mirror of
https://github.com/Lissy93/personal-security-checklist.git
synced 2024-09-30 05:06:08 +00:00
Merge 23b2eddfc7
into cb1d45cab6
This commit is contained in:
commit
e0d943a5b8
@ -416,7 +416,7 @@ Note about credit cards: Credit cards have technological methods in place to det
|
|||||||
|
|
||||||
## Human Aspect
|
## Human Aspect
|
||||||
|
|
||||||
Many data breaches, hacks and attacks are caused by human error. The following list contains steps you should take, to reduce the risk of this happening to you. Many of them are common sense, but it's worth takin note of.
|
Many data breaches, hacks and attacks are caused by human error. The following list contains steps you should take, to reduce the risk of this happening to you. Many of them are common sense, but it's worth taking note of.
|
||||||
|
|
||||||
**Security** | **Priority** | **Details and Hints**
|
**Security** | **Priority** | **Details and Hints**
|
||||||
--- | --- | ---
|
--- | --- | ---
|
||||||
|
@ -364,6 +364,13 @@
|
|||||||
the background. Privacy Badger, DuckDuckGo Privacy Essentials, uBlock Origin and uMatrix (advanced)
|
the background. Privacy Badger, DuckDuckGo Privacy Essentials, uBlock Origin and uMatrix (advanced)
|
||||||
are all very effective, open source tracker-blockers available for all major browsers.
|
are all very effective, open source tracker-blockers available for all major browsers.
|
||||||
|
|
||||||
|
- point: Beware AI Chatbots
|
||||||
|
priority: Recommended
|
||||||
|
details: >-
|
||||||
|
Be cautious of submitting personal information to AI support assistances and chatbots such as those found
|
||||||
|
on shopping websites, the technology is still in it's infancy and is prone to security flaws such as
|
||||||
|
sharing your information with other users of the website.
|
||||||
|
|
||||||
- point: Beware of Redirects
|
- point: Beware of Redirects
|
||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
@ -987,6 +994,11 @@
|
|||||||
Manufacturers release firmware updates that fix security vulnerabilities, implement new standards, and
|
Manufacturers release firmware updates that fix security vulnerabilities, implement new standards, and
|
||||||
sometimes add features or improve the performance of your router.
|
sometimes add features or improve the performance of your router.
|
||||||
|
|
||||||
|
- point: Don't have Open Ports
|
||||||
|
priority: Recommended
|
||||||
|
details: >-
|
||||||
|
Close any open ports on your router that are not needed. Open ports provide an easy entrance for hackers.
|
||||||
|
|
||||||
- point: Implement a Network-Wide VPN
|
- point: Implement a Network-Wide VPN
|
||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
@ -1077,11 +1089,6 @@
|
|||||||
Services like Telnet and SSH that provide command-line access to devices should never be exposed to the
|
Services like Telnet and SSH that provide command-line access to devices should never be exposed to the
|
||||||
internet and should also be disabled on the local network unless they're actually needed.
|
internet and should also be disabled on the local network unless they're actually needed.
|
||||||
|
|
||||||
- point: Don't have Open Ports
|
|
||||||
priority: Optional
|
|
||||||
details: >-
|
|
||||||
Close any open ports on your router that are not needed. Open ports provide an easy entrance for hackers.
|
|
||||||
|
|
||||||
- point: Disable Unused Remote Access Protocols
|
- point: Disable Unused Remote Access Protocols
|
||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
@ -1100,6 +1107,12 @@
|
|||||||
It's common to want to pump your router's range to the max, but if you reside in a smaller flat, your
|
It's common to want to pump your router's range to the max, but if you reside in a smaller flat, your
|
||||||
attack surface is increased when your WiFi network can be picked up across the street.
|
attack surface is increased when your WiFi network can be picked up across the street.
|
||||||
|
|
||||||
|
- point: Ensure all network attached devices are up-to-date
|
||||||
|
priority: Optional
|
||||||
|
details: >-
|
||||||
|
Any computer or device attached to the network should be regularly updated and patched, including any NAS devices
|
||||||
|
and IoT devices
|
||||||
|
|
||||||
- point: Route all traffic through Tor
|
- point: Route all traffic through Tor
|
||||||
priority: Advanced
|
priority: Advanced
|
||||||
details: >-
|
details: >-
|
||||||
@ -1615,6 +1628,7 @@
|
|||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
Consider privacy-focused alternatives like Mycroft or use Project Alias to prevent idle listening by voice-activated assistants.
|
Consider privacy-focused alternatives like Mycroft or use Project Alias to prevent idle listening by voice-activated assistants.
|
||||||
|
Ideally, where possible avoid purchasing devices with an always on microphone.
|
||||||
|
|
||||||
- point: Monitor your home network closely
|
- point: Monitor your home network closely
|
||||||
priority: Optional
|
priority: Optional
|
||||||
@ -1666,6 +1680,16 @@
|
|||||||
details: >-
|
details: >-
|
||||||
Prevent unauthorized credit inquiries by freezing your credit through Experian, TransUnion, and Equifax.
|
Prevent unauthorized credit inquiries by freezing your credit through Experian, TransUnion, and Equifax.
|
||||||
|
|
||||||
|
- point: Be cautious of public WiFi
|
||||||
|
priority: Recommended
|
||||||
|
details: >-
|
||||||
|
Avoid making online purchases and transactions using public WiFi, anybody can set up a legitimate looking public WiFi services but may be run by bad actors.
|
||||||
|
|
||||||
|
- point: Don't use public USB charging sockets
|
||||||
|
priority: Recommended
|
||||||
|
details: >-
|
||||||
|
Public USB charging sockets may be compromised by hackers
|
||||||
|
|
||||||
- point: Use Virtual Cards
|
- point: Use Virtual Cards
|
||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
@ -1727,7 +1751,7 @@
|
|||||||
intro: >-
|
intro: >-
|
||||||
Many data breaches, hacks and attacks are caused by human error.
|
Many data breaches, hacks and attacks are caused by human error.
|
||||||
The following list contains steps you should take, to reduce the risk of this
|
The following list contains steps you should take, to reduce the risk of this
|
||||||
happening to you. Many of them are common sense, but it's worth takin note of.
|
happening to you. Many of them are common sense, but it's worth taking note of.
|
||||||
|
|
||||||
checklist:
|
checklist:
|
||||||
- point: Verify Recipients
|
- point: Verify Recipients
|
||||||
@ -1785,6 +1809,13 @@
|
|||||||
details: >-
|
details: >-
|
||||||
HTTPS does not guarantee a website's legitimacy. Verify URLs and exercise caution with personal data.
|
HTTPS does not guarantee a website's legitimacy. Verify URLs and exercise caution with personal data.
|
||||||
|
|
||||||
|
- point: Never trust phone calls or emails claiming to be from technical support
|
||||||
|
priority: Recommended
|
||||||
|
details: >-
|
||||||
|
No matter how legitimate the caller sounds, always verify the caller and their identify from several other
|
||||||
|
sources, a geniuine technical support agent will never ask for your password. Even the most experienced
|
||||||
|
technically saavy person will get caught out by this!
|
||||||
|
|
||||||
- point: Use Virtual Cards when paying online
|
- point: Use Virtual Cards when paying online
|
||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
@ -1903,10 +1934,32 @@
|
|||||||
priority: Essential
|
priority: Essential
|
||||||
details: Inspect ATMs and public devices for skimming devices and tampering signs before use.
|
details: Inspect ATMs and public devices for skimming devices and tampering signs before use.
|
||||||
|
|
||||||
|
- point: Keep mobile phone safe
|
||||||
|
priority: Recommended
|
||||||
|
details: Always keep you phone safely hidden away in a pocket or a bag, even during calls- it can easily be snatched
|
||||||
|
from your hands by gangs on electric bikes and scooters.
|
||||||
|
|
||||||
|
- point: Always secure home with a chubb lock
|
||||||
|
priority: Recommended
|
||||||
|
details: Convential yale style locks are easy to pick, lock picking kits are freely available on shopping sites like eBay and Amazon.
|
||||||
|
|
||||||
|
- point: Store household and car keys away from door entrances
|
||||||
|
priority: Optional
|
||||||
|
details: Thieves may reach into letter boxes and use wire tools to remove keys from the inside of your house easily.
|
||||||
|
|
||||||
- point: Protect your Home Address
|
- point: Protect your Home Address
|
||||||
priority: Optional
|
priority: Optional
|
||||||
details: Use alternative locations, forwarding addresses, and anonymous payment methods to protect your home address.
|
details: Use alternative locations, forwarding addresses, and anonymous payment methods to protect your home address.
|
||||||
|
|
||||||
|
- point: Ensure hotel safety whilst on vacation
|
||||||
|
priority: Optional
|
||||||
|
details: Hotels doors can be vulnerable to thefts opening with specially shaped wire underneath the door, this can be mitigated
|
||||||
|
by stuffing a hotel towel on the door handle on the inside.
|
||||||
|
|
||||||
|
- point: Never trust a hotel safe whilst on vaction
|
||||||
|
priority: Optional
|
||||||
|
details: Hotel safes give a false sense of security and can be easily mitigated by a thief.
|
||||||
|
|
||||||
- point: Use a PIN, Not Biometrics
|
- point: Use a PIN, Not Biometrics
|
||||||
priority: Advanced
|
priority: Advanced
|
||||||
details: Prefer PINs over biometrics for device security in situations where legal coercion to unlock devices may occur.
|
details: Prefer PINs over biometrics for device security in situations where legal coercion to unlock devices may occur.
|
||||||
|
Loading…
Reference in New Issue
Block a user