User Tools

Site Tools


cybersecuritybasics

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
cybersecuritybasics [2022/10/28 18:40] – [Wires Rock] jgmac1106cybersecuritybasics [2022/10/28 19:34] (current) – getting rid of meta writing statements jgmac1106
Line 1: Line 1:
-As an Internet activist, a member of a marginalized group, or just a concerned security citizen you may want to take steps to protect yourself online. You can take a few steps to go a long way. Below you will find my best tips in descending order of both capability and complexity. Meaning everyone should "Be Smart" but not everyone needs to use "network segmentation."+As an Internet activist, a member of a marginalized group, or just a concerned security citizen you may want to take steps to protect yourself online. You can take a few steps to go a long way.Based on threats to your self and data think about security as  descending order of both capability and complexity. Meaning everyone should "Be Smart" but not everyone needs to use "network segmentation."
  
 Please share tips you find useful for the average internet activist who may not have networking and IT skills. Please share tips you find useful for the average internet activist who may not have networking and IT skills.
Line 49: Line 49:
 Think of your devices as having two different users. One would have admin rights and the other has user rights. Set up all your laptops and devices with two users. Give one of them full rights to install software, run updates automatically, and modify the system. Think of your devices as having two different users. One would have admin rights and the other has user rights. Set up all your laptops and devices with two users. Give one of them full rights to install software, run updates automatically, and modify the system.
  
-Then make yourself a second user. This user will connect to external systems like we apps and social media. This user should not have rights to modify the system. If you come across a program you need to install you would log out and log in with the admin account. Then grant the user account access to to the application.+Then make yourself a second user. This user will connect to external systems like web apps and social media. This user should not have rights to modify the system. If you come across a program you need to install you would log out and log in with the admin account. Then grant the user account access to to the application.
  
 ===== Backups ===== ===== Backups =====
cybersecuritybasics.1666982436.txt.gz · Last modified: 2022/10/28 18:40 by jgmac1106