PSA: Stay away from LastPass, as it has a horrid security record and have had breaches almost yearly for quite a while as of late 2024. Their free plan also became nearly useless around 2017, though this could have changed since.
There are plenty of other good password managers out there, cloud and local, you’ll just have to do some research and choose what you think fits you and your situation best.
If I had to recommend one, it would be Bitwarden for sure. I’ve used it for a long time, nearly all of my friends use it, and I’ve heard barely anything negative about it at all (Well, my wife doesn’t like the new UI changes I guess :p).
2FA adds a crucial layer of security to your accounts, but not all 2FA methods are equally secure. I’ll give a brief example of a method that could make you less secure, and then explore a much more secure way.
SMS 2FA is bad, especially in America, where it’s often worse than having no 2FA at all. Some may see that as an exaggeration or outright false, but with how easy it is to SIM-Swap someone here and just how rampant it is, I disagree. Way too many services not only allow you to do 2FA through SMS, but also password resets and in a few cases email resets as well! These services make SMS 2FA worse than no protection at all, because attackers don’t need your password in that case. To really drill it in, millions of dollars in crypto-currency is stolen every single year where sim-swapping was one of the main tactics used, this is an oversimplification on how these teenagers (yes, teens, it’s not hard) are doing it but I’m not about to write a “how to fraud” post :p.
2FA is widely described as a pick two: Something you know (Login information, security questions), Something you have (Phone, Other device, Security Key), or Something you are (Biometrics). There’s also MFA (Multi-Factor Authentication) which 2FA is a form of, but can also involve more than two factors. I will not be covering any of that here as I don’t think it’s applicable for the vast majority as they want a good middleground between security and convenience.
There are many forms of 2FA, I will be covering TOTP (Time-based One-Time Password) as it’s the most supported and easy to use forms of 2FA yet incredibly effective. TOTP combines “Something you know” and “Something you have”.
So, what is it? In brief, TOTP 2FA works when a server gives you a QR code, a secret key, or both. The QR code in reality just has the data of that secret key and the website for various apps to parse. Using the secret key and the current system time, it generates a code, over 99% of the time the code will be 6 ascii digits, though not always the case.
To get started you’ll need an application to generate you these codes, here’s some for mobile platforms I can personally recommend, though there are many, many more good options that exist.
There are desktop options available but I would highly recommend using your phone for TOTP generation over your main computer as your computer is much more likely to be compromised and a potential attacker gaining access to both your login credentials and 2FA secrets is a horrible scenario to be in.
Okay, you’ve made a choice, The first thing you want to have 2FA on is your password manager, as it will be one of your biggest points of failure especially if you’re using a cloud service. Once that’s setup, then look at your accounts and in order of most important to least important enable TOTP 2FA on everything you can. Some websites may force you into SMS 2FA (i.e Twitch) to enable TOTP 2FA which is highly unfortunate, it will be up to you to decide whether or not to enable it for that service, in most cases for most people it should be okay despite my earlier warnings, but if you understand your threat model and believe it would make you less secure overall, I believe it makes sense.
You should be sharing as little PII (Personally identifiable information) about yourself as possible on things like social media sites, forums, and such. Some people’s professional lives exist on the internet, though so in some cases this is less possible, but if that’s not the case then you’re exposing information about yourself for zero reason at all.
Another simple thing is to always delete accounts you do not use anymore, Never leave accounts dormant. If a website does not allow you to delete an account you’ll have to find a way to contact them to send them a data removal request, basically every site nowadays complies with these due to GDPR even if you aren’t based in a EU country.
One of the most common strategies for backing up data is 3-2-1. 3 copies, 2 different media types, and 1 off-site backup. Though, it does come with a financial cost which not everybody can cover.
I could infodump about NAS software and tons of different setups you could do, but this is not the place for that. Instead, I’ll go over a basic backup plan that’s simple and much more affordable for many.
To start off you want to be backing up your most important data first. Usually important means sensitive as well, so you’ll want to encrypt any cloud backups (and maybe even local copies too!).
There are many ways to encrypt files; see the Encryption section.
When it comes to cloud backups there are loads of different providers and ways to go about it, if you don’t do a lot of file reading you may consider object storage, Hetzner has their storage boxes, backblaze has their own backup solutions, proton has a google-drive alternative, etc etc. In every case there will be some cost to it though, and if there’s not then you are the product.
Depending on the type of data, you could always go super simple and just have a secondary hard drive which would make it a one-time cost. I will always recommend trying to keep at least two different copies of your data though, especially if it’s important. A random failure can happen at any time, even if unlikely.
