Home - personal-computers
Keep your System up-to-date
Essential
System updates contain fixes/patches for security issues, improve performance, and sometimes add new features. Install new updates when prompted.
Encrypt your Device
Essential
Use BitLocker for Windows, FileVault on MacOS, or LUKS on Linux, to enable full disk encryption. This prevents unauthorized access if your computer is lost or stolen.
Backup Important Data
Essential
Maintaining encrypted backups prevents loss due to ransomware, theft, or damage. Consider using [Cryptomator](https://awesome-privacy.xyz/security-tools/mobile-apps/cryptomator) for cloud files or [VeraCrypt](https://awesome-privacy.xyz/essentials/file-encryption/veracrypt) for USB drives.
Be Careful Plugging USB Devices into your Computer
Essential
USB devices can pose serious threats. Consider making a USB sanitizer with CIRCLean to safely check USB devices.
Activate Screen-Lock when Idle
Essential
Lock your computer when away and set it to require a password on resume from screensaver or sleep to prevent unauthorized access.
Disable Cortana or Siri
Essential
Voice-controlled assistants can have privacy implications due to data sent back for processing. Disable or limit their listening capabilities.
Review your Installed Apps
Essential
Keep installed applications to a minimum to reduce exposure to vulnerabilities and regularly clear application caches.
Manage Permissions
Essential
Control which apps have access to your location, camera, microphone, contacts, and other sensitive information.
Disallow Usage Data from being sent to the Cloud
Essential
Limit the amount of usage information or feedback sent to the cloud to protect your privacy.
Avoid Quick Unlock
Essential
Use a strong password instead of biometrics or short PINs for unlocking your computer to enhance security.
Power Off Computer, instead of Standby
Essential
Shut down your device when not in use, especially if your disk is encrypted, to keep data secure.
Don't link your PC with your Microsoft or Apple Account
Optional
Use a local account only to prevent data syncing and exposure. Avoid using sync services that compromise privacy.
Check which Sharing Services are Enabled
Optional
Disable network sharing features you are not using to close gateways to common threats.
Don't use Root/Admin Account for Non-Admin Tasks
Optional
Use an unprivileged user account for daily tasks and only elevate permissions for administrative changes to mitigate vulnerabilities.
Block Webcam + Microphone
Optional
Cover your webcam when not in use and consider blocking unauthorized audio recording to protect privacy.
Use a Privacy Filter
Optional
Use a screen privacy filter in public spaces to prevent shoulder surfing and protect sensitive information.
Physically Secure Device
Optional
Use a Kensington Lock to secure your laptop in public spaces and consider port locks to prevent unauthorized physical access.
Don't Charge Devices from your PC
Optional
Use a power bank or AC wall charger instead of your PC to avoid security risks associated with USB connections.
Randomize your hardware address on Wi-Fi
Optional
Modify or randomize your MAC address to protect against tracking across different WiFi networks.
Use a Firewall
Optional
Install a firewall app to monitor and block unwanted internet access by certain applications, protecting against remote access attacks and privacy breaches.
Protect Against Software Keyloggers
Optional
Use key stroke encryption tools to protect against software keyloggers recording your keystrokes.
Check Keyboard Connection
Optional
Be vigilant for hardware keyloggers when using public or unfamiliar computers by checking keyboard connections.
Prevent Keystroke Injection Attacks
Optional
Lock your PC when away and consider using USBGuard or similar tools to protect against keystroke injection attacks.
Don't use commercial "Free" Anti-Virus
Optional
Rely on built-in security tools and avoid free anti-virus applications due to their potential for privacy invasion and data collection.
Periodically check for Rootkits
Advanced
Regularly check for rootkits to detect and mitigate full system control threats using tools like [chkrootkit](https://awesome-privacy.xyz/operating-systems/linux-defenses/chkrootkit).
BIOS Boot Password
Advanced
Enable a BIOS or UEFI password to add an additional security layer during boot-up, though be aware of its limitations.
Use a Security-Focused Operating System
Advanced
Consider switching to Linux or a security-focused distro like QubeOS or [Tails](https://awesome-privacy.xyz/operating-systems/desktop-operating-systems/tails) for enhanced privacy and security.
Make Use of VMs
Advanced
Use virtual machines for risky activities or testing suspicious software to isolate potential threats from your primary system.
Compartmentalize
Advanced
Isolate different programs and data sources from one another as much as possible to limit the extent of potential breaches.
Disable Undesired Features (Windows)
Advanced
Disable unnecessary Windows "features" and services that run in the background to reduce data collection and resource use.
Secure Boot
Advanced
Ensure that Secure Boot is enabled to prevent malware from replacing your boot loader and other critical software.
Secure SSH Access
Advanced
Take steps to protect SSH access from attacks by changing the default port, using SSH keys, and configuring firewalls.
Close Un-used Open Ports
Advanced
Turn off services listening on external ports that are not needed to protect against remote exploits and improve security.
Implement Mandatory Access Control
Advanced
Restrict privileged access to limit the damage that can be done if a system is compromised.
Use Canary Tokens
Advanced
Deploy canary tokens to detect unauthorized access to your files or emails faster and gather information about the intruder.