mirror of
https://github.com/Lissy93/personal-security-checklist.git
synced 2025-02-23 21:23:35 +07:00
Markdown version of checklist
This commit is contained in:
parent
d1dbc86a2e
commit
4316b631a8
92
CHECKLIST.md
Normal file
92
CHECKLIST.md
Normal file
@ -0,0 +1,92 @@
|
||||
|
||||
[](https://github.com/zbetcheckin/Security_list)
|
||||
[](http://makeapullrequest.com)
|
||||
[](https://creativecommons.org/licenses/by/4.0/)
|
||||
[](https://github.com/Lissy93/personal-security-checklist/graphs/contributors)
|
||||
|
||||
<p align="center"><img src="https://i.ibb.co/rGQK71g/personal-security-checklist-6.png" /></p>
|
||||
|
||||
*<p align="center">A curated checklist of tips to protect your digital security and privacy</p>*
|
||||
|
||||
### Contents
|
||||
|
||||
[<img src="https://i.ibb.co/XbyGTrP/1-authentication-2-36x36.png" width="28" height="28" /> Authentication](#authentication)<br>
|
||||
[<img src="https://i.ibb.co/8KMrdbX/2-internet-36x36.png" width="28" height="28" /> Browsing the Web](#web-browsing)<br>
|
||||
[<img src="https://i.ibb.co/7NrXW3L/5-email-36x36.png" width="28" height="28" /> Email](#emails)<br>
|
||||
[<img src="https://i.ibb.co/DrWJBT9/13-messaging-36x36.png" width="28" height="28" /> Secure Messaging](#secure-messaging)<br>
|
||||
[<img src="https://i.ibb.co/GFYyXMd/6-social-media-36x36.png" width="28" height="28" /> Social Media](#social-media)<br>
|
||||
[<img src="https://i.ibb.co/0VTZQpH/3-networking-36x36.png" width="28" height="28" /> Networks](#networking)<br>
|
||||
[<img src="https://i.ibb.co/F3WwqsV/7-phones-36x36.png" width="28" height="28" /> Mobile Phones](#mobile-devices)<br>
|
||||
[<img src="https://i.ibb.co/ZftcgJq/8-computers-36x36.png" width="28" height="28" /> Personal Computers](#personal-computers)<br>
|
||||
[<img src="https://i.ibb.co/b2S9372/9-smart-home-36x36.png" width="28" height="28" /> Smart Home](#smart-home)<br>
|
||||
[<img src="https://i.ibb.co/4JTqL5y/12-finance-36x36.png" width="28" height="28" /> Personal Finance](#personal-finance)<br>
|
||||
[<img src="https://i.ibb.co/KVPV1Lk/10-human-36x36.png" width="28" height="28" /> Human Aspect](#sensible-computing)<br>
|
||||
[<img src="https://i.ibb.co/9NbhBww/11-physical-36x36.png" width="28" height="28" /> Physical Security](#physical-security)<br>
|
||||
|
||||
Too long? 🦒 See the [TLDR version](https://github.com/Lissy93/personal-security-checklist/blob/HEAD/articles/2_TLDR_Short_List.md) instead.
|
||||
|
||||
For a list of privacy-respecting software, check out [Awesome-Privacy](https://github.com/lissy93/awesome-privacy).
|
||||
|
||||
A mirror of this repo is available at [codeberg.org/alicia/personal-security-checklist](https://codeberg.org/alicia/personal-security-checklist).