You should also be periodically checking your backups, this is crucial for ensuring no data loss.
You should as a minimum:
Some cloud services:
BackBlaze Backup I don’t have a ton to say about it, it’s transparent encryption so the password you use for it is used to automatically encrypt and decrypt files uploaded to their service. Though, you should be manually encrypting any sensitive data regardless.
Encryption is essential for protecting sensitive data both at rest and during transfer. Here’s an overview of reliable tools for different encryption needs:
CLI encryption tool great for encrypting backups or files. It supports both password-based and key-pair encryption, making it great for many uses.
If you’re more comfortable with a GUI, Picocrypt is great. It uses modern encryption standards (XChaCha20 + Argon2id) and includes built-in integrity checking. It’s amazing for less technical beginners while still being secure.
It can encrypt entire drives, create encrypted containers, and also supports hidden volumes for plausible deniability. Works great across different operating systems and has extensive documentation.
Built into Windows Pro/Enterprise. If you’re using Windows, this is the path of least resistance. It’s best used with a TPM chip, though one is not required.
MacOS’s built-in encryption. It’s integrated with Apple’s hardware security features and supports encrypted backups with Time Machine.
It’s the most commonly used standard and is included with most distributions. Can individually encrypt partitions or all of them, most OSes have an easy setup option during installation but it can be used on an existing installation too.
Most distributions offers easy Disk Encryption in their setup, typically using LUKS. For desktop users, KDE’s Partition Manager and GNOME’s Disks application both provide easy GUI’s for managing encrypted volumes. If you’re stuck to CLI, cryptsetup
is great.
⚠️ If you’re dual booting with Windows, make sure to encrypt both Operating Systems separately rather than trying to share encrypted partitions between them. It will not work.
The strength of your encryption largely depends on key security. The strongest encryption is useless if your password is insecure or stored improperly.
When you “delete” a file through normal means on most operating systems, you’re only removing the link to where that file exists on the disk—the actual data remains until it’s eventually overwritten by new data. This means others can potentially recover your “deleted” files.
Secure data deletion ensures both the link and the physical data are destroyed by overwriting the data multiple times with either zeros or random data. While this is more secure, it’s also significantly slower, which is why it isn’t the default deletion method.
On non Apple Silicon Mac devices you can use the built-in Secure Empty Trash functionality, but this has been removed due to SSDs being very different from HDDs.
All is not lost though as on any Mac with a T2 security chip has data automatically encrypted on rest even without enabling FileVault. If you reset your drive using Disk Utility or through their factory reset the data is no longer recoverable.
ArchLinux Wiki entry on secure deletion.
wipe
- Similar to shred but with a few more options such as directory wipingsecure-delete
includes:srm
(secure remove)sfill
(secure free space wiping)sswap
(secure swap wiping)smem
(secure memory wiping)shred
- GNU Coreutils CLI that overwrites the actual datanvme
- Useful CLI for NVMe drives, includes format
command which can be used for secure deletionThe most secure way to handle sensitive data is to encrypt it from the beginning.
Security is an everlasting game of cat and mouse, not a one time setup. While this guide covers basics, it’s important to regularly review and update your security practices as threat actors become more advanced. Research as much as you feel the need or want to, it always helps.
Perfect security doesn’t exist—it’s about finding the right balance between security and convenience for your specific needs. Start with the basics outlined here, document everything, and gradually increase your security as you learn.
You don’t have to feel overwhelmed by the thought of having to do every little thing in one go, instead start with the most important changes:
The most secure system is one you’ll actually use, so make changes that increase security while not making you want to throw it all a way.
Education around these topics is so important, yet the average person on the internet has zero security awareness. We must educate others, especially our closest friends and family.
When trying to help someone with security, you must remember that not everyone is technical—be patient, be kind, and be understanding.
An easy way to get the ball rolling with someone is by explaining the implications of having poor security using common examples, like account hijacking, fraud, and identity theft. For non technical people you should focus on it being as simple as possible, give them actions/steps instead of all of the details. Make sure you know where they’re at in terms of security and knowledge, someone who’s never used a password manager before is much different than someone who just wants to improve their existing security. Finally, be patient. People who’ve never thought about security in this way can be extremely overwhelming, any progress is amazing.
Some people may retort with a phrase like “I don’t have anything to hide”, “It’s too complicated”, “I’m incapable of remembering all of this”, ensure they understand that the most sensitive details are the most important to secure, things like:
We aren’t trying to make everyone a security expert, we just want to help people develop better habits that meaningfully benefit them without the removal of all convenience.