/ markdown / good-opsec.md
good-opsec.md
  1  # Here's a list of good operational security (OPSEC) practices for the average person, along with real-world examples:
  2  
  3  See: [badopsec](badopsec.md) for advice on good opsec, can't have good opsec without bad opsec examples.
  4  
  5  Below are for the normies out there.
  6  ------------
  7  
  8  ## Table of Contents
  9  
 10  - [Use Strong, Unique Passwords](#use-strong-unique-passwords)
 11  - [Keep Software Updated](#keep-software-updated)
 12  - [Be Cautious with Personal Information](#be-cautious-with-personal-information)
 13  - [Secure Physical Devices](#secure-physical-devices)
 14  - [Use Secure Networks](#use-secure-networks)
 15  - [Practice Email Security](#practice-email-security)
 16  - [Implement Home Network Security](#implement-home-network-security)
 17  - [Be Mindful of Physical Documents](#be-mindful-of-physical-documents)
 18  - [Use Privacy Settings on Social Media](#use-privacy-settings-on-social-media)
 19  - [Be Cautious with Third-Party Apps](#be-cautious-with-third-party-apps)
 20  - [Practice physical security if you're really paranoid](#practice-physical-security-if-youre-really-paranoid)
 21  - back to [main guide](../README.md)
 22  ---
 23  
 24  ## Use Strong, Unique Passwords
 25  
 26  - Create complex passwords for each account
 27  - Utilize a password manager to keep track of them
 28  - Enable two-factor authentication when available
 29  - Use different usernames inside a password manager
 30  
 31  **Example:** John uses a password manager to generate and store unique 20-character passwords for each of his online accounts, including his email, social media, and banking websites.
 32  
 33  ## Keep Software Updated
 34  
 35  - Regularly update operating systems, applications, and antivirus software
 36  - Enable automatic updates when possible
 37  
 38  **Example:** Sarah sets her smartphone to automatically install security updates overnight, ensuring she always has the latest protections.
 39  
 40  ## Be Cautious with Personal Information
 41  
 42  - Limit the personal details shared on social media
 43  - Be wary of phishing attempts via email or phone
 44  - [self OSINT](../README.md#toolchain-self-osint)
 45  
 46  **Example:** Mike avoids posting his exact birth date, home address, or vacation plans on Facebook to reduce the risk of identity theft or home burglary.
 47  
 48  ## Secure Physical Devices
 49  
 50  - Use screen locks on all devices
 51  - Never leave devices unattended in public places
 52  - for SSD's, encrypt drives if storing DoD (Do or Die) data. [Toolchain discussed here](../README.md#toolchain-recommendations)
 53  
 54  **Example:** Lisa always activates her laptop's screen lock when stepping away, even for a quick coffee break at the office.
 55  
 56  ## Use Secure Networks
 57  
 58  - Avoid using public Wi-Fi for sensitive transactions
 59  - Use a VPN when connecting to unfamiliar networks
 60  
 61  **Example:** Tom uses his smartphone's cellular data instead of the free airport Wi-Fi when checking his bank account while traveling.
 62  
 63  ## Practice Email Security
 64  
 65  - Be cautious of unexpected attachments or links
 66  - Verify the sender's identity before responding to requests for sensitive information
 67  - Be mindful of what is out there, see [people search tools](../README.md#people-search-tools-in-the-states) and [self OSINT](../README.md#toolchain-self-osint)
 68  
 69  **Example:** Emma receives an urgent email claiming to be from her bank. Instead of clicking the provided link, she calls the bank directly using their official phone number to verify the request.
 70  
 71  ## Implement Home Network Security
 72  
 73  - Use a strong password for your Wi-Fi network
 74  - Make sure your network is up to date and not using outdated routers
 75  
 76  **Example:** The Johnson family changes their Wi-Fi password every six months and ensures their router's firmware is always up-to-date.
 77  
 78  ## Be Mindful of Physical Documents
 79  
 80  - Shred sensitive documents before disposal
 81  - Secure important papers in a locked safe or filing cabinet
 82  - practice [physical destruction](physical-destruction.md)
 83  
 84  **Example:** David always shreds credit card offers and old bank statements before putting them in the recycling bin.
 85  
 86  ## Use Privacy Settings on Social Media
 87  
 88  - Regularly review and adjust privacy settings on all platforms
 89  - Be selective about friend requests and connections
 90  - Be mindful of re-using usernames on different sites, see [Digital Profiling examples](Digital-Profiling.md#31-Examples) 
 91  
 92  **Example:** Rachel sets her Instagram account to private and carefully vets new follower requests to control who can see her posts.
 93  
 94  ## Be Cautious with Third-Party Apps
 95  
 96  - Only download apps from official stores (google, apple)
 97  - Review app permissions before installing
 98  
 99  **Example:** Mark carefully reads the permissions requested by a new game app and decides not to install it when he sees it wants access to his contacts and location data.
100  
101  ## Practice physical security if you're really paranoid
102  
103  - Buy a camera
104  - Get a permit to own a firearm, and practice
105  - Get chemical weapons
106  
107  **Example:** Sarah feels unsafe in her neighborhood so she decided to get a camera and a permit for a pistol for home defense, also bought pepper spray to carry on her person.
108  
109  [More discussed here](opsec.md#physical-security-in-opsec)
110  
111  ----
112  
113  By implementing these OPSEC practices, the average person can significantly improve their personal and digital security in everyday life.