Step 1 – Multiple Sources of Backup as Cybersecurity Data Loss Prevention
(for lost/deleted items recovery purposes, protection from ransomware, etc)
- Practise the 3-2-1 backup rules whenever/wherever possible.
- Ensure and test backup-recoveries from time to time (in case your backups can’t be recovered, it’s quite common for amateurs to have backups they cannot recover from)
- Use commonly available, standard RAID storage solutions if possible.
- When using cloud backup solutions, always encrypt the data first and ensure that the encrypted backups can be decrypted by the owner.
PASSWORD PROTECTION SUGGESTIONS
Step 2 – Improve Password Security
- Use 2-factor authentication wherever possible for logins.
- Always change the default password given by the solution provider.
- Use a different password for different websites instead of a master password with the same username, and provide a way to remember those passwords for the individual sites.
THREAT MINIMIZATION SUGGESTIONS
Step 3 – Security Through Obscurity
- Check for devices not in use, disconnect them from the internet or power them off (be eco-friendly too). This includes connected spare routers, spare devices/gadgets etc, reducing another device from being compromised.
- Install the bare minimum, yet most popularly used security tools available only, such as firewall and antivirus programs. Do not be tempted to install browser extension/application without checking the credentials of the source or reviews associated with it. Only install an actively upgraded/maintained program to minimize issues related to security problems.
- With a new system (or mobile device), always only install the bare minimum programs you need, from credible sources and always subscribe to the latest update or security information provided by the vendors.
PRIVACY/ANONYMITY WEB USAGE SUGGESTIONS
Step 4 – Private Data Browsing & Communication Protection
- Use a privacy search engine such as duckduckgo.com if you want to perform online searches that does not track you.
- Use a Tor-enabled/built-in browser feature such as Brave browser with the “New Private Window with Tor” option while browsing online.
- When using a public wifi network you don’t trust, log out from websites and refrain from logging into websites needing your username and password.