- setup 2 step authorizations (eg: google can send a pin to your phone, or banks have pin generator for a second password)
- isolating threats. ie: when paying with a credit card, you could
- use a VM
- use Tor
- dual boot to a separate OS
- setup a computer and remote access into it
- software: firewall, regular virus scans, regular spyware scans
- monitors: monitor network traffic here
- reformat your actual computer periodically
No comments:
Post a Comment