Additional Topics

Additional Topics

  • Be careful opening unknown documents.

    • Go back to the tools section to help with this.

    • Files, upon being accessed, can execute activity. An example here is that Microsoft Office products can run Macros. Macros are used by bad actors to their advantage for their malicious activity.

  • Use your Security Software!

    • Linux: UFW and fail2ban are two common options and are great. Security AV products are also widely supported.

    • Windows: Use your AV and your firewall. Nothing is guaranteed to 100% protect you, but everything helps.

    • Apple: The same context above, applies to Apple.

    • It is a misconception that one OS is more safe or more Secure than another. It is all about opportunity and return of investment for bad actors.

  • Use YouTube

    • If you don’t know something, go search YouTube. I am constantly watching and learning something new.

Last updated