A compiled checklist of 300+ tips for protecting digital security and privacy in 2022
Go to file
Alicia Sykes 5c94e0242f New docs
2018-06-17 11:34:43 +01:00
docs New docs 2018-06-17 11:34:43 +01:00
readme.md OS, Router and Phone sections. First version done 2018-05-28 20:22:33 +01:00

Personal Security Checklist

Passwords

Ideally you should use a different, and secure password to access each service you use. To securely manage all of these, a password manager is usually the best option.

Most reported data breaches this Verizon report are caused by involved weak, default or stolen passwords. Massive amounts of private data was stolen because of this.

For everything you could ever want to know about passwords, check out this guide.

Security Priority Details and Hints
Use a strong password Recommended Check how strong your password is at: HowSecureIsMyPassword.net. Try to get a got mixture of upper and lower-case letters, numbers and symbols. Avoid names, places and dictionary words where possible, and aim to get a decent length. Have a look at How Long will it take to Crack my Password.
Dont save your password in browsers Recommended Most modern browsers offer to save your credentials when you log into a site. Dont allow this! As they are not encrypted, hence can allow easy access into your accounts. Also do not store passwords in a .txt file or any other unencrypted means. Ideally use a password manager.
Use different passwords for each account you have Recommended If one password gets compromised, it can give hackers access to your other online sites, so it is highly recommended not to reuse the same passwords. In order to manage having hundreds of different passwords, use a password manager. Have a look at LastPass, DashLane, KeePass or Robo Forms 8.
Be cautious when logging in on someone elses device Recommended Ideally you wouldnt ever log into any of your services on someone elses device, since you cant be sure that they dont have any malware. If you do, ensure that your in a private session (like Incognito mode) so that nothing gets saved
Avoid password hints Optional It is likely that there is a lot of information about you online, so it can be an easy task for a hacker to find out which high school you went to, or what your Mums name is.
Never answer online security questions truthaly Optional Instead, create a password inside your password manager to store your fictitious answer. This will stop people guessing your place of birth or mothers mainen name.
Dont use a 4-digit pin to access your phone Optional Dont use a short pin to access your smartphone or computer. Instead use a text password.
Use an offline password manager Advanced Consider an offline password manager, encrypted by a strong password. If you work across two or more computers, this could be stored on an encrypted USB. KeePass is a strong choice
If possible, try to avoid bio-metric and hardware-based authentication Advanced Fingerprint sensors, face-detection and voice-recognition are all easily hackable. Where possible replace these with traditional passwords.
Password protect your BIOS and drives Advanced A BIOS or UEFI password helps to make an inexperienced hackers life a bit harder if they get hold of your PC or hard drive, here is a guide on how to do it.

2-Factor Authentication

This is a secure method of logging in, where you supply not just your password, but also an additional code usually from a device that only youd have access to.

Security Priority Details and Hints
Use an authenticator. Recommended Use Google Authenticator where sites offer 2-FA. Alternative authenticators include: Authy, FreeOTP, LastPassAuthenticator and AuthenticatorPlus. SMS codes are ubiquitous, but easy to break so although better than nothing, not ideal. Another option is a hardware-based 2FA, such as Yubico, although with limited compatibility and of course a physical cost. Check out this list of apps/ sites which provide the option of 2FA.

Most modern web browsers allow for addons and extensions, these can access anything that you do online, avoid installing anything that may not be legitimate and check permissions first. Be aware that ever website that you interact with, including search engines will likely be keeping records of all your activity. Last year Kaspersky reported over a million data exploits caused by malicious sites.

