DEL HTML anchors from posts as they are going to be added automaticly with new ssg
This commit is contained in:
parent
3484b45045
commit
3d28d5eee9
26 changed files with 263 additions and 263 deletions
|
|
@ -6,13 +6,13 @@ Let me start with; **there is no perfect security**. Your goal is to make it as
|
|||
|
||||
I keep it as short as possible and focus on the 'what' and 'why', not the 'how'. There are many ways to achieve the goals, but this is a topic for itself, and depends on the circumstances.
|
||||
|
||||
## "I am not a target" <a href="#i-am-not-a-target" id="i-am-not-a-target">#</a>
|
||||
## "I am not a target"
|
||||
|
||||
Unfortunately, anyone is, and yes, ANYONE can become a victim of a cybercrime. Cybercrime is highly lucrative, and criminals become more creative every year. Automation makes it simple to find easy targets or attack a large group of targets.
|
||||
|
||||
I'll try to provide you with enough information for safe internet use. If you feel overwhelmed, tackle one topic at a time, and keep improving. **It is never too late to care about your online security**.
|
||||
|
||||
## TLDR - 5 most crucial tips <a href="#tldr" id="tldr">#</a>
|
||||
## TLDR - 5 most crucial tips
|
||||
|
||||
|
||||
If you only take away these five things, I will be more than happy. These steps alone take your security to the next level and are crucial. I'll go into more detail later in the post.
|
||||
|
|
@ -50,7 +50,7 @@ Answering security questions truthfully makes you vulnerable to social engineeri
|
|||
|
||||
---
|
||||
|
||||
## Password Security <a href="#password-security" id="password-security">#</a>
|
||||
## Password Security
|
||||
|
||||
**Summarized: Generate and store a random and unique 16+ characters password for every account in your password manager.**
|
||||
|
||||
|
|
@ -102,7 +102,7 @@ It does not hurt to change passwords regularly, but it is not worth the hassle,
|
|||
|
||||
---
|
||||
|
||||
## Multi-/2-factor authentication <a href="#mfa" id="mfa">#</a>
|
||||
## Multi-/2-factor authentication
|
||||
|
||||
This authentication method requires the user to provide two or more factors to access the desired service. Those factors can be: **knowledge** (something you know (e.x. pin, password, security question)), **possession** (something you have (e.x. security token, security key, second device)), and **inherence** (something you are (e.x. fingerprint, iris)).
|
||||
|
||||
|
|
@ -161,7 +161,7 @@ PIN:
|
|||
|
||||
**Important**: I cannot stress enough how important backups are. Even though MFA is a must and brings your online security to the next level, there is a legit risk of getting locked out if you lose access to the second factor.
|
||||
|
||||
## Do not overshare <a href="#over-sharing" id="over-sharing">#</a>
|
||||
## Do not overshare
|
||||
|
||||
I might be paranoid, but the internet can be a dangerous place. As the police would say: '**everything you say can and will be used against you**'. This section relates to targeted rather than automated attacks.
|
||||
|
||||
|
|
@ -172,7 +172,7 @@ Something you can do is **lie, share wrong information about yourself, use an a
|
|||
Be skeptical and keep in mind: **the internet does not forget**.
|
||||
|
||||
|
||||
## Check twice, click once <a href="#check-twice" id="check-twice">#</a>
|
||||
## Check twice, click once
|
||||
|
||||
The best security strategy is worthless if someone clicks and downloads anything negligently.
|
||||
|
||||
|
|
@ -184,7 +184,7 @@ To provide some examples: 2 ways to deal with suspicious messages would be to, f
|
|||
|
||||
Being careful is an important part of being secure online.
|
||||
|
||||
## Secure your device <a href="#secure-device" id="secure-device">#</a>
|
||||
## Secure your device
|
||||
|
||||
**Keep your operating system, browser, antivirus, and everything else up-to-date**. I cannot stress enough how important that is.
|
||||
|
||||
|
|
@ -202,7 +202,7 @@ Do your research. There are good and bad VPN providers, and NEVER use free VPN o
|
|||
|
||||
In the end, I have to mention **Tor**. Tor routes your traffic through of network of nodes and makes it almost to track back. It is an important tool, but I am afraid that a detailed description is out of the scope of this post.
|
||||
|
||||
## Conclusion <a href="#conclusion" id="conclusion">#</a>
|
||||
## Conclusion
|
||||
|
||||
So, I hope I could provide some new ideas on how to protect your online activity. Just start with the five most important points that I showed at the start, and tackle other topics later. And keep in mind, there is no perfect security, just making it more complex, and limiting the damage in case of a security incident.
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue