Information Security Links
Backup Basics Cybercrime Passwords Encryption Miscellaneous
Phone Security OS Security Hardware Security
A bunch of curated links to help educate individuals and small non-profits so they can remain secure in the digital age.
The Apostle Paul, the Apostle John and Information Security
Backups
Why Backup?
https://www.dropmyemail.com/business/why_backup
http://www.riscitsolutions.com/news/archived-news/why-you-should-backup
The Beginner's Guide to PC Backup
http://www.pcmag.com/article2/0,2817,2363057,00.asp
http://www.debianhelp.co.uk/backupbasics.htm
Basics
Top Ten Safe Computing Tips
https://ist.mit.edu/security/tips
Phishing Emails
The most common examples of phishing emails (usecure.io)
Stories
& Examples: Phishing Education & Training: Indiana University (iu.edu)
Credit Card Fraud
https://upgradedpoints.com/credit-cards/credit-card-skimmer-fraud/
Cybersecurity Questions For Businesses
What Your Board Needs to Know About Cyber Threats – Nonprofit Risk Management Center
Digital Safety for Children and Teens
https://routersnetwork.com/life-changing-guide-to-protect-your-children-on-their-smartphone/
Teaching Teens Online Safety: https://www.mytutor.co.uk/blog/parents/the-parents-guide-to-teaching-your-teen-online-safety/
The cyber.org Range is a no-cost, safe, virtual environment for K-12 students to learn cybersecurity skills.
Project Access focuses on introducing blind and
vision-impaired students to cybersecurity and the possibility of cyber careers
Digital Safety For Seniors
Seniors and Digital Money: https://www.comparethemarket.com/credit-cards/content/digital-money-for-seniors/
Cyberbullying
https://www.nominus.com/en/dm/blog/hosting/cyberbullying-a-guide-to-internet-and-computer-safety
Digital Safety for Journalists
http://en.rsf.org/IMG/pdf/guide_journaliste_rsf_2015_en.pdf see ch. 4
Cybersecurity Resources Guide
https://www.mastersindatascience.org/resources/cybersecurity-resource-guide/
Basics - Passwords
Choosing Secure Passwords
https://en.wikipedia.org/wiki/Password_strength#Guidelines_for_strong_passwords
https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html
Don't use these passwords
https://blog.kaspersky.com/10-worst-password-ideas-as-seen-in-the-adobe-hack/3198/
http://lifehacker.com/5937303/your-clever-password-tricks-arent-protecting-you-from-todays-hackers
Random Password Generators
https://www.random.org/passwords/
http://world.std.com/~reinhold/diceware.html
https://www.safetydetectives.com/password-meter/
Use a password safe
Lastpass https://lastpass.com/simpledownload.php
Keepass http://keepass.info/
Password Safe https://pwsafe.org/
How Your Passwords Are Stored on the Internet (and When Your Password Strength Doesn't Matter)
Cybercrime
Introduction to Cybersecurity and Data Protection (University of York)
Identity Theft Protection Guide
Internet Fraud Statistics for 2022
Encryption
Encrypting hard drives
https://answers.syr.edu/display/software/Encrypting+your+external+hard+drive+on+Windows+and+OSX
http://lifehacker.com/a-beginners-guide-to-encryption-what-it-is-and-how-to-1508196946
VeraCrypt https://veracrypt.codeplex.com/ also does hidden volumes
GNU Privacy Guard https://www.gnupg.org/ does external and USB devices
Encrypting files
Five Best File Encryption Tools: http://lifehacker.com/five-best-file-encryption-tools-5677725
7-Zip http://www.7-zip.org/
Encrypting email
http://lifehacker.com/how-to-encrypt-your-email-and-keep-your-conversations-p-1133495744
Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance https://freedom.press/encryption-works
Miscellaneous
NIST Guidance for Small Organizations
https://doi.org/10.6028/NIST.SP.1300
Anonymous Browsing
Cybersecurity Degree Courses
Find a relevant Cybersecurity degree: https://cybersecuritydegrees.org/programs/
Gmail 2024 Hack Attack Advice: Turn It Off And On Again, Google Says (forbes.com)
How To Tell If Social media Is Affecting Your Mental Health
VPN
VPN Beginner's Guide - What Is A VPN
Legality of VPNs in 35 Jurisdictions and how to keep away from dictatorships and intelligence agencies.
Wordpress
When you should NOT use WordPress for your Website? http://webhostingmedia.net/when-not-use-wordpress/
Phone Security
http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm
Personal Smartphone Security Best Practices: https://www.securedatarecovery.com/resources/guide-to-personal-smartphone-security
http://money.usnews.com/money/personal-finance/articles/2015/01/13/10-ways-to-keep-your-phone-safe
https://smartphoneinsight.com/how-to-keep-your-phone-secure/
The Best Mobile Security Apps: http://www.pcmag.com/article2/0,2817,2402099,00.asp
Securing Your Operating System
Securing Windows
http://blogs.microsoft.com/cybertrust/2012/07/31/microsofts-free-security-tools-series-introduction/
Norton Security Scan https://security.symantec.com/nss/getnss.aspx?
AVG antivirus http://www.avg.com/us-en/free-antivirus-download
http://www.superantispyware.com/
http://www.mcafee.com/us/resources/white-papers/foundstone/wp-low-hanging-fruits.pdf
Securing Redhat and Centos Linux (300 pages)
Securing Hardware
Vulnerability Scanners
On line port scanner Port Checker - Check Open Ports Online (dnschecker.org)
Metasploit: http://www.metasploit.com/ also cheat sheet for Metasploit
OpenVAS: http://www.openvas.org/
Securing ports
http://lifehacker.com/198946/how-to-portscan-your-computer-for-security-holes
http://www.techradar.com/us/news/networking/how-to-secure-your-tcp-ip-ports-633089
Shields Up: https://www.grc.com/default.htm
Securing Routers
http://security.stackexchange.com/questions/77112/danger-of-default-router-password
http://www.acunetix.com/blog/web-security-zone/the-email-that-hacks-you/
http://www.howtogeek.com/173921/secure-your-wireless-router-8-things-you-can-do-right-now/