Adds contents

pull/4/head
Alicia Sykes 2020-01-04 20:28:53 +00:00 committed by GitHub
parent 9b2fa5dc3c
commit 76c540dcbe
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 23 additions and 4 deletions

View File

@ -1,5 +1,20 @@
# Personal Security Checklist # Personal Security Checklist
> A curated checklist of tips to protect your dgital security and privacy
## Contents
- [Passwords](#passwords)
- [2 Factor Authentication](#2-factor-authentication)
- [Browsing the Web](#browser-and-search)
- [VPN](#vpn)
- [Email](#emails)
- [Social Media](#social-media)
- [Devices](#your-devices)
- [SMS and Calls](#sms-and-calls)
- [Routers](#your-router)
- [Operating Systems](#operating-systems)
## Passwords ## Passwords
Most reported data breaches are caused by the use of weak, default or stolen passwords (according to [this Verizon report](http://www.verizonenterprise.com/resources/reports/rp_dbir-2016-executive-summary_xg_en.pdf)). Massive amounts of private data have been, and will continue to be stolen because of this. Most reported data breaches are caused by the use of weak, default or stolen passwords (according to [this Verizon report](http://www.verizonenterprise.com/resources/reports/rp_dbir-2016-executive-summary_xg_en.pdf)). Massive amounts of private data have been, and will continue to be stolen because of this.
@ -138,13 +153,17 @@ Although Windows and OS X are easy to use and convenient, they both are far from
--- ---
Thank you for taking the time to browse this list, I hope the content here was useful. If you have any feedback, feel free to email me at alicia@as93.net. I owe a lot of thanks others who've conducted research, written papers, developed software all in the interest of privacy and security. Full attributions and referenses found in [`ATTRIBUTIONS.md`](/ATTRIBUTIONS.md). ## Notes
Contributions are welcome, to suggest an edit you can [open an issue](https://github.com/Lissy93/personal-security-checklist/issues/new/choose), or upload changes by [opening a PR](https://github.com/Lissy93/personal-security-checklist/pull/new/master). Please ensure you follow the contributing guidelins in [`CONTRIBUTING.md`](/.github/CONTRIBUTING.md) *Thank you for taking the time to browse this list, I hope the content here was useful. If you have any feedback, feel free to email me at alicia@as93.net.*
Disclaimer: This is not an exhaustive list, and aims only to be taken as guide. *Contributions are welcome, and would be much appreciated - to suggest an edit you can [open an issue](https://github.com/Lissy93/personal-security-checklist/issues/new/choose), or upload changes by [opening a PR](https://github.com/Lissy93/personal-security-checklist/pull/new/master). There are some contributing guidelins in [`CONTRIBUTING.md`](/.github/CONTRIBUTING.md).*
© [Alicia Sykes](https://aliciasykes.com) 2020, Licensed under [Creative Commons, CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). See [`LICENSE.md`](/LICENSE.md) *I owe a lot of thanks others who've conducted research, written papers, developed software all in the interest of privacy and security. Full attributions and referenses found in [`ATTRIBUTIONS.md`](/ATTRIBUTIONS.md).*
*Disclaimer: This is not an exhaustive list, and aims only to be taken as guide.*
*© [Alicia Sykes](https://aliciasykes.com) 2020, Licensed under [Creative Commons, CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). See [`LICENSE.md`](/LICENSE.md)*
![Attribution 4.0 International](https://licensebuttons.net/l/by/3.0/88x31.png) ![Attribution 4.0 International](https://licensebuttons.net/l/by/3.0/88x31.png)