point: Secure Group Chats
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
The risk of compromise rises exponentially, the more participants are in a group, as the attack surface
|
The risk of compromise rises exponentially, the more participants are in a group, as the attack surface
|
||||||
increases. Periodically check that all participants are legitimate.
|
increases. Periodically check that all participants are legitimate.
|
||||||
|
|
||||||
- point: Create a Safe Environment for Communication
|
- point: Create a Safe Environment for Communication
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
There are several stages where your digital communications could be monitored or intercepted. This includes:
|
There are several stages where your digital communications could be monitored or intercepted. This includes:
|
||||||
your or your participants' device, your ISP, national gateway or government logging, the messaging provider,
|
your or your participants' device, your ISP, national gateway or government logging, the messaging provider,
|
||||||
@ -852,61 +852,61 @@
|
|||||||
effectively public. If possible, avoid using conventional social media networks.
|
effectively public. If possible, avoid using conventional social media networks.
|
||||||
checklist:
|
checklist:
|
||||||
- point: Secure your Account
|
- point: Secure your Account
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Social media profiles get stolen or taken over all too often. To protect your account: use a unique
|
Social media profiles get stolen or taken over all too often. To protect your account: use a unique
|
||||||
and strong password, and enable 2-factor authentication.
|
and strong password, and enable 2-factor authentication.
|
||||||
|
|
||||||
- point: Check Privacy Settings
|
- point: Check Privacy Settings
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Most social networks allow you to control your privacy settings. Ensure that you are comfortable with
|
Most social networks allow you to control your privacy settings. Ensure that you are comfortable with
|
||||||
what data you are currently exposing and to whom.
|
what data you are currently exposing and to whom.
|
||||||
|
|
||||||
- point: Think of All Interactions as Public
|
- point: Think of All Interactions as Public
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
There are still numerous methods of viewing a users 'private' content across many social networks.
|
There are still numerous methods of viewing a users 'private' content across many social networks.
|
||||||
Therefore, before uploading, posting or commenting on anything, think "Would I mind if this was totally public?"
|
Therefore, before uploading, posting or commenting on anything, think "Would I mind if this was totally public?"
|
||||||
|
|
||||||
- point: Think of All Interactions as Permanent
|
- point: Think of All Interactions as Permanent
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Pretty much every post, comment, photo etc is being continuously backed up by a myriad of third-party
|
Pretty much every post, comment, photo etc is being continuously backed up by a myriad of third-party
|
||||||
services, who archive this data and make it indexable and publicly available almost forever.
|
services, who archive this data and make it indexable and publicly available almost forever.
|
||||||
|
|
||||||
- point: Don't Reveal too Much
|
- point: Don't Reveal too Much
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Profile information creates a goldmine of info for hackers, the kind of data that helps them personalize
|
Profile information creates a goldmine of info for hackers, the kind of data that helps them personalize
|
||||||
phishing scams. Avoid sharing too much detail (DoB, Hometown, School etc).
|
phishing scams. Avoid sharing too much detail (DoB, Hometown, School etc).
|
||||||
|
|
||||||
- point: Be Careful what you Upload
|
- point: Be Careful what you Upload
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Status updates, comments, check-ins and media can unintentionally reveal a lot more than you intended
|
Status updates, comments, check-ins and media can unintentionally reveal a lot more than you intended
|
||||||
them to. This is especially relevant to photos and videos, which may show things in the background.
|
them to. This is especially relevant to photos and videos, which may show things in the background.
|
||||||
|
|
||||||
- point: Don't Share Email or Phone Number
|
- point: Don't Share Email or Phone Number
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Posting your real email address or mobile number, gives hackers, trolls and spammers more munition to
|
Posting your real email address or mobile number, gives hackers, trolls and spammers more munition to
|
||||||
use against you, and can also allow separate aliases, profiles or data points to be connected.
|
use against you, and can also allow separate aliases, profiles or data points to be connected.
