A Field Guide to Cyber Security Best Practices


This field guide was originally published as a set of recommended practices for my clients who were taking my class “Cyber Security Best Practices for High Net Worth Individuals”. In that class, we focus on the basics of reducing your personal risk from cyber criminals without the uncertainty and time commitment so they can project their family and business.

For my colleagues, this may seem an elusive goal because we’ve all seen the difficulty in preventing cyber events from disrupting business causing significant loss.
Where this program differs is that it addresses many of the simple issues that create some of the largest risks. While no program is able to entirely prevent a dedicated adversary, this program guarantees to lower risk if the user follows the recommendations.

To this point, I’ve been asked for a more detailed set of Standard Operating Procedures in order to enable some of these suggestions. While there isn’t a one sized solution for all users, this is a set of capabilities that can be useful in reducing overall cybersecurity risk. For this reason, it isn’t being published as a book, but rather a set of individual SOPs that can be used by anyone. For that reason, it’s free, open, and setup to encourage feedback and discussion.

This page serves as an index, or table of contents based on the modules of the program. They are laid out in no specific order, except maybe that in which they are created. I hope that you find them useful. If you have any suggestions, please send them to fieldguide@cyberfoundry.io.

Module 1: Secure Your Laptop

IDStatusDateTitle

Module 2: Secure Your Smartphone

IDStatusDateTitle

Module 3: Security While Traveling

IDStatusDateTitle

Module 4: Secure Your Home Network

Module 5: Securing IoT Devices

Module 6: Advanced Security Measures

Module 7: Making Secure Decisions Online

Module 8: Social Media and Online Presence

Module 9: Recognizing and Avoiding Cyber Criminals