See all articles


Comprehensive Security Guidelines: Protecting Your Digital Life

In an era where our lives are increasingly digital, securing your online presence is more critical than ever. Cyber threats are evolving, and it’s essential to stay ahead by implementing robust security measures. This comprehensive guide will walk you through practical steps to enhance your digital security, covering everything from password management to safeguarding your crypto assets.

Passwords & Two-Factor Authentication (2FA)

Use a Password Manager

A password manager securely stores your passwords and can generate strong, unique passwords for each of your accounts.

Recommended Password Managers:

  • 1Password

  • Bitwarden

Best Practices:

  • Unique Passwords: Never reuse passwords across different services.

  • Password Length: Use at least 16 characters with a mix of letters, numbers, and symbols.

  • Master Password: Create a strong passphrase for your password manager (e.g., “CorrectHorseBatteryStaple”).

  • Recovery Kit: Save your recovery information offline — either on an encrypted USB drive or printed and securely stored.

  • Avoid Built-in Browsers’ Password Managers: Do not use password storage options provided by browsers like Chrome or Safari.

  • DO NOT store passwords in plain text on your computer or on your phone (apple notes, notion, slack, etc)

  • DO NOT store credit card info in web browsers.

Enable Two-Factor Authentication (2FA)

Adding a second layer of security makes it significantly harder for unauthorized users to access your accounts.

2FA Methods (Most Secure to Least Secure):

  • YubiKey Hardware Authentication

  • Authenticator Apps (e.g., YubiKey Authenticator)

  • Password Manager’s 2FA

  • SMS-based 2FA (Avoid if Possible)

Why Avoid SMS 2FA?

  • Susceptible to SIM-swapping attacks.

  • Easily compromised if your phone is lost or stolen.

YubiKeys: Hardware-Based Security

What is a YubiKey? A YubiKey is a physical security key that provides hardware-backed authentication.

Benefits:

  • Enhanced Security: Requires physical access, making remote attacks nearly impossible.

  • Ease of Use: Compatible with many services like Google, Slack, and AWS.

Setting Up Your YubiKeys

  • Insert the YubiKey and open YubiKey Manager.

  • Navigate to Applications > FIDO2 and set a PIN (at least 8 digits).

  • For consistency, use the same PIN for both keys.

4. Install the YubiKey Authenticator App, which is available for desktop and mobile use. 5. Register Both YubiKeys with Your Accounts: When setting up 2FA, add both keys to each account to ensure you have a backup.

Device Security

Our devices are also weak spots for security. In addition to the following setup steps, it’s recommended that you run antivirus software to ensure that your devices are not compromised. We recommend BitDefender: https://www.bitdefender.com/en-us/consumer/ultimate-security

Mobile Devices

Laptops

  • Use a Secure Password: It should be unique and not used elsewhere.

  • Enable Disk Encryption: For Mac: Use FileVault.

  • Enable “Find My”: Useful for locating your device remotely.

  • Set Screen Time Restrictions: Prevent unauthorized changes to system settings.

Data Storage

  • Avoid Cloud Storage for Sensitive Data: Do not store sensitive data, such as social security numbers or recovery keys, in the cloud.

  • Use Encrypted Flash Drives: Store sensitive data on AES-encrypted USB drives.

  • Recommended Devices: Kingston IronKey & Apricorn Secure Key.

Network & Connectivity

Public Wi-Fi

  • Use a VPN at All Times: Encrypts your internet connection.

  • Recommended VPNs: NordVPN & ExpressVPN

Home Wi-Fi

  • Strong Wi-Fi Password: Use a randomly generated password of at least 14 characters.

  • Secure Router Access: Change default administrator passwords.

  • Regular Updates: Keep your router’s firmware up to date.

Crypto Wallets

Use Hardware Wallets

Recommended Hardware Wallets: Ledger & Trezor

Why Hardware Wallets?

  • Offline Storage: Keeps your private keys off the internet.

  • Reduced Risk: Less susceptible to malware and phishing attacks.

Seed Phrase Security

  • Never Store Digitally: Do not take photos or store your seed phrases on any digital device.

  • Physical Storage: Write down your seed phrase on paper or use metal backup solutions.

  • Metal Backup Options: CRYO Crypto Seed Storage & Keystone Tablet Punch

Advanced Tips

  • Use Gnosis Safe for High-Value Assets: Multi-signature wallet for added security. Learn more: Gnosis Safe

  • Set Up a Decoy Wallet: Create a secondary wallet with a small amount of assets. This is useful if under duress to reveal your wallet.

Security-Focused Wallets

Common Attack Responses

Malicious Signature Attack

What is it? An attacker tricks you into signing a transaction that grants them access to your assets.

Prevention:

  • Use Security-Focused Wallets: They provide detailed information about transactions.

  • Be Cautious with Links: Never click on suspicious links or connect your wallet to untrusted sites.

  • Verify Before You Sign: Always double-check transaction details.

Response Plan:

  • Revoke Permissions: Use Revoke.cash to revoke any unauthorized approvals.

Seed Phrase Attack

What is it? Your seed phrase is compromised, giving attackers full control over your wallet.

Prevention:

  • Never Share Your Seed Phrase: No legitimate service will ask for it.

  • Secure Physical Storage: Keep your seed phrase in a secure, hidden location.

Response Plan:

  • Assume Device Compromise: Use a secure, clean device.

  • Create a New Wallet: With a new seed phrase.

  • Transfer Assets Immediately: Move all assets to the new wallet.

  • Update Smart Contracts: Transfer ownership if applicable.

Conclusion

Security is not a one-time setup but an ongoing process. Implementing these practices makes it significantly more challenging for attackers to compromise your digital assets. Remember, while no system is entirely foolproof, the goal is to reduce risk as much as possible.

Disclaimer: The information provided in this blog post is for educational and informational purposes only.