Comprehensive Security Guidelines: Protecting Your Digital Life
In an era where our lives are increasingly digital, securing your online presence is more critical than ever. Cyber threats are evolving, and it’s essential to stay ahead by implementing robust security measures. This comprehensive guide will walk you through practical steps to enhance your digital security, covering everything from password management to safeguarding your crypto assets.
Passwords & Two-Factor Authentication (2FA)
Use a Password Manager
A password manager securely stores your passwords and can generate strong, unique passwords for each of your accounts.
Recommended Password Managers:
1Password
Bitwarden
Best Practices:
Unique Passwords: Never reuse passwords across different services.
Password Length: Use at least 16 characters with a mix of letters, numbers, and symbols.
Master Password: Create a strong passphrase for your password manager (e.g., “CorrectHorseBatteryStaple”).
Recovery Kit: Save your recovery information offline — either on an encrypted USB drive or printed and securely stored.
Avoid Built-in Browsers’ Password Managers: Do not use password storage options provided by browsers like Chrome or Safari.
DO NOT store passwords in plain text on your computer or on your phone (apple notes, notion, slack, etc)
DO NOT store credit card info in web browsers.
Enable Two-Factor Authentication (2FA)
Adding a second layer of security makes it significantly harder for unauthorized users to access your accounts.
2FA Methods (Most Secure to Least Secure):
YubiKey Hardware Authentication
Authenticator Apps (e.g., YubiKey Authenticator)
Password Manager’s 2FA
SMS-based 2FA (Avoid if Possible)
Why Avoid SMS 2FA?
Susceptible to SIM-swapping attacks.
Easily compromised if your phone is lost or stolen.
YubiKeys: Hardware-Based Security
What is a YubiKey? A YubiKey is a physical security key that provides hardware-backed authentication.
Benefits:
Enhanced Security: Requires physical access, making remote attacks nearly impossible.
Ease of Use: Compatible with many services like Google, Slack, and AWS.
Setting Up Your YubiKeys
Purchase Two YubiKey 5C NFC Devices: YubiKey 5C NFC
Install YubiKey Manager: Download from YubiKey Manager Download Page.
Configure Each YubiKey:
Insert the YubiKey and open YubiKey Manager.
Navigate to Applications > FIDO2 and set a PIN (at least 8 digits).
For consistency, use the same PIN for both keys.
4. Install the YubiKey Authenticator App, which is available for desktop and mobile use. 5. Register Both YubiKeys with Your Accounts: When setting up 2FA, add both keys to each account to ensure you have a backup.
Device Security
Our devices are also weak spots for security. In addition to the following setup steps, it’s recommended that you run antivirus software to ensure that your devices are not compromised. We recommend BitDefender: https://www.bitdefender.com/en-us/consumer/ultimate-security
Mobile Devices
Set a Strong Passcode: Use an alphanumeric passcode at least 8 characters long.
Enable Screen Time Restrictions: Go to Settings > Screen Time and set a separate passcode. This prevents the thief from changing your iCloud password and locking you out of your data, even if they somehow managed to guess your passcode or forced you into giving it to them:
https://tidbits.com/2023/02/26/how-a-thief-with-your-iphone-passcode-can-ruin-your-digital-life/
Enable “Find My”: Helps locate your device if it’s lost or stolen.
Enable 2FA for Apple ID: Adds an extra layer of security to your account.
Create a recovery key if you want.
Laptops
Use a Secure Password: It should be unique and not used elsewhere.
Enable Disk Encryption: For Mac: Use FileVault.
Enable “Find My”: Useful for locating your device remotely.
Set Screen Time Restrictions: Prevent unauthorized changes to system settings.
Data Storage
Avoid Cloud Storage for Sensitive Data: Do not store sensitive data, such as social security numbers or recovery keys, in the cloud.
Use Encrypted Flash Drives: Store sensitive data on AES-encrypted USB drives.
Recommended Devices: Kingston IronKey & Apricorn Secure Key.
Network & Connectivity
Public Wi-Fi
Use a VPN at All Times: Encrypts your internet connection.
Recommended VPNs: NordVPN & ExpressVPN
Home Wi-Fi
Strong Wi-Fi Password: Use a randomly generated password of at least 14 characters.
Secure Router Access: Change default administrator passwords.
Regular Updates: Keep your router’s firmware up to date.
Crypto Wallets
Use Hardware Wallets
Recommended Hardware Wallets: Ledger & Trezor
Why Hardware Wallets?
Offline Storage: Keeps your private keys off the internet.
Reduced Risk: Less susceptible to malware and phishing attacks.
Seed Phrase Security
Never Store Digitally: Do not take photos or store your seed phrases on any digital device.
Physical Storage: Write down your seed phrase on paper or use metal backup solutions.
Metal Backup Options: CRYO Crypto Seed Storage & Keystone Tablet Punch
Advanced Tips
Use Gnosis Safe for High-Value Assets: Multi-signature wallet for added security. Learn more: Gnosis Safe
Set Up a Decoy Wallet: Create a secondary wallet with a small amount of assets. This is useful if under duress to reveal your wallet.
Security-Focused Wallets
Rabby: rabby.io
Rainbow: rainbow.me
Common Attack Responses
Malicious Signature Attack
What is it? An attacker tricks you into signing a transaction that grants them access to your assets.
Prevention:
Use Security-Focused Wallets: They provide detailed information about transactions.
Be Cautious with Links: Never click on suspicious links or connect your wallet to untrusted sites.
Verify Before You Sign: Always double-check transaction details.
Response Plan:
Revoke Permissions: Use Revoke.cash to revoke any unauthorized approvals.
Seed Phrase Attack
What is it? Your seed phrase is compromised, giving attackers full control over your wallet.
Prevention:
Never Share Your Seed Phrase: No legitimate service will ask for it.
Secure Physical Storage: Keep your seed phrase in a secure, hidden location.
Response Plan:
Assume Device Compromise: Use a secure, clean device.
Create a New Wallet: With a new seed phrase.
Transfer Assets Immediately: Move all assets to the new wallet.
Update Smart Contracts: Transfer ownership if applicable.
Conclusion
Security is not a one-time setup but an ongoing process. Implementing these practices makes it significantly more challenging for attackers to compromise your digital assets. Remember, while no system is entirely foolproof, the goal is to reduce risk as much as possible.
Disclaimer: The information provided in this blog post is for educational and informational purposes only.