A list of cybersecurity best practices for personal devices curated from national security agencies, cybersecurity instituions and my personal security checklists.
Enjoy the list! π§ββοΈ
β Contributing
Please feel free to contributing, your name will be added with the security control.
PS. I still need to work on a proper contribution process in github. Please give me some time π€ .
β Security Checklist
Inventory
- Take inventory of your online accounts and electronic devices (router, camera, smartphone, computer, smart TV, etc.) - Khalil.
Services
- Only activate your Bluetooth when necessary - NSA.
- Disable location services when they are not needed - NSA.
Internet
- Avoid opening unreliable links and attachments - NSA.
- Close pop-up windows immediately - NSA.
- Only download apps/files from official sources - NSA.
- Avoid public Wi-Fi networks and prefer your mobile network - NSA.
- Be cautious with unsolicited emails and messages (take your time) - Khalil.
- Prevent anyone from knowing your access codes and passwords - Khalil.
- Beware of fake QR codes, deepfakes, and fake supports - Khalil.
- Use reliable messaging and online service providers - FBI Cyber Division Cyber.
Accounts
- Use multiple email addresses (for entertainment, shopping, utilities, etc.) - CNIL.
- Use strong codes and passwords (as long as possible) - NIST, 2024.
- Use a password manager - Khalil.
- Enable two-factor authentication on your accounts (other than by SMS) - NIST, 2024.
Device
- Use biometrics (for simplicity) to protect your less sensitive data - NSA.
- Keep your devices and applications up to date - NSA.
- Maintain the built-in protection features of your device - NSA.
- Delete unnecessary apps from your devices - FBI Cyber Division Cyber.
- Buy new devices or reset used devices to "factory" settings before using them - Khalil.
Physical
- Prevent anyone from having physical access to your devices - NSA.
- Lock your devices before walking away - Khalil.
- Use a phone case that blocks the microphone and camera - NSA.
- Hide your computer camera (or other devices) when not in use - Khalil.
- Use reliable accessories (cables, chargers, sockets, etc.) - NSA.
- Turn off your devices at least once a week - NSA.
- Avoid using USB drives as much as possible, especially if they don't belong to you - Khalil.
Espionage
- Use a pseudonym on the Internet - CNIL.
- Avoid sensitive conversations near your electronic devices - NSA.
- Avoid sensitive conversations by SMS - NSA.
- Be discreet in public places (train, subway, restaurants, etc.) and on social media - Khalil.
Backup
- Keep an "offline" backup of your essential data (external hard drive, for example) - Khalil.
Reputation
- Monitor your reputation on the Internet (name, photo, phone number, accounts, etc.) - Khalil.
Incident
- Regularly monitor your accounts and passwords in case of a breach and take necessary actions - Khalil.
- Report any suspicious behavior or scam attempts to the authorities - Khalil.
- Avoid using surveillance systems (camera, sensors, etc.) of questionable quality/source - Khalil.
- If in doubt, seek help from cybersecurity and data protection specialists - Khalil.
Prevention
- Stay informed about cyber news and data breaches by following reliable sources - Khalil.
β License
This work is licensed under CC BY-NC-SA 4.0. In other words, share generously but provide attribution to the authors (e.g, credit: goosint.com).
Sincerely, Khalil B.