Security Essentials Checklist for the Average Joe
There seems to be a considerable gap between guiding the corporate sector and the individual industry in regards to information security best practices. Several large entities are dedicated to creating the industry standards around security efforts designed to provide each company with a fighting chance at proper data protection. Unfortunately, not all of these standards apply to the average joe when it pertains to protecting there personal information unwanted peril. We have put together a short but sweet checklist of objectives you can accomplish as a person to adequately protect your assets from potential compromise. It is vital to keep in mind that there will be many different ways to achieve each of these controls, and the specific method or solution will be up to you as the end-user to determine.
Header 4Ability to check the current status of your cyber profile
Everyone has a cyber profile. If you have ever used the internet, you have created a profile for yourself without even knowing it. It is vital to the privacy of your sensitive information that you have a way to determine the current status of your cyber profile. There are many paid solutions out there that will perform things like credit monitoring, deep internet security, and much more. Mostly you have to have the knowledge and the want to find yourself online. There are tons of free solution online to helo your determine what information you have leaking around the internet.
Information is not the only source of data you want to track down. It is crucial to have a great understanding of how your devices are communicating with the outside world, as well. Using sites like BullGuard and ShieldUp will help you determine if you are sending a beacon out from home network devices that you may not know about.
Another critical control is always to enforce 2-factor authentication wherever you can. Nowadays, it is way too easy for malicious attackers to crack your passwords. By implementing 2FA, you can ensure that the attacker must also have your second factor of authentication to access your accounts. Some great examples of 2FA would be DUO, Google Authenticator, Okta or even an SMS message to your cellphone counts as a form.
Header 4Password Manager
Memorizing Passwords is a thing of the past, it is a way too inconvenient and insecure to try and remember a 20 character password that isn't simple to guess….for each account at that! This is the exact reason password managers were created. Now, you only have to remember one complicated password for your password manager app as this is where the rest of your credentials will be securely stored. Password manager apps also come built-in with a secure password generator as well, so you won't have to think about creating a new, complicated password for each account created. Some great, free examples would be LastPass, 1Password, Dashline, and Keepass. All of these platforms also have paid individual and family plans as well.
Header 4Securing Communication Channels
Last but certainly not least is being able to secure all communication channels as needed. Just because you pay for private internet at your home, doesn't mean your communications are private. It is quite simple for an attacker to sniff out your traffic and monitor your inbound/outbound connections. It is essential to utilize a reliable VPN service to encrypt your traffic from wandering eyes effectively. Being able to muddle your Geolocation and change your public IP address is only a couple of the benefits gained from utilizing a VPN service.