/personal_digital_security

personal digital security guide

GNU General Public License v3.0GPL-3.0

Personal Digital Security Guide

Rev 20240208
Dominic Fahey
@domfahey


"Risk Prevention - Not much in life is 100%"

Executive Summary: Risk Prevention for the Average Apple User

In an era where digital security is paramount, the "Risk Prevention - Not much in life is 100%" guide serves as an essential roadmap for average Apple users who seek to fortify their digital life without being overwhelmed by complex cybersecurity jargon or measures. Acknowledging that no security measure is foolproof, this guide pragmatically focuses on significantly reducing risk through accessible and effective strategies. It is tailored for individuals who may not be high-value targets like journalists or politicians but still recognize the importance of safeguarding their digital presence against common threats.

The cornerstone of the guide's advice is the strong endorsement of Two-Factor Authentication (2FA), with a clear hierarchy of preference that begins with hardware keys, followed by push-based and TOTP/token-based methods, and advises against the use of SMS-based 2FA due to its vulnerabilities. This is particularly emphasized for critical accounts such as email and financial services, where the risks of SIM-swap scams and related frauds are highlighted.

To complement 2FA, the guide advises on several other key security measures:

  • Device Security: Recommendations include the purchase of hardware security tokens, the activation of Apple's Stolen Device Protection, and the use of unique, long, random passphrases managed via reputable password managers.
  • Communication Security: The guide suggests securing cell phone accounts by setting up strong PINs/passcodes, requesting port freezes, and employing unique passcodes on mobile devices.
  • Financial Security: A preference for credit over debit cards is advised to mitigate fraud risks, alongside the practice of shredding sensitive documents and implementing credit freezes to protect against identity theft.
  • Privacy and Online Security: Strategies include using reputable DNS providers, monitoring for data breaches, opting out of unsolicited marketing, and employing tools like HTTPS Everywhere and VPNs to enhance online privacy and security.

The guide encapsulates a holistic approach to digital security, balancing the ease of implementation with the effectiveness of each measure. By adopting these practices, users can significantly enhance their digital security posture, protecting themselves against a wide array of common threats without needing to be cybersecurity experts.

This comprehensive set of recommendations underscores the importance of proactive measures in today's digital landscape. It is a testament to the achievable balance between accessibility for the average user and the implementation of robust security practices that can thwart the efforts of opportunistic attackers.

Recommendations

Credit to Bryan VonCannon for seeding this list