H/T QUINCY LARSON AT FREECODECAMP:
STEP 1: USE TWO-FACTOR AUTHENTICATION ON YOUR IN-BOX
You've probably encountered this when you've logged into your bank or other secure online payment systems. You use your password as the first login, and then receive a text message to your phone with a code for the second login. This ensures that, even if someone manages to get your password, they can't log into your accounts unless they have your phone as well.
Gmail is currently the best system for handling two-factor authentication. Here's A LINK with directions on how to enable it.
STEP 2: ENCRYPT YOUR HARD DRIVE
Apple makes this easy with a built-in system preference called FileVault. This will prevent unauthorized users (anyone who doesn't have your password) from being able to access your computer's data. It's incredibly effective and impossible to bypass!
Here's A LINK with directions for how to activate it.
STEP 3: TURN ON YOUR IPHONE'S PASSWORD PROTECTION!
Instead of using the iPhone's (very convenient) thumbprint identification option, use password protection instead. That way, if your phone is ever stolen, you can remotely change the password. And be sure to not to use any of these 10 most common passcodes!
STEP 4: USE A DIFFERENT PASSWORD FOR EACH ONLINE ACCOUNT
I know, horrible, right? I cringe just thinking about it. But the reality is that, if you use the same password everywhere, once one account gets hacked, the bad guys will be able to access all your accounts. And even if your own system is safe, your bank account, Amazon account, and other online retailers may not be. If hackers get your password, they can sell it on the open market and cause financial chaos for you.
Luckily, there are a number of free password managers you can use to automatically keep track of this, including Apple's own built-in Keychain app.
STEP 5: SEND PRIVATE TEXT MESSAGES WITH THE SIGNAL APP
Signal is a third-party application for iPhone and Android that lets you send texts just like you normally would, only with Signal those are encrypted and can't be viewed by a third party.
And you can also use Signal to make phone calls!
STEP 6: USE TOR TO BROWSE
Unfortunately, private mode in Safari and Incognito in Chrome aren't really protecting your privacy. Even with those activated, your internet service providers, system administrator and browser can still track your viewing habits.
But not with TOR. It's a free browser that hides all users activity through multiple layers of encryption. Browsing is definitely slower with TOR, but it's much more secure if you don't want your browsing habits tracked.
Here's a link to download TOR for your Mac. You can also download the free TOR-related Onion Browser app for your iPhone from the Apple App Store.
STEP 7: PUT A LITTLE POST-IT NOTE OVER YOUR COMPUTER AND IPHONE CAMERA
Sure, it feels like you're joining the "Tin Hat Club," but the reality is that a number of groups are already using them to spy on people.
If you're skeptical, check out this amazing short film a student in Europe made filming the man who stole his iPhone!
If you have any questions, or would like help setting up any of your computer or iPhone encryption, please feel free to contact us!