Information Security Best Practices Compilation

Updated 28 Jan 2023

Recommendations

  • Keep software up to date.

Don’t use an unsupported version of macOS, Windows, (8.1 and earlier), or anything else (iOS, Android, Linux). Don’t use a version of Android which is no longer receiving monthly security patches.

If your device does not support a new version, try your preferred flavor of Linux on desktops or laptops, and LineageOS (if supported) on your Android phone. You don’t really have alternatives for iPhone, but one thing Apple does quite well is providing long software support, so it is likely you are due for an upgrade anyway.

  • Use a (secure) password manager

    • Online passsword managers

      Bitwarden

      A FOSS password manager. Can be self-hosted if desired. Free and premium tiers.

      1Password

      Not FOSS, but has regular audits and works closely with password cracking community. In this respect it is better than Bitwarden. Starts at $4 a month, no free tier.

    • KeePass (FOSS, A file format, compatible with many clients)

      KeePass XC Windows/macOS/Linux (free)

      KeePass DX Android (free)

      KeePassium iOS (paid)

Don’t use LastPass.

Evaluate password managers based on their handling of sensitive data, transparency with regular third-party audits, cryptography, and competency in response to security incidents when they happen. (These guidelines are also helpful when evaluating VPNs).

  • Use a strong passphrase on your password manager

(And other accounts too)

  • VPNs are not a security or privacy tool. They are for circumventing censorship.

They can be useful tools, however. Mullvad is one of the best. Mozilla VPN uses their servers as well. ProtonVPN is also a good option, especially if you already use ProtonMail.

  • Use two-factor authentication (2fa)

Time-based One Time Password (TOTP, the one with 6 numbers that rotate on a timer) is the most common standard. If something says it supports Google Authenticator or Authy this is what it supports. Aegis for Android, Ravio on iOS. Only use sms for two factor when there is no other option, and even then use a VOIP number such as…

  • Google Voice

Yes, they’ll use the data to advertise you, but you might trust them more than your cell provider and you can prevent someone else from getting your cell number by bribing an underpaid cell service employee.

  • Additional Notes Regarding SMS

SMS is one of the least secure forms of online communication avaliable. Thus it shoudld not be trusted with anything sensitive. In many cases, not using two-factor authentication at all would be more secure. Refer to this podcast episode for some more information on sim swap attacks. For communication purposes, it is fine to use but is unencrypted and any information sent through it should be treated as publicly available.

  • Use a privacy-respecting open source browser such as Firefox or Brave

  • Full volume encryption on your devices

In macOS you can use FileVault (built in), on Windows Bitlocker (also built in, but only on Windows 10/11 Pro), on Linux usually you can enable it in the installer. Encryption is enabled by default in iOS. For Android, as of Android 7, the emphasis is File Based Encryption (which is enabled by default in reputable devices). As of Android 10 it is required for all devices running Android.

  • Secure open-source text/voice messaging Such as Signal or Session

  • Use Cloudflare’s 1.1.1.1 DNS on your routers and devices

  • Use a secure email address from a provider for whom you are not the product (ie usually paid). ProtonMail and Tunatoa are good

  • Monitor your accounts to see when (not if) they get compromised.

  • If you don’t need it, don’t install it.  If you’re not using it, uninstall it.  If you didn’t ask for it, don’t click on it.

  • Any recovery method is an attack vector

An attacker need only break the weakest link in the chain. This is particularly relevant in the case of a password hint or security questions. There is no good reason to use a password hint (insert article). Security questions based on real facts about you are very insecure, because much of that information is freely avaliable or not hard to find. If you need to use security questions, treat them as another password feild. Secondly, if an account can be recovered via email or sms without knowing the password and/or having access to a 2fa device, the security of the account is only the security of the email or sms. And a final note, when setting up 2fa you will get recovery codes of some sort. Store these safely, as again they are a recovery method by which an attacker could gain access to your account. (They are also how you gain access if you forget your login details or lose your second factor device)

Explainers and how-tos for the above

2FA/MFA: What they are and how to use them

EFF article

Tom Scott video

How to: Enable Two-factor Authentication

Passphrase

https://www.useapassphrase.com

xkcd 936

Don’t pass on the new NIST password guidelines

Diceware

EFF Dice-Generated Passphrase

Password Managers

Some information, and pros/cons of using them (and why it is worth it to do so).

EFF

https://lock.cmpxchg8b.com/passmgrs.html

Miscellaneous useful resources