For more browser security pointers, check out: Heres How To Get Solid Browser Security

Security Priority Details and Hints
Deactivate ActiveX Recommended ActiveX is barley used nowadays, but Microsoft browsers have it enabled by default. It acts as a middleware between Java and Flash applications and your PC. But it is commonly used for malicious sites to run scripts directly on your PC. See this article for more details.
Disable Flash Recommended Adobe Flash has been around since the dawn of the internet, however it has been falling in popularity for a while. It brings with it many unpatched vulnerabilities (a few of which you can read about here). See this guide, on how to disable Flash player, or this guide for more details on how dangerous it can be.
Block Trackers Recommended Consider installing a browser extension, such as Privacy Badger, to stop advertisers from secretly tracking you
Block scripts from bad origin Recommended Use an extension such as uBlock Origin, to block anything being loaded from an external or unverified origin.
Force HTTPS only traffic Recommended Ensure that you only use websites through https. Its recomended to use an extension such as HTTPS Everywhere, to force all sites to load securely.
Only use trusted browser addons and extensions Recommended Both Firefox and Chrome webstore allow you to check what permissions access rights an extension requires before you install it. Check the reviews. Only install extensions you really need.
Always keep your browser up-to-date Recommended Browser vulnerabilities are constantly being discovered and patched, so its important to keep it up to date, to avoid a zero-day exploit.
Use a private search engine Optional Take a look at DuckDuckGo or StartPage. Neither store cookies or cache anything.
Consider a privacy browser Optional Google openly collects usage data on Chrome usage. There are several privacy browsers out there which minimise the amount of data collected. Have a look at Brave Browser, Yandex, or Comodo. As a more extreme choice, consider Tor.
Disable JavaScript Advanced Many modern web apps, are JavaScript based, so disabling it will greatly reduce your browsing experience. But if you really want to go all out, then it will reduce your attack surface. Read more about the growing risk of JavaScript malware.

VPN

A Virtual Private Network (VPN) allows you to securely connect to the internet, when you visit a site, your visiting it through the secure VPN connection and not broadcasting your own IP address, therefore hiding your identity on the sites you visit, to both your ISP anyone else trying to track you, they can also encrypt your traffic so you can browse more securely on public networks. Theyre really easy to setup. To learn more about what a VPN is, how it works and how to choose one, checkout this PC Mag article.

Security Priority Details and Hints
Use a VPN Recommended Ideally use a paid-for VPN, as theyre considerably better quality so wont affect your speeds, nor show adds. Take a look at VyprVPN, NordVPN, IPVanish and TunnelBear.

Emails

Nearly 50 years since the first email was sent, theyre still very much a big part of our day-to-day life, and will probably continue to be for the near future. So considering how much trust we put in them, its surprising how fundamentally insecure this infrastructure is. Email-related fraud is on the up, and without taking basic measures you could be at risk. (For basic enterprise pointers, see this article).

If a hacker gets access to your emails, it provides a gateway for your other accounts to be compromised, therefore email security is paramount for your digital safety.

These links are also useful for additional simple measures that you can take to specifically protect a Yahoo, GMail, Outlook and AOL account.

Security Priority Details and Hints
Have more than one email address Recommended Keeping your important and safety-critical messages separate from trivial subscriptions such as newsletters, is a very good idea. Be sure to use different passwords. This will also make recovering a compromised account after an email breach easier.
Keep security in mind when logging into emails Recommended Your email account is one of the most important to protect with a secure password. Only sync your emails with your phone, if it is secured (encrypted with password). Dont allow your browser to save your email password. Prevent man-in-the-middle attacks by only logging in on a secured browser.
Always be weary of phishing and scams Recommended If you get an email from someone you dont recognize, dont reply, dont click on any links, and absolutely dont download an attachment. Keep an eye out for senders pretending to be someone else, such as your bank, email provider or utility company. Check the domain, read it, ensure its addressed directly to you, and still dont give them any personal details. Check out this guide, on how to spot phishing emails.
Dont share sensitive over email Optional Emails are very very easily intercepted. Also you cant know how secure your recipients environment is. Dont share anything personal, such as bank details, passwords, confidential information over email. Ideally, dont use email as any primary method of communication.
Dont connect third-party apps to your email account Optional If you give a third-party app (like Unroll.me) full access to your inbox, this makes you vulnerable to cyber attacks. The app can be compromised and, as a consequence, cyber criminals would gain unhindered access to all your emails and their contents.
Consider switching to a more secure email provider Optional Email providers such as ProtonMail, CounterMail, HushMail (for business users) or MailFence allow for end-to-end encryption, full privacy as well as more security-focused features.

Social Media

Security Priority Details and Hints
Check your privacy settings Recommended Most social networks allow you to control your privacy settings. Ensure that your profile can only be viewed by people who you are in your friends list, and you know personally.
Only put info on social media that you wouldnt mind being public Recommended Even with tightened security settings, dont put anything online that you wouldnt want to be seen by anyone other than your friends. Dont reply soley on the social networks security.
Dont give social networking apps permissions they dont need Recommended By default many of the popular social networking apps, will ask for permission to access your contacts, your call log, your location, your messaging history etc.. If they dont need this access- dont grant it.
Revoke access for apps your no longer using Recommended Instructions: Facebook, Twitter, LinkedIn, Instagram.
Remove meta data before uploading media Optional Most smartphones and some cameras automatically attach a comprehensive set of additional data to each photograph., This usually includes things like time, date, location, camera model, user etc. Remove this data before uploading. See this guide for more info.
Dont have any social media accounts Advanced It may seem a bit extreme, but if your serious about data privacy and security, stay away from entering information on any social media platform.

Your Devices

Security Priority Details and Hints
Turn of connectivity features that arnt being used Recommended When your not using WiFi, Bluetooth, NFC or anything else- turn those features off. These are commonly used to easily hack individuals.
Uninstall apps that you dont need Recommended Dont have apps that your not using on your phone, as they can be collecting data in the background. Dont install apps from non-legitimate sources, or apps with few reviews.
Dont grant apps permissions that they dont need. Recommended If an app doesnt need access to your camera- dont grant it access. Same with any features of your phone, be wary about what each app has access to.
Consider running a custom ROM if you have an Android device Advanced Your default OS tracks information about your usage, and app data, constantly. Consider a security-focused custom ROM, such as Lineage or CopperheadOS.

SMS and Calls

Both SMS texting and traditional phone calls are not secure. Avoid it whenever there is a reasonable alternative, and dont use these means to communicate anything secure. Be wary of who you share your phone number with

Security Priority Details and Hints
Dont use SMS - Use E2E encrypted messaging apps Optional iMessage is secure. For non-Apple users Signal is the most secure option. As of late 2016 WhatsApp is also end-to-end-encrypted using the Signal protocol. Keep in mind that although the transmission may be secured, breaches can still be cause if your, or your recipients device has been compromised.
Use a secure email provider Optional Most email providers completely invade your privacy intercepting both messages sent and received. ProtonMail is a secure email provider, that is open source and offers end-to-end encryption. There are alternative secure mail providers (such as CounterMail, HushMail and MailFence)- but ProtonMail has both a clear interface and strong security record.
Avoid using your real phone number when signing up for an account or service Optional Where possible, avoid giving out your real phone number while creating accounts online. You can create phone numbers using services such as Google Voice or Skype. For temporary usage you can use a service like iNumbr that generates a phone number that forwards messages and calls to your main number.

Your Router

Security Priority Details and Hints
Dont use a default password Recommended Change your router password- here is a guide as to how.
Use WPA2 Recommended WPA and WEP make it very easy for a hacker to gain access to your router. Use a WPA2 password instead. Ensure it is strong: 12+ alpha-numeric characters, avoiding dictionary words.
Ideally hide your SSID Optional An SSID (or Service Set Identifier) is simply your network name. If it is not visible, it is much less likely to be targeted. You can usually hide it after logging into your router admin panel, see here for more details.
Avoid the free router from your ISP Optional Typically theyre manufactured cheaply in bulk in China, and firmware updates which fix crucial security flaws arent released regularly
Kill unused process and services Advanced Services like Telnet and SSH (Secure Shell) that provide command-line access to devices should never be exposed to the internet and should also be disabled on the local network unless they're actually needed. In general, any service thats not used should be disabled to reduce attack surface

Operating Systems

Although Windows and OS X are easy and convenient, they both are far from secure. Your OS provides the interface between hardware and your applications, so if compromised can have detrimental effects.

Security Priority Details and Hints
Keep your OS up-to-date Recommended Microsoft, Apple and ChromeOS release regular updates, which fix security risks. Always keep your device updated.
Consider Switching to Linux Advanced Linux is considerably more secure than both OSX and Windows. Some distros are still more secure than others, so its worth choosing the right one to get a balance between security and convenience.
              |