Internet Security

Securing your digital life, part one: The basics

Enlarge / Artist’s impression of how to keep your digital stuff safe from all kinds of threats.Aurich Lawson | Getty Images reader comments 204 with 108 posters participating, including story author Share this story Share on Facebook Share on Twitter Share on Reddit Securing your digital life Securing your digital life, the finale: Debunking worthless…

Artist's impression of how to keep your digital stuff safe from all kinds of threats.
Enlarge / Artist’s impression of how to keep your digital stuff safe from all kinds of threats.
Aurich Lawson | Getty Images

reader comments

204 with 108 posters participating, including story author

Securing your digital life

  • Securing your digital life, the finale: Debunking worthless “security” practices
  • Securing your digital life, part three: How smartphones make us vulnerable
  • Securing your digital life, part two: The bigger picture—and special circumstances
  • Securing your digital life, part one: The basics

View more stories

I spend most of my time these days investigating the uglier side of digital life—examining the techniques, tools, and practices of cyber criminals to help people better defend against them. It’s not entirely different from my days at Ars Technica, but it has given me a greater appreciation for just how hard it is for normal folks to stay “safe” digitally.

Even those who consider themselves well educated about cyber crime and security threats—and who do everything they’ve been taught to do—can (and do!) still end up as victims. The truth is that, with enough time, resources, and skill, everything can be hacked.

The key to protecting your digital life is to make it as expensive and impractical as possible for someone bent on mischief to steal the things most important to your safety, financial security, and privacy. If attackers find it too difficult or expensive to get your stuff, there’s a good chance they’ll simply move on to an easier target. For that reason, it’s important to assess the ways that vital information can be stolen or leaked—and understand the limits to protecting that information.

Did you really think we were going to be able to get through a cybersecurity article without at least one guy-in-a-ski-mask-with-a-laptop stock photo?
Enlarge / Did you really think we were going to be able to get through a cybersecurity article without at least one guy-in-a-ski-mask-with-a-laptop stock photo?
Pinopic / Getty Images

In part one of our guide to securing your digital life, we’ll talk briefly about that process and about basic measures anyone can take to reduce risks to their devices. In part two, available here, we’ll address wider digital identity protection measures, along with some special measures for people who may face elevated risks. But if you’re looking for tips about peanut butter sandwich dead drops to anonymously transfer data cards in exchange for cryptocurrency payments… we can’t help you, sorry.

You are not Batman

A while back, we covered threat modeling—a practice that encompasses some of what is described above. One of the most important aspects of threat modeling is defining your acceptable level of risk.

Advertisement

We make risk-level assessments all the time, perhaps

Read More

Be the first to write a comment.

Leave a Reply

Internet Security

ONSA Coordinates Probe into Binance, Others… Cryptocurrency Firms May Face Billion Dollars Fine

ONSA Coordinates Probe into Binance, Others… Cryptocurrency Firms May Face Billion Dollars Fine The Office of the National Security Adviser (ONSA) in partnershipwith Central Bank of Nigeria (CBN) is coordinating a multi-agency investigation into the operations of Binance and other cryptocurrencies. PRNigeria gathered that the investigation which involved regulatory bodies…

ONSA Coordinates Probe into Binance, Others… Cryptocurrency Firms May Face Billion Dollars Fine The Office of the National Security Adviser (ONSA) in partnershipwith Central Bank of Nigeria (CBN) is coordinating a multi-agency investigation into the operations of Binance and other cryptocurrencies. PRNigeria gathered that the investigation which involved regulatory bodies…
Read More

Continue Reading
Internet Security

BREAKING: “Open Borders Make Food Enter Abeg” – Danny Young Tells Nigerian Government Amid Economic Crisis

Danny Young, a Nigerian singer, recently took to social media to express his thoughts on Nigeria’s present economic situation. On his Instagram page, he highlighted that the primary difficulty for Nigeria was lack of production and exportation. The musician added that people are reluctant to invest in Nigeria due of insecurity…

Danny Young, a Nigerian singer, recently took to social media to express his thoughts on Nigeria’s present economic situation. On his Instagram page, he highlighted that the primary difficulty for Nigeria was lack of production and exportation. The musician added that people are reluctant to invest in Nigeria due of insecurity…
Read More

Continue Reading
Internet Security

Massive Crypto Breach Unveiled: Latest Insights Emerge

In what appears to be the most significant crypto breach of the year, fresh revelations have emerged shedding light on the extensive infiltration into the digital realm. PeckShield, a reputable blockchain security firm, has disclosed a substantial breach impacting FixedFloat, a prominent platform facilitating cryptocurrency and fiat exchanges…

In what appears to be the most significant crypto breach of the year, fresh revelations have emerged shedding light on the extensive infiltration into the digital realm. PeckShield, a reputable blockchain security firm, has disclosed a substantial breach impacting FixedFloat, a prominent platform facilitating cryptocurrency and fiat exchanges…
Read More

Continue Reading
Internet Security

Protests in Delhi a security challenge

Sit-ins and protests in and around the national capital are emerging as a big security challenge for the establishment. According to Delhi Police’s 2022 report, cops handled 6,277 law and order situations relating to protests, demonstrations, meetings and processions, with latest curbs being enforced due to the ongoing farmers’ protest around Delhi-NCR.A former Delhi police

Sit-ins and protests in and around the national capital are emerging as a big security challenge for the establishment. According to Delhi Police’s 2022 report, cops handled 6,277 law and order situations relating to protests, demonstrations, meetings and processions, with latest curbs being enforced due to the ongoing farmers’ protest around Delhi-NCR.A former Delhi police commissioner told ET: “Crowd management has become complex these days mainly due to social media…
Read More

Continue Reading