Personal Cyber Security

Personal Cyber Security
Edited by Sean M. Staffiery © 2018 Alicia Sykes. Licensed under MIT. Forked from Lissy93 at GitHub.




What is being collected?

What is being collected?

Well, pretty much everything you do with your digital devices.
Most significantly third-party cookies and full location records.

Why does this data collection matter?

Hacks are happening all the time

Check out the real-time attack map, which shows live hacks on companies and government organizations at:

Chances are that you've already been hacked

You've probably already been hacked.
Check what details have been leaked, at:



Password Security Basics

  • Use a different passphrase for each account
  • Ensure that each passphrase is strong
    • Ideally 12+ characters
    • Including numbers, symbols, upper and lowercase letters
    • Don't include dictionary words, names or places
    • Replacing o for 0, i for 1, or just adding an ! to the end doesn't help much
  • Try to change all important passwords at least once a year

Password Managers

A password manager is a tool that securely stores and auto-fills your login information.

That means you only ever need to remember one password, and can easily use different, very complex passwords for each site. Most password managers come with Windows, macOS, Android, and iOS apps, as well as a browser extension.
LastPass Screenshot
Password managers are widely agreed to be the best approach for storing & auto-filling secure information.
Check how long it'd take to crack one of your passwords:

2-Factor Authentication

2 Factor Authentication
Two-factor authentication (also known as 2FA) is a type (subset) of multi-factor authentication. It is a method of confirming users' claimed identities by using a combination of two different factors: 1) something they know, 2) something they have, or 3) something they are.

Software Updates

Software Updates
Software Updates: How to stay secure
  • Always install the latest operating system (Windows, macOS, Android, and iOS) updates, when prompted to. Don’t ignore or postpone them
  • Keep all apps and software on both your PC and phone up to date
  • Ensure your antivirus definitions are kept updated, or turn on autoupdate
  • Update your router firmware

Encryption & Backup

Encryption and Backup

Safe Browsing

Safe Browsing


Find a reputable VPN provider, to use on any public, shared, or potentially insecure networks

Complicated lookin VPN diagram
Nice and simple VPN diagram

The importance of HTTPS

Be wary when installing new browser extensions

Use Incognito when on a public or shared device

Consider using a privacy browser

Social Media

Social Media

Smart Phones

Smart Phones

Encrypt your Phone

Protect your phone with a longer PIN or password

Don't grant apps permissions they don't need

Turn off connectivity features you are not using

Remote Erase Stolen Devices

Think before you Click

Think before you Click

Don't Plug in Unknown Flash Drives

Double-check who an email is from, before replying or clicking anything

Don't open attachments from unknown senders

Double check domain names

Shopping Online



The End