|
||||||
|
|
||||||
- point: Don't Grant Unnecessary Permissions
|
- point: Don't Grant Unnecessary Permissions
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
By default many of the popular social networking apps will ask for permission to access your contacts,
|
By default many of the popular social networking apps will ask for permission to access your contacts,
|
||||||
call log, location, messaging history etc. If they don’t need this access, don’t grant it.
|
call log, location, messaging history etc. If they don’t need this access, don’t grant it.
|
||||||
|
|
||||||
- point: Be Careful of 3rd-Party Integrations
|
- point: Be Careful of 3rd-Party Integrations
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Avoid signing up for accounts using a Social Network login, revoke access to social apps you no longer
|
Avoid signing up for accounts using a Social Network login, revoke access to social apps you no longer
|
||||||
use.
|
use.
|
||||||
|
|
||||||
- point: Avoid Publishing Geo Data while still Onsite
|
- point: Avoid Publishing Geo Data while still Onsite
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
If you plan to share any content that reveals a location, then wait until you have left that place.
|
If you plan to share any content that reveals a location, then wait until you have left that place.
|
||||||
This is particularly important when you are taking a trip, at a restaurant, campus, hotel/resort, public
|
This is particularly important when you are taking a trip, at a restaurant, campus, hotel/resort, public
|
||||||
@ -964,25 +964,25 @@
|
|||||||
including configuring your router and setting up a VPN.
|
including configuring your router and setting up a VPN.
|
||||||
checklist:
|
checklist:
|
||||||
- point: Use a VPN
|
- point: Use a VPN
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Use a reputable, paid-for VPN. This can help protect sites you visit from logging your real IP, reduce
|
Use a reputable, paid-for VPN. This can help protect sites you visit from logging your real IP, reduce
|
||||||
the amount of data your ISP can collect, and increase protection on public WiFi.
|
the amount of data your ISP can collect, and increase protection on public WiFi.
|
||||||
|
|
||||||
- point: Change your Router Password
|
- point: Change your Router Password
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
After getting a new router, change the password. Default router passwords are publicly available,
|
After getting a new router, change the password. Default router passwords are publicly available,
|
||||||
meaning anyone within proximity would be able to connect.
|
meaning anyone within proximity would be able to connect.
|
||||||
|
|
||||||
- point: Use WPA2, and a strong password
|
- point: Use WPA2, and a strong password
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
There are different authentication protocols for connecting to WiFi. Currently, the most secure options
|
There are different authentication protocols for connecting to WiFi. Currently, the most secure options
|
||||||
are WPA2 and WPA3 (on newer routers).
|
are WPA2 and WPA3 (on newer routers).
|
||||||
|
|
||||||
- point: Keep router firmware up-to-date
|
- point: Keep router firmware up-to-date
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Manufacturers release firmware updates that fix security vulnerabilities, implement new standards, and
|
Manufacturers release firmware updates that fix security vulnerabilities, implement new standards, and
|
||||||
sometimes add features or improve the performance of your router.
|
sometimes add features or improve the performance of your router.
|
||||||
@ -1171,31 +1171,31 @@
|
|||||||
And this doesn't include all of the internet traffic that intelligence agencies around the world have unhindered access to.
|
And this doesn't include all of the internet traffic that intelligence agencies around the world have unhindered access to.
|
||||||
checklist:
|
checklist:
|
||||||
- point: Encrypt your Device
|
- point: Encrypt your Device
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
In order to keep your data safe from physical access, use file encryption. This will mean if your
|
In order to keep your data safe from physical access, use file encryption. This will mean if your
|
||||||
device is lost or stolen, no one will have access to your data.
|
device is lost or stolen, no one will have access to your data.
|
||||||
|
|
||||||
- point: Turn off connectivity features that aren’t being used
|
- point: Turn off connectivity features that aren’t being used
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
When you're not using WiFi, Bluetooth, NFC etc, turn those features off. There are several common threats
|
When you're not using WiFi, Bluetooth, NFC etc, turn those features off. There are several common threats
|
||||||
that utilise these features.
|
that utilise these features.
