This page contains basic overviews and guides explaining personal cyber security and risk management.
If you've never worried about this stuff or been a "tech person", you may feel overwhelmed. It's easier than you think if you let it be, and you can get extra help if you need it.
The number one thing to understand about cyber security (and any security in general) is that 100% safe is not possible, nor is it the goal of risk management.
Managing risks is about ensuring that the things important to you are harder to access than it's worth for the average person or whatever entity you may be worried about.
It's about
The number one thing to understand about cyber security (and any security in general) is that 100% safe is not possible, nor is it the goal of risk management.
Managing risks is about ensuring that the things important to you are harder to access than it's worth for the average person or whatever entity you may be worried about.
It's about being aware of what you can and preparing appropriately without making your life impossible in the process.
That means preparing for moments when security is breached, and accepting that you can do everything you're supposed to and still fall victim to some bullshit.
But our best chance of staying safe is proper risk management.
Encryption is the only reason why privacy is possible on the internet. Without getting too technical, it's the process of encoding your data so that only you and the people you share it with can see it.
Given recent developments, it's difficult to trust any centralized technical services to keep your data safe, so choosing services where e
Encryption is the only reason why privacy is possible on the internet. Without getting too technical, it's the process of encoding your data so that only you and the people you share it with can see it.
Given recent developments, it's difficult to trust any centralized technical services to keep your data safe, so choosing services where end-to-end encryption (E2EE) is provided is highly recommended.
There are some basic tools that you always want to be using for online communications in 2025:
VPN: A tool that encrypts and hides your network traffic from your internet provider and whoever else may be snooping. NordVPN is recommended.
Messaging: Texting and basic social media messaging services are not secure and used to market to you. Using an E2EE messaging app keeps you safer.
Signal is recommended.
Despite mainstream media's depictions of Mr. Hackerman as a dude locked in his basement that can break into anything just by typing a few lines of code, most hacking is actually social engineering.
Social engineering is when a hacker manipulates people to gain access to systems they shouldn't have access to.
Hackers aren't afraid to prey on
Despite mainstream media's depictions of Mr. Hackerman as a dude locked in his basement that can break into anything just by typing a few lines of code, most hacking is actually social engineering.
Social engineering is when a hacker manipulates people to gain access to systems they shouldn't have access to.
Hackers aren't afraid to prey on our fears, desires, generosity, or ignorance. Anything that makes us predictable and gullible makes us a target for social engineering.
Common attacks include phishing and honey trapping.
While there are some tools like advanced email filters and adblock that can help, the best deterrent of social engineering is you being more aware of suspicious behavior and not going along with common scams.
Security isn't about avoiding all risks and trying to control all outcomes. It's about being aware of the risks, being aware of prevention options, being aware of what to do in a breach, and being aware that no matter what is happening, freaking out doesn't help the situation.
Collective security can only accommodate so much for careless individuals. If you blindly trust everyone and everything and assume nothing bad can happen to you, you not only put yourself at risk, but anyone who associates with you as well. Your ignorance may expose others in ways your ignorance doesn't allow you to foresee.
If something seems suspicious and has the potential to cause you harm, don't investigate. Assume it is suspicious and dangerous and respond accordingly based on whatever type of apparent threat that it is. Once in a safer situation, you can see if there's any way you can confirm what occurred.
Every piece of "smart" tech is logging data which can potentially be used as evidence in court.
When using social media services, posts and DMs alike can be accessed by company staff and law enforcement upon request.
Be mindful or be exposed.
If you post publicly on social media, there are a handful of pre-made commands that someone needs to use to scrape all your public info.
The old internet is dead. I wouldn't recommend a public presence unless you're a creator or you're doing community outreach.
The internet isn't magic, and the infrastructure that supports it in the US isn't in the best of shape.
Not only that, but the rapid political change that the world is experiencing may bring unwanted disconnections.
We must plan for outages.
This one should be basic by now. You need long, complex passwords and should be using a password manager across all your devices so you can be as safe as possible without having to worry about losing access.
Multi-factor authentication (MFA) is also a must now. This is when a text , security token, or some other type of verification is required in addition to your password.
EVERY SINGLE ACCOUNT that has your private or payment information should be secured.
This one is free as fuck but people ignore it because they don't want to reboot their phone or computer. All device software and apps should be updated regularly in general and especially after a new vulnerability is exposed and patched.
There are some services that are much, much better than others in terms of protecting your privacy. For starters, I recommend using Brave Browser and avoiding traditional search engines like google. Regardless of the services you use, us a VPN.
All communications should be end-to-end encrypted, and any data at rest (files and devices) should be encrypted as well.
If you have any data that's important to you, use a cloud backup and a physical one. In addition to the original storage. 3 total. Bare minimum.
It's up to you how seriously you take this one, but you want to avoid for-profit solutions and you want to use open-source as much as possible. You should realistically be off all non-work related social media, or at the very least you should have settings be I'll being posting guides on breaking up with big tech soon.
Once you have the technical side of your cyber security managed, you just need to maintain it and avoid any social engineering that prays on your non-technical skills.
We can walk through any and all cyber security protocols that you'd like together. I have over a decade of experience helping users of all technical levels, I promise to be nice and make sure that all your concerns are addressed as much as possible. Message me on Signal to coordinate.
Whether for personal or organizational purposes, I can help you accomplish any security goals you may have, or at the very least I can point you in the right direction.
Through governance.company, I can help you build entire governance and risk management systems for any organization or personal purposes.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.