|
||||
|
||||
---
|
||||
|
||||
<!-- checklist-start -->
|
||||
<!-- checklist-end -->
|
||||
|
||||
----
|
||||
|
||||
#### There's an interactive version!
|
||||
- [Digital Defense](https://digital-defense.io) - View details, check items of, and track your progress
|
||||
|
||||
#### Other Awesome Security Lists
|
||||
- @sbilly/[awesome-security](https://github.com/sbilly/awesome-security)
|
||||
- @0x4D31/[awesome-threat-detection](https://github.com/0x4D31/awesome-threat-detection)
|
||||
- @hslatman/[awesome-threat-intelligence](https://github.com/hslatman/awesome-threat-intelligence)
|
||||
- @PaulSec/[awesome-sec-talks](https://github.com/PaulSec/awesome-sec-talks)
|
||||
- @Lissy93/[awesome-privacy](https://github.com/lissy93/awesime-privacy)
|
||||
- @Zbetcheckin/[security_list](https://github.com/zbetcheckin/Security_list)
|
||||
- Michael Horowitz / [defensivecomputingchecklist.com](https://defensivecomputingchecklist.com/)
|
||||
|
||||
[See More](/4_Privacy_And_Security_Links.md#other-github-security-lists)
|
||||
|
||||
----
|
||||
|
||||
## Notes
|
||||
|
||||
*Thanks for visiting, hope you found something useful here :) Contributions are welcome, and much appreciated - to propose an edit [raise an issue](https://github.com/Lissy93/personal-security-checklist/issues/new/choose), or [open a PR](https://github.com/Lissy93/personal-security-checklist/pull/new/master). See: [`CONTRIBUTING.md`](/.github/CONTRIBUTING.md).*
|
||||
|
||||
*Disclaimer: This is not an exhaustive list, and aims only to be taken as guide.*
|
||||
|
||||
*Licensed under [Creative Commons, CC BY 4.0](https://creativecommons.org/licenses/by/4.0/), © [Alicia Sykes](https://aliciasykes.com) 2020*
|
||||
|
||||
[](/LICENSE.md)
|
||||
|
||||
---
|
||||
|
||||
Help support the continued development of this project 💖
|
||||
|
||||
[](https://github.com/sponsors/Lissy93)
|
||||
|
||||
----
|
||||
|
||||
Found this helpful? Consider sharing it with others, to help them also improve their digital security 😇
|
||||
|
||||
[](http://twitter.com/share?text=Check%20out%20the%20Personal%20Cyber%20Security%20Checklist-%20an%20ultimate%20list%20of%20tips%20for%20protecting%20your%20digital%20security%20and%20privacy%20in%202020%2C%20with%20%40Lissy_Sykes%20%F0%9F%94%90%20%20%F0%9F%9A%80&url=https://github.com/Lissy93/personal-security-checklist)
|
||||
[](
|
||||
http://www.linkedin.com/shareArticle?mini=true&url=https://github.com/Lissy93/personal-security-checklist&title=The%20Ultimate%20Personal%20Cyber%20Security%20Checklist&summary=%F0%9F%94%92%20A%20curated%20list%20of%20100%2B%20tips%20for%20protecting%20digital%20security%20and%20privacy%20in%202020&source=https://github.com/Lissy93)
|
||||
[](https://www.linkedin.com/shareArticle?mini=true&url=https%3A//github.com/Lissy93/personal-security-checklist&title=The%20Ultimate%20Personal%20Cyber%20Security%20Checklist&summary=%F0%9F%94%92%20A%20curated%20list%20of%20100%2B%20tips%20for%20protecting%20digital%20security%20and%20privacy%20in%202020&source=)
|
||||
[](https://mastodon.social/web/statuses/new?text=Check%20out%20the%20Ultimate%20Personal%20Cyber%20Security%20Checklist%20by%20%40Lissy93%20on%20%23GitHub%20%20%F0%9F%94%90%20%E2%9C%A8)
|
||||
|
||||
---
|
||||
|
||||
Get in touch 📬
|
||||
|
||||
[](https://twitter.com/Lissy_Sykes)
|
||||
[](https://github.com/Lissy93)
|
||||
[](https://mastodon.social/web/accounts/1032965)
|
||||
[](https://keybase.io/aliciasykes)
|
||||
[](https://keybase.io/aliciasykes/pgp_keys.asc)
|
||||
[](https://aliciasykes.com)
|
||||
|
||||
---
|
Loading…
Reference in New Issue
Block a user