The first step in improving your protection against cyberthreats is to understand exactly what it is that you need to protect.
Only after you have a good grasp on that information can you evaluate what is actually needed to deliver adequate security and determine what else needs to be addressed. You must consider what data you have, who may want it, and how sensitive it is to you.
What would happen if, for example, it were publicized on the Internet for the world to see?
Then you can evaluate how much you’re willing to spend — timewise and moneywise — on protecting it.
A valuable equation to determine risk to your data is outlined below.
Risk = Threats / Vulnerabilities
Your Home Computer may suffer from one or major types of potential problems relevant to cybersecurity:
Your Mobile Phone from an information security standpoint, are inherently risky because they:
Social Engineering - Every person in your family and social circle poses risks to you as a source of information about you that can potentially be exploited for social engineering purposes.
These are a few of the risk that you may need to identify.
After you identify what you must protect, you must develop and implement appropriate safeguards for those items to keep them as secure as appropriate and limit the impact of a potential breach. In the context of home users, protecting includes providing barriers to anyone seeking to access your digital and physical assets without proper authorization to do so, establishing (even informal) processes and procedures to protect your sensitive data, and creating backups of all configurations and basic system restore points.
Basic elements of protection includes:
After you have evaluated what needs to be protected and put some safe guards in place it is time to share the word.