The First: Not The Last: Reminder of How To Secure Yourself Better Than 99% of the World

Uncategorized Jun 16, 2024
 

Grand Rising, Black Alchemy Audience!

In our rapidly evolving digital age, it’s crucial to shift our perspective and understanding of the technology-centric environment we inhabit. Let's explore how to fortify our digital identities against exploitation.

Why This Matters

Technology is often seen through the lens of convenience and innovation, but it's equally important to understand it from an exploitation perspective. By embracing the following suggestions, you will gain a profound new understanding of your digital identity and the importance of protecting it.

Frequency of Action

This isn't a one-time effort. We must remain vigilant daily, adjusting our defenses as situations evolve—from procurement to implementation and sustainment.

The Strategy

  1. Inventory Your Digital Footprint: Begin by cataloging all electronic devices in your life. This includes cell phones, laptops, email providers, and login portals for social media (Twitter, Instagram, Facebook, Snapchat, bank portals). Anything that offers insights into who you are and what you do, or contains data that could be exploited if it fell into the wrong hands, must be included. This comprehensive inventory forms the foundation of your digital identity.

  2. Implement the DAPE Standard: Adopting the "Deny All Permit By Exception" (DAPE) standard means rejecting the default configurations provided by technology vendors, which often prioritize user convenience over security. Here’s how we achieve this:

    • Strong Passwords: Use passwords with more than 14 characters. Shorter passwords can be easily guessed with readily available tools.

    • Two-Factor Authentication (2FA): Always use 2FA. Given that not everyone can create and regularly update strong passwords, 2FA adds an extra layer of defense. Opt for a hardware dongle over cell phone authentication due to the relative ease of compromising a cell phone.

    • Secure Recovery Emails: Ensure your recovery email addresses are secured with the same rigor as your primary accounts. Cybercriminals often exploit these as weak links.

  3. Stay Updated: Cybercriminals exploit vulnerabilities in outdated systems. Beyond functionality enhancements, updates often patch security holes. Enable automatic updates on all devices, operating systems, and applications to stay protected.

Closing Thoughts

Consistently wearing digital protection is non-negotiable. Equip all your devices with reliable antivirus and anti-malware solutions, keeping their definitions up to date. This fortification is essential to safeguard your digital interactions.

This public service announcement is brought to you by Jasun Tate, co-founder of bits&digits and Chief Alchemist at Exploitation University. Stay vigilant, stay protected.

Close

50% Complete

Two Step

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.