|
||||||
|
|
||||||
- point: Keep app count to a minimum
|
- point: Keep app count to a minimum
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Uninstall apps that you don’t need or use regularly. As apps often run in the background, slowing your
|
Uninstall apps that you don’t need or use regularly. As apps often run in the background, slowing your
|
||||||
device down, but also collecting data.
|
device down, but also collecting data.
|
||||||
|
|
||||||
- point: App Permissions
|
- point: App Permissions
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Don’t grant apps permissions that they don’t need. For Android, Bouncer is an app that allows you to grant
|
Don’t grant apps permissions that they don’t need. For Android, Bouncer is an app that allows you to grant
|
||||||
temporary/ 1-off permissions.
|
temporary/ 1-off permissions.
|
||||||
|
|
||||||
- point: Only install Apps from official source
|
- point: Only install Apps from official source
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Applications on Apple App Store and Google Play Store are scanned and cryptographically signed, making them
|
Applications on Apple App Store and Google Play Store are scanned and cryptographically signed, making them
|
||||||
less likely to be malicious.
|
less likely to be malicious.
|
||||||
@ -1207,7 +1207,7 @@
|
|||||||
through a compromised USB port.
|
through a compromised USB port.
|
||||||
|
|
||||||
- point: Set up a mobile carrier PIN
|
- point: Set up a mobile carrier PIN
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
SIM hijacking is when a hacker is able to get your mobile number transferred to their sim. The easiest way
|
SIM hijacking is when a hacker is able to get your mobile number transferred to their sim. The easiest way
|
||||||
to protect against this is to set up a PIN through your mobile provider.
|
to protect against this is to set up a PIN through your mobile provider.
|
||||||
@ -1319,66 +1319,66 @@
|
|||||||
compromised can have detrimental effects.
|
compromised can have detrimental effects.
|
||||||
checklist:
|
checklist:
|
||||||
- point: Keep your System up-to-date
|
- point: Keep your System up-to-date
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
System updates contain fixes/patches for security issues, improve performance, and sometimes add new
|
System updates contain fixes/patches for security issues, improve performance, and sometimes add new
|
||||||
features. Install new updates when prompted.
|
features. Install new updates when prompted.
|
||||||
|
|
||||||
- point: Encrypt your Device
|
- point: Encrypt your Device
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Use BitLocker for Windows, FileVault on MacOS, or LUKS on Linux, to enable full disk encryption. This
|
Use BitLocker for Windows, FileVault on MacOS, or LUKS on Linux, to enable full disk encryption. This
|
||||||
prevents unauthorized access if your computer is lost or stolen.
|
prevents unauthorized access if your computer is lost or stolen.
|
||||||
|
|
||||||
- point: Backup Important Data
|
- point: Backup Important Data
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Maintaining encrypted backups prevents loss due to ransomware, theft, or damage. Consider using
|
Maintaining encrypted backups prevents loss due to ransomware, theft, or damage. Consider using
|
||||||
Cryptomator for cloud files or VeraCrypt for USB drives.
|
Cryptomator for cloud files or VeraCrypt for USB drives.
|
||||||
|
|
||||||
- point: Be Careful Plugging USB Devices into your Computer
|
- point: Be Careful Plugging USB Devices into your Computer
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
USB devices can pose serious threats. Consider making a USB sanitizer with CIRCLean to safely check USB
|
USB devices can pose serious threats. Consider making a USB sanitizer with CIRCLean to safely check USB
|
||||||
devices.
|
devices.
|
||||||
|
|
||||||
- point: Activate Screen-Lock when Idle
|
- point: Activate Screen-Lock when Idle
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Lock your computer when away and set it to require a password on resume from screensaver or sleep to
|
Lock your computer when away and set it to require a password on resume from screensaver or sleep to
|
||||||
prevent unauthorized access.
|
prevent unauthorized access.
|
||||||
|
|
||||||
- point: Disable Cortana or Siri
|
- point: Disable Cortana or Siri
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Voice-controlled assistants can have privacy implications due to data sent back for processing. Disable
|
Voice-controlled assistants can have privacy implications due to data sent back for processing. Disable
|
||||||
or limit their listening capabilities.
|
or limit their listening capabilities.
|
||||||
|
|
||||||
- point: Review your Installed Apps
|
- point: Review your Installed Apps
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Keep installed applications to a minimum to reduce exposure to vulnerabilities and regularly clear
|
Keep installed applications to a minimum to reduce exposure to vulnerabilities and regularly clear
|
||||||
application caches.
|
application caches.
|
||||||
|
|
||||||
- point: Manage Permissions
|
- point: Manage Permissions
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Control which apps have access to your location, camera, microphone, contacts, and other sensitive
|
Control which apps have access to your location, camera, microphone, contacts, and other sensitive
|
||||||
information.
|
information.
|
||||||
|
|
||||||
- point: Disallow Usage Data from being sent to the Cloud
|
- point: Disallow Usage Data from being sent to the Cloud
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Limit the amount of usage information or feedback sent to the cloud to protect your privacy.
|
Limit the amount of usage information or feedback sent to the cloud to protect your privacy.
|
||||||
|
|
||||||
- point: Avoid Quick Unlock
|
- point: Avoid Quick Unlock
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Use a strong password instead of biometrics or short PINs for unlocking your computer to enhance
|
Use a strong password instead of biometrics or short PINs for unlocking your computer to enhance
|
||||||
security.
|
security.
|
||||||
|
|
||||||
- point: Power Off Computer, instead of Standby
|
- point: Power Off Computer, instead of Standby
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Shut down your device when not in use, especially if your disk is encrypted, to keep data secure.
|
Shut down your device when not in use, especially if your disk is encrypted, to keep data secure.
|
||||||
|
|
||||||
@ -1567,37 +1567,37 @@
|
|||||||
internet-connected home devices.
|
internet-connected home devices.
|
||||||
checklist:
|
checklist:
|
||||||
- point: Rename devices to not specify brand/model
|
- point: Rename devices to not specify brand/model
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Change default device names to something generic to prevent targeted attacks by obscuring brand or model information.
|
Change default device names to something generic to prevent targeted attacks by obscuring brand or model information.
|
||||||
|
|
||||||
- point: Disable microphone and camera when not in use
|
- point: Disable microphone and camera when not in use
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Use hardware switches to turn off microphones and cameras on smart devices to protect against accidental recordings or targeted access.
|
Use hardware switches to turn off microphones and cameras on smart devices to protect against accidental recordings or targeted access.
|
||||||
|
|
||||||
- point: Understand what data is collected, stored and transmitted
|
- point: Understand what data is collected, stored and transmitted
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Research and ensure comfort with the data handling practices of smart home devices before purchase, avoiding devices that share data with third parties.
|
Research and ensure comfort with the data handling practices of smart home devices before purchase, avoiding devices that share data with third parties.
|
||||||
|
|
||||||
- point: Set privacy settings, and opt out of sharing data with third parties
|
- point: Set privacy settings, and opt out of sharing data with third parties
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Adjust app settings for strictest privacy controls and opt-out of data sharing with third parties wherever possible.
|
Adjust app settings for strictest privacy controls and opt-out of data sharing with third parties wherever possible.
|
||||||
|
|
||||||
- point: Don't link your smart home devices to your real identity
|
- point: Don't link your smart home devices to your real identity
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Use anonymous usernames and passwords, avoiding sign-up/log-in via social media or other third-party services to maintain privacy.
|
Use anonymous usernames and passwords, avoiding sign-up/log-in via social media or other third-party services to maintain privacy.
|
||||||
|
|
||||||
- point: Keep firmware up-to-date
|
- point: Keep firmware up-to-date
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Regularly update smart device firmware to apply security patches and enhancements.
|
Regularly update smart device firmware to apply security patches and enhancements.
|
||||||
|
|
||||||
- point: Protect your Network
|
- point: Protect your Network
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Secure your home WiFi and network to prevent unauthorized access to smart devices.
|
Secure your home WiFi and network to prevent unauthorized access to smart devices.
