A Defensive Computing Checklist

HarborFront

Level 71
Thread author
Verified
Top Poster
Content Creator
Oct 9, 2016
6,014
This is a list of both things to be aware of and specific defensive steps that we can take in response to the common threats of 2019. No list like this can ever be complete, nor would anyone want it to be complete as that list would never end.

SECTIONS:

Email,
Understanding Domain Names,
Passwords,
Verified Website Identity,
Secure Websites,
Two Factor Authentication,
Phone calls,
Identity Theft,
SIM Swaps,
Web Browsers,
Public Wi-Fi,
Networking,
Voice Assistants (a.k.a. Smart Speakers),
Location Tracking,
Mobile OS Spying,
Mobile Scanning and Sharing,
Desktop Operating System,
iOS and Android,
Chrome OS,
Encryption,
Facebook,
Amazon,
Google,
SPAM Texts,
Scam Voices,
Twitter,
NAS,
TV Watches You,
One Offs,
Extra Credit,
Reading List,
The Competition

Article is too long to post. Please read link below

 
Last edited:
9

93803123

Or in a cave with electronic devices but no connectivity:p


Finger painting with mud paint. Like the Neanderthals did on cave walls. They didn't have PCs and mobile phones. They didn't have paint brushes. They had no ink. Nor online porn. It didn't kill them. And none of them had to go to gamer, software addict, digital device rehabs.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top