DEV Community

Cover image for Healthy habits for good cybersecurity

Healthy habits for good cybersecurity

Victoria Drake on December 26, 2019

In a similar fashion to everyone getting the flu now and again, the risk of catching a cyberattack is a common one. Both a sophisticated social eng...
Collapse
 
hozefaj profile image
Hozefa

Few other things I recommend,

  1. Not using same password for all accounts. Use something like lastpass or 1password or even browsers native password utility.
  2. If using Google, Facebook or Twitter to log in to different websites, view the permissions that you give and time to time take stock of the list. Revoke the permissions for websites/apps no longer needed.
Collapse
 
thatblairguy profile image
That Blair Guy

Yes on the password managers! Particularly their ability to generate and store random strings as passwords.

I'll admit to not checking recently, but the password tools built into the browser only store passwords, they don't help you create good ones.

(I'd love to be corrected on that one, particularly with a mainstream browser, as convincing people to install a third party password manager is an uphill battle.)

Collapse
 
hozefaj profile image
Hozefa

I know Safari on Mac can create passwords. Not sure if other browsers have implemented that functionality, but I presume they will soon.

The advantage of using a password manager that it will help on your phone as well. If you are using iPhone then iOS13 allows that natively. But for android, this will be useful.

safari password

Thread Thread
 
thatblairguy profile image
That Blair Guy

Nice! Firefox and Chrome include functionality to sync bookmarks, saved passwords, etc between multiple computers. If they add generation of secure passwords, that would be a huge step toward eliminating the "P@ssword123" problem.

Collapse
 
karfau profile image
Christian Bewernitz

I think this article is worth translating into as many languages as known on this platform, so we can share them with non English speaking friends and family.

I will try to do that for German and reply to this comment to cross link

Collapse
 
victoria profile image
Victoria Drake

Amazing! Thank you so much for helping to spread the word.

Collapse
 
karfau profile image
Christian Bewernitz

Is there a markdown source of the post somewhere other than github.com/victoriadrake/victoriad... ?

Collapse
 
codedgar profile image
codedgar

I loved this article! Is really sad how much people lose money thanks to scams and dumb security breaches on their computers.

I also think that spreading the word can help a lot others to stop falling into these traps. For example, my mother and grandma don't open weird links, weird emails or anything that seems sketchy, and they also keep their social media accounts private :)

Collapse
 
victoria profile image
Victoria Drake

Sounds like you’re doing a great job already! :) Keep it up!

Collapse
 
thomasjunkos profile image
Thomas Junkツ

Thank you very much for this good advice!

Number 3 I see is naturally going away. If I look at my kids: The barely do not even know what a USB-Stick is nor what it is good for. My kids asscociate "storing portable information" with "there is a cloud service to do that" - which of course is its own field ;)

Additionally I try to build awareness for mobile devices and cloud:

  • Live so as you knew your mobile device is hacked (and do e.g. no banking on it)

  • When putting things in the cloud think of them as being tomorrow publicly available. If that's okay for you - put it there.

E.g. I have a bunch of roleplaying game material as PDF stored in the cloud. It saves me GB of local data. And when my account is compromised: Have fun with playing RPGs - it doesn't bother me.

Collapse
 
binarylife profile image
Travis Dean

OK, this is great advice if you're picking up that "flash drive" you found in the parking lot that's actually a HID-input device that's gonna drop a reverse shell in .2 seconds flat.

But basic USB drives? Given sane defaults like... Don't autoexecute whatever the drive asks to do, what should be one's security stance? Granted, there will always exist vulns that may result in compromise anyway, like that old .lnk bug in Windows (and I'm sure there are similar vectors across platforms).

Collapse
 
karfau profile image
Christian Bewernitz

German translation is ready: dev.to/karfau/gute-gewohnheiten-fu...
Maybe it will change a bit over time due to proof reading or further suggestions.