|
||||||
|
|
||||||
@ -1657,12 +1657,12 @@
|
|||||||
for security, but terrible for data privacy.
|
for security, but terrible for data privacy.
|
||||||
checklist:
|
checklist:
|
||||||
- point: Sign up for Fraud Alerts and Credit Monitoring
|
- point: Sign up for Fraud Alerts and Credit Monitoring
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Enable fraud alerts and credit monitoring through Experian, TransUnion, or Equifax to be alerted of suspicious activity.
|
Enable fraud alerts and credit monitoring through Experian, TransUnion, or Equifax to be alerted of suspicious activity.
|
||||||
|
|
||||||
- point: Apply a Credit Freeze
|
- point: Apply a Credit Freeze
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Prevent unauthorized credit inquiries by freezing your credit through Experian, TransUnion, and Equifax.
|
Prevent unauthorized credit inquiries by freezing your credit through Experian, TransUnion, and Equifax.
|
||||||
|
|
||||||
@ -1731,57 +1731,57 @@
|
|||||||
|
|
||||||
checklist:
|
checklist:
|
||||||
- point: Verify Recipients
|
- point: Verify Recipients
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Emails can be easily spoofed. Verify the sender's authenticity, especially for sensitive actions, and prefer entering URLs manually rather than clicking links in emails.
|
Emails can be easily spoofed. Verify the sender's authenticity, especially for sensitive actions, and prefer entering URLs manually rather than clicking links in emails.
|
||||||
|
|
||||||
- point: Don't Trust Your Popup Notifications
|
- point: Don't Trust Your Popup Notifications
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Fake pop-ups can be deployed by malicious actors. Always check the URL before entering any information on a popup.
|
Fake pop-ups can be deployed by malicious actors. Always check the URL before entering any information on a popup.
|
||||||
|
|
||||||
- point: Never Leave Device Unattended
|
- point: Never Leave Device Unattended
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Unattended devices can be compromised even with strong passwords. Use encryption and remote erase features like Find My Phone for lost devices.
|
Unattended devices can be compromised even with strong passwords. Use encryption and remote erase features like Find My Phone for lost devices.
|
||||||
|
|
||||||
- point: Prevent Camfecting
|
- point: Prevent Camfecting
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Protect against camfecting by using webcam covers and microphone blockers. Mute home assistants when not in use or discussing sensitive matters.
|
Protect against camfecting by using webcam covers and microphone blockers. Mute home assistants when not in use or discussing sensitive matters.
|
||||||
|
|
||||||
- point: Stay protected from shoulder surfers
|
- point: Stay protected from shoulder surfers
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Use privacy screens on laptops and mobiles to prevent others from reading your screen in public spaces.
|
Use privacy screens on laptops and mobiles to prevent others from reading your screen in public spaces.
|
||||||
|
|
||||||
- point: Educate yourself about phishing attacks
|
- point: Educate yourself about phishing attacks
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Be cautious of phishing attempts. Verify URLs, context of received messages, and employ good security practices like using 2FA and not reusing passwords.
|
Be cautious of phishing attempts. Verify URLs, context of received messages, and employ good security practices like using 2FA and not reusing passwords.
|
||||||
|
|
||||||
- point: Watch out for Stalkerware
|
- point: Watch out for Stalkerware
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Be aware of stalkerware installed by acquaintances for spying. Look out for signs like unusual battery usage and perform factory resets if suspected.
|
Be aware of stalkerware installed by acquaintances for spying. Look out for signs like unusual battery usage and perform factory resets if suspected.
|
||||||
|
|
||||||
- point: Install Reputable Software from Trusted Sources
|
- point: Install Reputable Software from Trusted Sources
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Only download software from legitimate sources and check files with tools like Virus Total before installation.
|
Only download software from legitimate sources and check files with tools like Virus Total before installation.
|
||||||
|
|
||||||
- point: Store personal data securely
|
- point: Store personal data securely
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Ensure all personal data on devices or in the cloud is encrypted to protect against unauthorized access.
|
Ensure all personal data on devices or in the cloud is encrypted to protect against unauthorized access.
|
||||||
|
|
||||||
- point: Obscure Personal Details from Documents
|
- point: Obscure Personal Details from Documents
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
When sharing documents, obscure personal details with opaque rectangles to prevent information leakage.
|
When sharing documents, obscure personal details with opaque rectangles to prevent information leakage.
|
||||||
|
|
||||||
- point: Do not assume a site is secure, just because it is `HTTPS`
|
- point: Do not assume a site is secure, just because it is `HTTPS`
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
HTTPS does not guarantee a website's legitimacy. Verify URLs and exercise caution with personal data.
|
HTTPS does not guarantee a website's legitimacy. Verify URLs and exercise caution with personal data.
|
||||||
|
|
||||||
@ -1864,43 +1864,43 @@
|
|||||||
|
|
||||||
checklist:
|
checklist:
|
||||||
- point: Destroy Sensitive Documents
|
- point: Destroy Sensitive Documents
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: Shred or redact sensitive documents before disposal to protect against identity theft and maintain confidentiality.
|
details: Shred or redact sensitive documents before disposal to protect against identity theft and maintain confidentiality.
|
||||||
|
|
||||||
- point: Opt-Out of Public Records
|
- point: Opt-Out of Public Records
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: Contact people search websites to opt-out from listings that show personal information, using guides like Michael Bazzell's Personal Data Removal Workbook.
|
details: Contact people search websites to opt-out from listings that show personal information, using guides like Michael Bazzell's Personal Data Removal Workbook.
|
||||||
|
|
||||||
- point: Watermark Documents
|
- point: Watermark Documents
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: Add a watermark with the recipient's name and date to digital copies of personal documents to trace the source of a breach.
|
details: Add a watermark with the recipient's name and date to digital copies of personal documents to trace the source of a breach.
|
||||||
|
|
||||||
- point: Don't Reveal Info on Inbound Calls
|
- point: Don't Reveal Info on Inbound Calls
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: Only share personal data on calls you initiate and verify the recipient's phone number.
|
details: Only share personal data on calls you initiate and verify the recipient's phone number.
|
||||||
|
|
||||||
- point: Stay Alert
|
- point: Stay Alert
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: Be aware of your surroundings and assess potential risks in new environments.
|
details: Be aware of your surroundings and assess potential risks in new environments.
|
||||||
|
|
||||||
- point: Secure Perimeter
|
- point: Secure Perimeter
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: Ensure physical security of locations storing personal info devices, minimizing external access and using intrusion detection systems.
|
details: Ensure physical security of locations storing personal info devices, minimizing external access and using intrusion detection systems.
|
||||||
|
|
||||||
- point: Physically Secure Devices
|
- point: Physically Secure Devices
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: Use physical security measures like Kensington locks, webcam covers, and privacy screens for devices.
|
details: Use physical security measures like Kensington locks, webcam covers, and privacy screens for devices.
|
||||||
|
|
||||||
- point: Keep Devices Out of Direct Sight
|
- point: Keep Devices Out of Direct Sight
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: Prevent devices from being visible from outside to mitigate risks from lasers and theft.
|
details: Prevent devices from being visible from outside to mitigate risks from lasers and theft.
|
||||||
|
|
||||||
- point: Protect your PIN
|
- point: Protect your PIN
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: Shield your PIN entry from onlookers and cameras, and clean touchscreens after use.
|
details: Shield your PIN entry from onlookers and cameras, and clean touchscreens after use.
|
||||||
|
|
||||||
- point: Check for Skimmers
|
- point: Check for Skimmers
|
||||||
priority: Recommended
|
priority: Essential
|
||||||
details: Inspect ATMs and public devices for skimming devices and tampering signs before use.
|
details: Inspect ATMs and public devices for skimming devices and tampering signs before use.
|
||||||
|
|
||||||
- point: Protect your Home Address
|
- point: Protect your Home Address
|
||||||
|
Loading…
x
Reference in New Issue
Block a user