Public domain image of fence from J.J. Thomas, Illustrated Annual Register of Rural Affairs for 1876-7-8, Luther Tucker & Son (1878) scanned by Google Books from Ohio State University Library |
1) Use two factor authentication. the Electronic Frontier Foundation (EFF) has handy guides to turning it on at many major services. If yours isn't listed, check this two factor resource maintained by Josh Davis.
2) Use a password manager so that using unique, hard to guess passwords is easier than using bad ones. Also use the password manager to store your fake answers to those insecure security questions, such as "what is your mother's maiden name?" EFF has a great video about password managers suggestions and Wirecutter has some suggestions about which one to use.
3) Keep your operating system and applications updated. If you are no longer using an application, consider deleting it.
The three steps above are relatively simple to do and shouldn't take more than a half hour to set up. There is no excuse for NOT doing them. They will save you from many, many, many, many types of attacks and heartache.
Public domain image of barbed wire fence from .J. Thomas, Illustrated Annual Register of Rural Affairs for 1876-7-8, Luther Tucker & Son (1878) scanned by Google Books from Ohio State University Library |
For more information, please take a look at the EFF's excellent Surveillance Self Defense guide (which is labelled surveillance but could really be labelled "privacy" or "security").
And, if your threat model includes the government getting access to your devices at a protest or as you cross the border, there are some other important things to consider.
No comments:
Post a Comment