This was written for friends and family, and not for Information Security (InfoSec) professionals.
Information security (InfoSec), Cybersecurity, Security...are used interchangeably...albeit not technically correct. Imagine this as a conversation between friends over a coffee/drinks. This is not professional/legal advice. Authors/editors have been in the InfoSec industry for a long time.
is the state or condition of being free from being observed or disturbed by other people [...or machines that can be used by people].
Sometimes, you have to sacrifice a bit of your privacy so that you can be protected. There is a constant tradeoff between InfoSec and Privacy. Examples:
Give 911 your name and location so you can receive assistance.
FBI/CIA/NSA monitoring/collecting the world’s data to find terrorists..both foreign and domestic.
Companies monitoring their laptop/desktop/software/email so no bad guys can steal valuable information.
Privacy vs Convenience
Cost of ‘free’ services
Understand the COST (your privacy) when you use FREE services such as Facebook/Instagram, Google, Tiktok, etc.
If someone is providing a service to you for free, YOU ARE THE PRODUCT and the service is delivered at the cost of your data (loss of privacy).
. Most people don’t understand this. If you are not happy with this arrangement, find/pay for another service. Note: It’s not ok if companies abuse this arrangement...another topic that won’t be covered here.
The “Cloud”
There is a joke that goes: There is no cloud - it’s just someone else’s computer.
This is mostly true...especially for the average person. Understand that most ‘cloud’ services, including services that you pay for, probably have access to your data. Here is an example explanation from
Here is a screenshot for configuration for one of my accounts:
Review Third-Party Accounts (Who has access to your data?)
These are other apps/companies that has access to your data through the main services that you use (e.g., Google, Microsoft, Facebook, Amazon, Fitbit, etc)
Review this list and remove any accounts that should not have access to your data.
Here is an example of apps that can access my Office365 account. Review this list for all your cloud accounts.
Anti-Virus Software
You may have heard that Anti-Virus (AV) is not enough. This is true..it’s not enough, but you should still have it installed as basic protection. Here are some options:
with unique passwords for each account will contain the damage to only that account.
Computer Backups
Backup your important folders/files on your computer. Just syncing files/folders to online cloud storage services like Dropbox/GDrive/Onedrive is not a backup.
If file(s) becomes corrupted and syncs to the online cloud service, the corrupted file will override the file in the cloud. There is a limited window of time where you can recover a previous version of the file, but you should know and be comfortable with how far it goes back.
Network firewalls are more than what people usually do at home, but I do this, and these solutions makes it easier. Warning: this is more technical than the average person’s skillset. Read ‘install a network firewall’ section: