SUD0x0

How to protect yourself from cyber criminals?


October 2, 2022

Photo by Pixabay.


This is an extensive list of tasks that I believe are necessary to perform to secure ourselves from cyber criminals. This is based on my view as a penetration tester. For example, what I look at when I have to conduct a social engineering attack, what I would focus on to attack a particular target, etc. This article has three main parts.

For most of the steps I recommend, you do not need to have a high level of computer science, programming, computer networking, or cyber security knowledge.

Even though I mentioned a couple of brands, services, and vendors in this article, I do not recommend you use them based on my advice. In this article, I use them as examples. It is your responsibility to find the best brands, services, and vendors that suit you. Understand the concept and research more.  Also, you do not have to follow all the steps. Choose what suits you on your own account.

Although I tried to cover all the important areas, please be aware that I may have missed some.


How to prepare your tools and environments?

Devices

Network

Online Presence

Physical Access


Day-to-Day activities

Devices

Network

Please note that even if you logout and change the password of a service after using public Wi-Fi or a shared computer, malicious attackers could still get your data as some web applications do not manage user sessions properly.

Online Presence

Analogue data


What to do if you are a victim of a cyber-attack?

No matter how careful you are, you might get into cyber attacks due to your own fault or others’ faults, such as weak protection offered by companies.


Finally, it is always important to stay up to date. One of the best ways to stay up to date is by investing your time in learning the subject.

Please note that, I may update this article in the future. You can find the versioning details (including changes) of this blog post on the GitHub page.