Best Cyber Security

Ultimate Privacy Guide 2022

First of all your must take your data privacy very seriously.

Malicious attackers can easily get in to your email, gain full access to your phone number.

And in other ways to pretend being you.

This can lead to takeover of your accounts and loss of data.

Every time when downloading a software such as Anti Virus, Malware clean always make sure to download from an official website.

There are fake websites that provide the software with backdoors installed.

So only install from official sources.

Top 15 Privacy Tips and Tricks

1: Use 2FA on every site with a login. Do not use SMS 2FA instead Google Authenticator or Authy.

2: Use Linux Operating System on your laptop instead of Windows.

3: Have one Laptop for work related tasks. Have another Laptop for playing games(doom), watching movies & social network etc.

4: On your laptops always encrypt the entire drive during install & disable booting from USB and enable a BIOS password.

5: Beware of Phishing coming through email and do not click any links from emails. Instead visit the web site yourself and type in the desired action example a tracking ID on the shipment provider website. Status on an Amazon order visit amazon website yourself and login view your orders and status.

6: If uploading to cloud storage providers such as mega.nz , dropbox.com , google drive, icloud etc. never upload any sensitive data.

7: When having a router make sure no NAS or storage device is connected that can be leaking sensitive data.

8: Never upload any sensitive data to websites such as cloud virus scanning, pastebin, picture editing, temporary data posting sites . The sites might store the data forever.

9: When connecting to public WiFi such as on a cafe, hotel or airport always use a VPN software.

10: Never insert any unknown USB/CDs/Removeable Media devices to your computer if possible disable USB ports at all times.

11: Use a strong password min. 10 characters example several words, different numbers together and special characters.

12: Careful not to reuse your password across multiple sites.

13: Never write sensitive data or upload pictures with sensitive data on any social media such as Facebook Twitter Instagram LinkedIn etc..

14: Check your email addresses if you can be in possible data dump at haveibeenpwned.com

15: Disable the Microphone and Webcam in your laptops if not being used.


PASSWORD

  • Change your password a few times a year and write it down in a safe place so you do not forget it.
  • Be careful not to reuse passwords on multiple sites.
  • Use a strong password minimum 10 characters example 3-4 words combined with small uppercase and special characters.
  • Always use 2FA connected with your password.
  • Do not give out your password on email, social media, over the phone or on instant messaging.

PERSONAL COMPUTER

  • Always make sure to disable the Microphone in the operating system and in the BIOS.
  • Always encrypt the drive which will require a password to resume or to start up. Example in Linux LUKS.
  • Always set a BIOS password.
  • Always disable booting from a USB drive.
  • Use a VPN when not at your home network.
  • Use external encrypted DISK drives to backup your data. Often do backups such as on a weekly or monthly basis.

It is recommended running LINUX, MAC or OpenBSD as operating system for less amount of data collection.

It is recommended to using one computer for your professional work and another computer for playing games and entertainment.

Use 2FA Authentication to any service you login to.

Windows

  • Deploy Anti Virus. On Windows install a preferred commercial antivirus.
  • In the operating system such as Windows navigate to the privacy menu and disable all data collecting.

LINUX

  • In the operating system such as Ubuntu navigate to the privacy menu and disable all data collecting.
  • On linux use ClamAV to scan local system clamscan -r -i /  . Clamscan can have false positives always research.
  • On Linux use rootkit hunter ./rkhunter --chceck to scan local system download only from https://sourceforge.net/projects/rkhunter/

Mac

  • Navigate to Privacy menu and disable all data collecting.
  • If using a MAC it is recommended to not login using an apple id.. You can still get updates only you cant access app store. Instead use Brew.

EMAIL

  • Check your email address at https://haveibeenpwned.com/ if you are listed there consider change to another email address.
  • Only use a secure email such as Protonmail.
  • Use multiple email addresses. Example one for personal, one for business related, one for trading.
  • Often delete mails older than 1 month stored in the Cloud.
  • Never leave any sensitive data in your email.
  • Be very careful or have as a rule to never click any links coming in email.
  • Enable 2FA authentication. Do not use phone SMS 2FA instead use Google Authenticator or Authy

INTERNET

Never upload any files to any websites.

This can be sites that keep files temporary or longer times. It can allow malicious actors to gain access to sensitive data.

  • virustotal - udrop.com - tmpfiles.org - file.io - dropbox.com - pastebin.com - imgbb.com - pixlr.com - canva.com - online-image-editor.com

SMARTPHONE

  • Never use your phone number for authentication. SIM Swapping can be easily done. Use instead 2FA Authenticator apps.
  • Disable GEO location in the camera app. Make sure when you take pictures there is no GEO location data.
  • Disable Bluetooth when not being used.
  • Never call using the normal phone app or SMS. Instead use encrypted services such as Signal, Telegram.
  • Disable location tracking when not needed example if you are not using the GPS app for driving.
  • Disable storing of GEO location tracking in online services such as your Google ID.
  • Always password protect your smart phone with a code instead of fingerprint or face recognition.
  • Install a VPN client when not at your home network.
  • If you do not trust the microphone is turned off you can put in a Mic Blocker. It works the same way as if you put a headset in and the operating system switch to it. And in this case it will block the microphone.
  • Disable WiFi & Bluetooth when traveling to prevent leaking data and be subject to attack.
  • Preferred OS GrapheneOS (grapheneos.org) Device. It can convert any traditional Google Pixel Device to a pure Android without any Google services or connections.
  • Disable automatic storing of pictures to the cloud. Some smartphones have enabled by default to upload your pictures to Google Drive, MEGA.nz or Apple Cloud.

CRYPTO CURRENCIES

  • Never give or show your 12 or 24 word seed phase to anyone.
  • Always store your crypto currencies offline and not leave it on an exchange.
  • Have written down in one or more secure place your seed phases for recovery.
  • Never have any crypto currency on your smart phone.
  • If storing on a computer only have it stored on a separate computer. Do not store it on the computer you play games on. 

ROUTER

  • Make sure to limit access to the web interface.
  • Disable UPNP.
  • Do not connect any Network Enabled Harddrives example for movie or picture storing.
  • Disable access to the USB port on the router.
  • Set a strong WPA2 Password.
  • Lower the WiFi Signal strength so it can only be accessed in a short range. Making it harder for attackers to reach it.

 PUBLIC WIFI

  • Be careful to connect to any public WiFi. Instead tether Internet from your phone.
  • Always use a VPN.
  • Do not click any popups  or update requests when on a public WiFi. 

CLOUD STORAGE

  •  When using cloud providers such as mega.nz , dropbox.com , google drive etc. do not store any sensitive data.