πŸ”’
πŸ›‘οΈ

Everyday Digital Security

Habits that prevent the most common account and device compromises.

πŸ—„οΈ
πŸ”‘

Password manager

Front

Stores/generates unique passwords so you do not reuse them across sites.

Back
πŸ“±
πŸ›‘οΈ

Multi-factor authentication (MFA)

Front

A second proof beyond a password; blocks many account takeovers.

Back
🎣
πŸ“§

Phishing

Front

Messages that trick you into giving secrets or installing malicious software.

Back
🀏
πŸ”“

Least privilege

Front

Give accounts/apps the minimum access needed; reduce blast radius.

Back
πŸ”’
πŸ’Ύ

3-2-1 backups

Front

3 copies, 2 different media, 1 offsite/offline copy.

Back
πŸ†”
✨

Unique passwords

Front

One password per site prevents one breach from becoming many breaches.

Back
🎟️
πŸ’»

Passkeys

Front

Passwordless login using device keys; resistant to many phishing attacks.

Back
πŸ”„
πŸ“¦

Software updates

Front

Patch known vulnerabilities quickly (OS, browser, apps).

Back
πŸ”’
🀳

Device lock

Front

Use a strong PIN/biometrics and auto-lock to protect physical access.

Back
πŸ’Ώ
πŸ”

Full-disk encryption

Front

Protects data at rest if your device is lost or stolen.

Back
πŸ†˜
πŸ“

Recovery codes

Front

Store account recovery codes securely (offline) for emergencies.

Back
πŸ’¬
πŸ†š

SMS vs app MFA

Front

App/hardware MFA is safer than SMS, which is vulnerable to SIM swap.

Back
πŸ“²
πŸ”€

SIM swap

Front

Attackers hijack your phone number.

Mitigation: carrier PIN + avoid SMS MFA.

Back
🌐
⚠️

Public Wi-Fi caution

Front

Assume public networks are hostile; avoid sensitive actions or use trusted protections.

Back
πŸ”—
🟒

HTTPS

Front

Encrypts traffic in transit; verify for sensitive logins and payments.

Back
🧩
πŸ•΅οΈ

Browser extensions risk

Front

Extensions can read pages and data. Install few; remove unused.

Back
πŸ“‹
πŸ”

Permissions audit

Front

Review app permissions periodically; revoke what you do not need.

Back
πŸ§ͺ
πŸ“‚

Backup testing

Front

A backup is only useful if restore works; test restores occasionally.

Back
☣️
πŸ’°

Ransomware

Front

Malware that encrypts data. Best defense: offline backups + updates.

Back
🎭
πŸ—£οΈ

Social engineering

Front

Attackers exploit trust and urgency. Slow down and verify via a second channel.

Back
πŸ”„
πŸ“§

Password reset safety

Front

Treat reset emails/links as high risk; verify the sender and domain.

Back
πŸ””
🚨

Account alerts

Front

Enable login and security alerts to detect compromise early.

Back
πŸ—οΈ
πŸ› οΈ

Security key (FIDO2)

Front

Hardware keys provide strong phishing-resistant MFA for critical accounts.

Back
πŸ“Š
πŸ“‘

Data breach monitoring

Front

Monitor for breaches and rotate passwords when an account is exposed.

Back