Basic Computer Security Practices
Computer Security
These are basic techniques to maintain computer security and reduce the likelihood of becoming a victim of cyberattacks.
Passwords
- Passwords and 2FA: Always use strong passwords. At least use 2FA on anything involving money or email.
Update your software
Most day-to-day attacks involve vulnerabilities that have long been patched. If you have not patched the software though, then you're a sitting duck. These are the low hanging fruit hackers look for to add computers to a botnet or siphon your personal information. And there are thousands and thousands of low hanging fruits when hackers cast a wide net.
- Update your OS if it is not. Very serious vulnerabilities are patched all the time.
- Update your software. To automate patching in Windows, try PatchMyPC, a very simple program which will silently download/install new versions of software you have installed.
- If you have a program installed that is no longer being updated, it is strongly recommended you uninstall it
Antivirus
Make sure Windows Antivirus is on. Consider using a paid antivirus as well:
- Norton Good all-around protection
- MalwareBytes very good real-time protection
- ESET NOD32 more for technical users?
- Bitdefender has a free option
- Avira
- AVG
- McAfee
Oh shit, what did I just click on?
Most people should know this one but it happens to the best of us. Use tools like the ones below to find out where it goes safely before even considering clicking on it. You may still decide not to click on it even if it seems "safe". Here are some tools which can help you determine what is safe:
- URLscan: paste a URL into this and it will check the website. You can then view an image of what would pop up without opening it yourself. If the website is known to be malicious it will tell you.
- VirusTotal analyzes files and URLs for viruses. Before opening a file, drag it into VirusTotal to see what it says.
- CheckShortURL for checking shortened URLs (bit.ly, goo.gl, ow.ly, etc.)
- Redirect Detective
- Norton Malicious URL tester
Make backups of anything important
Software tools for backing up files:
- Paragon Backup & Recovery (Windows)
- Macrium Reflect (Windows, free & paid)
- ChronoSync (macOS)
- Carbon Copy Cloner (macOS)
- Create restore points to be able to restore the OS's state. Does nt
Separate Admin account
Consider having separate admin and standard users on the computer you use, especially if multiple people use a computer. This allows you to enforce policies, such as preventing the installation new programs without admin permission. Even if only you use the computer, it creates a layer of separation between your day-to-day user and the admin privileges if the computer gets hacked.
Enable disk encryption
All modern iOS and Android smartphones are configured to use full disk encryption by default. Just make sure you have good passcode.
- MacBook: enable Apple’s built-in FileVault’s full disk encryption in your computer’s privacy and security settings.
- Windows: use the built-in Bitlocker encryption setting if you have a Windows Pro license. If you have a Home license, install and enable an encryption tool called Veracrypt.
See also: Data Privacy Strategies, Programming#Secure Coding
Resources
- Data Privacy Strategies
- Privacy.sexy - a web UI index of commands for configuring your OS and hardening privacy and security in Windows, MacOS, or Linux
- Windows-Optimize-Debloat for getting rid of all the unnecessary junk in Windows' trunk
- Win11Debloat