PANIC BUTTON!
Document Disposal
Shred important or sensitive documents to prevent unauthorized access to potentially sensitive information.
Sensitive Information Storage
Avoid storing usernames, passwords, or other sensitive data on sticky notes or in easily accessible areas.
Secure Payment Methods
Use tap-to-pay instead of swiping or entering your credit card PIN whenever possible. If you must swipe or enter your PIN, ensure you trust the location.
Secure Document Storage
Keep sensitive documents in a secure location. For documents you need to bring with you use a portable carry-on (such as a briefcase) with a lock or lock support, consider adding a tracker or more to this portable carry-on so you can recover it if it's stolen or lost.
Credit Freeze
Freeze your credit with one of these major credit bureaus: Equifax, Experian, and TransUnion. This prevents unauthorized use but requires you to unfreeze your credit for your own transactions. However, it will prevent others from placing transactions under your name fraudulently. These credit bureaus will also allow you to monitor your credit and other associated information.
Public Wi-Fi and Charging Precautions
Avoid using public Wi-Fi and public chargers, as they increase the risk of malware and other attacks.
If you must use a public charger consider getting a data blocker which will prevent data from going through it and will only allow power. You can also consider getting a data blocking cable which will do the same thing.
Beware of random USBs and Charging Cables
Stay cautious with random USB flash drives or charging cables to avoid potential malware attacks. There are threat actors that leave these devices in public locations in the hopes that someone will pick them up and plug them into their device there by granting the threat actor unauthorized access to your personal devices.
Webcam Security
Cover or physically remove your personal device's webcam to prevent unauthorized surveillance.
Microphone Security
Consider removing your microphone to eliminate the risk of misuse. However if improperly removed you may damage your device, so only do this under the supervision of an expert or otherwise just have an expert do this themselves.
Sensitive Document Sharing
When publishing or sending sensitive documents, mask sensitive information or refrain from sending them altogether. Always get advice from lawyers and legal experts when it comes to the sharing and publicizing of legal documents.
Communication Security
Use an eSIM instead of a physical SIM card to enhance privacy and reduce tracking risks that come from your physical SIM sending signals to cellular towers. Using an eSIM service may also allow you to have multiple phone numbers which may be helpful for some individuals.
Personal Hotspot Usage
Use a personal hotspot instead of your phone’s cellular data or free public Wi-Fi will allow better security than alternative services.
Account Security
Use physical security devices like passkeys alongside traditional passwords for enhanced account security.
Screen Privacy
Utilize privacy screen protectors/filters to ensure that only you can view what's on your screen. However, a privacy screen protector/filter limits viewing angles and does not completely remove the possibility of people viewing your device screen. For most people this device will not make much a difference in security and privacy.
Home Security
Install electronic locks to deter criminals and make it tougher for unauthorized access and consider using a mobile device as a fob for unlocking doors.
CCTV Installation
Install wired CCTV (Closed Circuit Television) systems to monitor your home. Make sure to conduct thorough research as CCTV can be an extremely powerful security tool, but it can also be used against you for nefarious purposes.
Intrusion Detection Systems
Implement various intrusion detection systems like:
Door/Window Position Sensors
Ultrasonic Motion Detection
Glass Break Sensors
Pressure Sensors
Passive Infrared (PIR) Motion Detection
Radio Frequency (RADAR) Perimeter Intrusion Detection
Physical Barriers
Install physical barriers such as fences, security gates, bollards, and vehicle entry barriers to secure your perimeter and deter criminals.
Faraday Bags
Use Faraday bags to store devices, credit cards, fobs, car keys, etc. This will prevent them from sending or receiving signals that could be intercepted or possibly malicious.
Radio Frequency Detectors
Utilize radio frequency detectors to find hidden surveillance devices in places like hotel rooms and public restrooms that are publicly accessible and potentially unsafe
Camera Detection Devices
Consider using specialized camera detectors, which can more effectively identify hidden cameras based on their radio frequencies or materials.
White Noise Emitters
Employ white noise generators to disrupt eavesdropping recording devices, but use them cautiously around individuals with sensitive ears.
Smart Card Access
Use smart cards for secure access to sensitive areas, this heightens security and hinders criminals.
Hardware Firewalls
Install hardware firewalls to add an extra layer of protection beyond software firewalls.
Network Attached Storage (NAS) with Encryption
Utilize NAS devices that offer built-in encryption for secure local data storage and backups.
Secure Phones
Use specialized secure phones with enhanced encryption and security features for sensitive communications. Consider using 3rd party open source secure communication services as well.
Encrypted Radios
Use encrypted radios for secure communications, though these are mainly utilized by organizations like law enforcement and will not be useful to average individuals.
Cable Locks
Employ cable locks for devices to prevent theft and unauthorized removal.
Secure USBs
Consider getting an encrypted USB that has a built-in keypad that you must type in the PIN before you can access the unencrypted USB flash drive contents. This device protects your files and will prevent unauthorized access to them in the event that your USB is lost or stolen.
Keep Valuables Out of Sight
This is an extremely easy tip but it is extremely effective. Keep your valuables such as your phone or credit card out of sight. This way burglars and other criminals will have less reason to target your home
Disabling Wi-Fi and Bluetooth
When not necessary disable Bluetooth and wi-fi to prevent your device from connecting to places that could potentially be malicious and could also cause unauthorized access to your device.
Using Character Passwords
If your device supports this, changing the default number PIN to a character password will allow more options and more security for your device.
Enabling 2FA For Your Devices
Even the strongest passwords can be compromised or defeated, thus making sure your device has additional layers of security is vital. If your device supports multiple forms of unlocking your device, enable it and your device security will increase a hundredfold.
Privatizing Social Media Accounts
Consider privatizing your personal social media accounts so that the potentially dangerous information you share on your social media account stays within a mostly closed circle of your trusted followers.
Restricting Device Carry
Restricting where you bring your personal devices will protect sensitive areas, conversations, information, etc from getting leaked or compromised. As your device is a potential weapon against you as it has cameras, microphones, and trackers it's best that you bring your device only to places where it couldn't obtain sensitive information or data.
Purchases
Criminals and other burglars can be easily attracted to your house if they see many large boxes in your recycling bin. Concealing these boxes will lessen the attention criminals give to your house, you may also want to rip any labels or stickers that say the product or product details.
Home Concealment
There are services out there that allow criminals to easily view your house from anywhere in the world without having to leave their own homes. We're talking about maps, services like Google Maps allow users to see homes and landscapes anywhere and everywhere as long as they have a computer and internet connection. These services allow users to blur their homes and utilizing this will protect your home from criminals as they will no longer be able to scope out your house and discover your security systems and house layout.
Additionally, realtor sites have images of homes online publicly available for anyone to view. This can allow criminals to view parts of your house that are not visible from map services and will also allow criminals to view the interior of a home as well. Thus you should consider requesting the removal of these images from realtor sites.
Home Security Methods
https://www.safewise.com/blog/10-simple-ways-to-secure-your-new-home/
Archived version (if actual version doesn't work): https://web.archive.org/web/20241001142139/https://www.safewise.com/blog/10-simple-ways-to-secure-your-new-home/