Home Security Checklist

Here is a quick checklist for your home computers:

(Some of these do not apply to Apple or Linux users)

  • Your computers are accessing the internet through a router/firewall, not strait from a cable/DSL modem.
  • You are using WPA2 wireless protection and have changed the default password to something that is at least 16 characters.
  • You have changed your wireless SSID from the default name to something custom and have selected that it not be broadcast.
  • You are using OpenDNSas your DNS server instead of your ISP’s.
    • OpenDNS IP 1:
    • OpenDNS IP 2:
  • You have a firewall package installed on your computer.
  • You have an antivirus package installed on your computer.
  • You do not have any redundancy in the security software. (i.e. Two antivirus programs, two firewall programs, internet security suite and another antivirus program, etc.)
  • You have you antivirus program to run weekly scans if possible.
  • You are using Google Chrome or Firefox instead of Internet explorer.
  • You are using the WOT (Web of Trust) browser add-on.
  • You are using HTTPS Everywhere browser add-on.
  • You are using an auto history and cookie cleaner upon closing your browser.
  • You are using different passwords for every service that requires a login.
  • You are not allowing you browser to save log in  credentials and fill form data.
  • You are using LastPass with a master password of 20 or more characters to manage your passwords and fill form data.
  • You have Windows updates set to automatically update.
  • You have you web browser set to automatically update if it is not by default.
  • You have Java and Adobe Flash  updated (most commonly exploited to install malware on your system.)
  • You are using a reputable encryption program (TrueCrypt) for any sensitive data that has the potential to be lost or stolen. (i.e. data on a jump drive, laptop, or online backup service)
  • You have a master password set for any email clients you are using (i.e MS Outlook, Mozilla Thunderbird, etc.)
  • Lastly you are using good web browsing practices. This means using common sense and being a little paranoid while online. (If the link seems to good to be true then it is. If the Facebook post is clearly not something the person would normally post, then it is not from them. etc.)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: