IT pros do threat modeling every day. That sounds like something out of a Mission: Impossible script, but it’s really just a fancy way of saying they regularly ask the question “What can go wrong?”
Special Feature
You can do the same to protect your online identity and your assets, and you don’t need the skills of a secret agent to get started. The trick is to keep asking questions after you’ve got the cybersecurity basics out of the way. Firewall enabled? Check. Strong passwords and 2FA? Got it. Antimalware solution deployed? Sure.
Indeed, those steps will protect you from the majority of online attacks. But there’s more you can and should be doing.
Start by asking if there are threats you’re not taking into account. What happens if you get fooled by a clever phishing attempt and accidentally give away your password? What happens if someone steals your phone or laptop? What can you do if your files are locked up by ransomware? And most important of all, will you be able to recover from a security incident, regardless of its origin?
In this article, I lay out four steps you should be paying attention to in addition to the basics. None of them are platform-specific. They apply to Macs, Windows PCs, and yes, even computers running Linux. Most of these security precautions are even useful if you do nearly everything on a smartphone or tablet and never touch a laptop.
1. Make sure all your data is encrypted
Anyone who’s ever watched a horror movie knows that sometimes the threat is coming from inside the house. Or the office.
If you spend all your time worrying about protecting your online accounts, you might forget to plan for the possibility that someone will steal your laptop or your smartphone. Losing that expensive piece of hardware is painful enough, but the data on that device can be even more valuable if a thief can use it to steal your identity and drain your bank accounts.
The best form of protection you have against this sort of damage is strong encryption, which makes your data completely unreadable to someone who steals your physical device. AES-256 encryption, the worldwide gold standard for modern tech gear, is extremely effective – just ask the FBI, which has fought (and lost) some well-documented battles to weaken its effectiveness.
The data on your smartphone is probably encrypted already. On Android devices and iPhones, all data on the phone itself is encrypted automatically as soon as you set a passcode. Just make sure that passcode is long enough (at least six characters). And consider setting the option to erase your phone after too many unsuccessful attempts to enter your passcode:
On an Android device, search for Auto Factory Reset in Settings.
If you use an iPhone, go to FaceID and Passcode in Settings and find the Erase Data option.
For a PC running any edition of Windows 10/11, including the Home edition, Windows Device Encryption is available and enabled by default, but only if you sign in using a Microsoft account. This automatic encryption protects the system disk; however, you can’t encrypt secondary disks or external disks. You’ll find the switch for this feature in Settings > Privacy & Security > Device Encryption.