- Oct 9, 2016
- 6,196
This is a list of both things to be aware of and specific defensive steps that we can take in response to the common threats of 2019. No list like this can ever be complete, nor would anyone want it to be complete as that list would never end.
SECTIONS:
Email,
Understanding Domain Names,
Passwords,
Verified Website Identity,
Secure Websites,
Two Factor Authentication,
Phone calls,
Identity Theft,
SIM Swaps,
Web Browsers,
Public Wi-Fi,
Networking,
Voice Assistants (a.k.a. Smart Speakers),
Location Tracking,
Mobile OS Spying,
Mobile Scanning and Sharing,
Desktop Operating System,
iOS and Android,
Chrome OS,
Encryption,
Facebook,
Amazon,
Google,
SPAM Texts,
Scam Voices,
Twitter,
NAS,
TV Watches You,
One Offs,
Extra Credit,
Reading List,
The Competition
Article is too long to post. Please read link below
defensivecomputingchecklist.com
SECTIONS:
Email,
Understanding Domain Names,
Passwords,
Verified Website Identity,
Secure Websites,
Two Factor Authentication,
Phone calls,
Identity Theft,
SIM Swaps,
Web Browsers,
Public Wi-Fi,
Networking,
Voice Assistants (a.k.a. Smart Speakers),
Location Tracking,
Mobile OS Spying,
Mobile Scanning and Sharing,
Desktop Operating System,
iOS and Android,
Chrome OS,
Encryption,
Facebook,
Amazon,
Google,
SPAM Texts,
Scam Voices,
Twitter,
NAS,
TV Watches You,
One Offs,
Extra Credit,
Reading List,
The Competition
Article is too long to post. Please read link below
DefensiveComputingChecklist.com Table of Contents
Full Table of contents for DefensiveComputingChecklist.com
Last edited: