Priority Ranking of Advice by Experts (Computed with Matrix Factorization)
Security Advice by Category | Security Advice Ranking (Expert) | Security Advice Ranking (User) | Advice Experts Rated Useless and Harmful | Advice Experts Rated High Priority | Full Corpus
- Use unique passwords for different accounts, 1.81
- Update devices, 1.88
- Use anti-malware software, 1.91
- Scan attachments you open for viruses, 1.99
- Use different passwords, 2.06
- Encourage others to use strong passwords, 2.17
- Not tell anyone your passwords, even IT, 2.18
- Use end-to-end encryption for communication, 2.19
- Remember your passwords, 2.22
- Keep passwords safe if written down, 2.35
- Not identify yourself to websites, 2.36
- Keep antivirus/antimalware up to date, 2.38
- Monitor network traffic on your router, 2.41
- Not store passwords in a file, 2.45
- Use strong passwords, 2.45
- Turn on automatic updates for devices, 2.46
- Be careful entering passwords in public computers, 2.51
- Install only trusted software, 2.55
- Use administrator rights to prevent unauthorized actions, 2.55
- Not use passwords based on personal information, 2.58
- Lock your smartphone with passcode or touch ID, 2.62
- Use 2+ factor authentication, 2.62
- Not give out your email address without good reason, 2.62
- Use a combination of letters, numbers, and special characters in passwords, 2.64
- Test your firewall, 2.7
- Protect devices against power surges, 2.7
- Regularly back up your data, 2.71
- Set rules for your kids about the Internet, 2.72
- Read install prompts, 2.72
- Use a VPN, 2.73
- Use a password manager, 2.74
- Replace letters with symbols in your passwords, 2.78
- Use single sign-on SSO, 2.78
- Beware of revealing personal information unless you know who you're talking to, 2.81
- Set your antivirus/antimalware to run periodic full scans, 2.84
- Watch out for phishing, 2.9
- Lock your computer when you're away from it, 2.91
- Not do online banking on a public computer, 2.92
- Change passwords and security questions on compromised accounts, 2.92
- Not click on ads, 2.93
- Apply real-world common sense and follow your instincts, 2.95
- Set antivirus to autoscan email, 2.95
- Verify who you are talking to, 2.96
- Not open attachments from unknown senders, 2.96
- Be wary of false emails from trusted institutions, 2.97
- Not run or keep unnecessary programs, 2.97
- Change default passwords on devices/networks/services, 2.99
- Disable your webcam, 3
- Only use HTTPS, 3.01
- Not post vulnerable information (addresses, credit card numbers, etc.), 3.02
- Be suspicious if something is too good to be true, 3.02
- Use passwords, 3.1
- Be careful with permissions, 3.1
- Encourage children to talk to you if they feel uncomfortable online, 3.13
- Not use dictionary words as or in passwords, 3.14
- Download only trusted programs, 3.15
- Be suspicious of attachments, 3.16
- Be suspicious of unusual email if grammar in an email is not good, 3.17
- Delete phishing or spam emails, even if you might know the sender, 3.18
- Don't trust sites with certificate warnings, 3.19
- Only allow authorized users to access your network, 3.19
- Disable features you aren't using (BlueTooth, WiFi, etc.), 3.2
- Double check email addresses, 3.2
- Not store data if you don't need to, 3.24
- Not click random or unfamiliar links from unknown senders, 3.24
- Turn on download notifications, 3.26
- Only download things you are looking for, 3.26
- Use antivirus, 3.27
- Disable Autorun to prevent malicious code from running, 3.27
- Watch for spelling mistakes in provided URLs, 3.28
- Use a disposable email service, 3.28
- Update applications, 3.28
- Avoid plugging external devices into computers, 3.29
- Take only devices you need when traveling, 3.3
- Only reveal financial information to reputable actors, 3.31
- Delete spam, 3.32
- Fully reset hacked devices, 3.33
- Always keep learning about security and privacy, 3.33
- Make a threat model, 3.33
- Check if website you're visiting uses HTTPS, 3.34
- Not friend people you don't know, 3.34
- Look at the URL bar to verify you're at the intended website, 3.35
- Not use loyalty cards, 3.35
- Visit only known websites, 3.36
- Be suspicious of unusual email, 3.37
- Verify suspicious email and email contents, 3.37
- Not share third party personal information i.e. friends and family, 3.38
- Keep virus definitions up to date, 3.38
- Disable macros, 3.39
- Avoid passwords with only numbers, 3.39
- Avoid illegal or unaffiliated download sites, 3.39
- Ensure Wifi is secured to at least WPA2 level, 3.4
- Install a firewall, 3.42
- Disable automatic download of email attachments, 3.43
- Understand who to trust online, 3.44
- Not follow links in spam, 3.45
- Not trust the From address on an email, 3.48
- Educate yourself on how to avoid fraud, 3.48
- Be careful of downloads, 3.49
- Secure your router, 3.49
- Physically destroy drives you're done with and wish to erase, 3.49
- Not use built-in erasing on SSDs, 3.49
- Be suspicious of links, 3.5
- Minimize network exposure for control systems, 3.5
- Not click on flashy things, 3.52
- Use privacy settings, 3.53
- Encourage children to follow age limit guidelines for websites, 3.54
- Clear your cookies, 3.54
- Be careful who uses your computer, 3.54
- Look for real-world contact information while online, 3.54
- Buy devices with passwords, preferably passwords that you can change, 3.56
- Not enter passwords after clicking links in email, 3.56
- Encrypt your device data, 3.56
- Block unwanted users, 3.57
- Apply the highest level of security that's practical, 3.57
- Use a secure machine to hold confidential data, 3.58
- Use long passwords, 3.58
- Use a password that's different from your username, 3.58
- Monitor credit cards for unauthorized activity, 3.6
- Not open unnecessary attachments, 3.6
- Use a password to protect your WiFi, 3.6
- Set up auto-lock timers for your smartphone, 3.61
- Encourage others to use Tor, 3.62
- Turn on automatic updates for applications, 3.62
- Turn off Bluetooth, 3.62
- Scan files downloaded from websites for viruses, 3.63
- Not use repetitive characters in passwords, 3.63
- Not use look-alike substitutions for your password, 3.64
- Not enter sensitive information or credentials without HTTPS, 3.64
- Beware of "free" products, 3.64
- Not use debit cards, 3.64
- Not give out your email address for free samples or products, 3.66
- Be wary of proxy servers, 3.66
- Turn off location services, 3.67
- Change passwords often, 3.67
- Secure devices and fix vulnerabilities that caused the breach, 3.68
- Encrypt your email, 3.69
- Turn off/limit pop-ups, 3.69
- Be suspicious of unusual email of things even from known people, 3.7
- Use randomly generated passwords or password generator websites, 3.71
- Beware of incognito mode, 3.71
- Backup your password database, 3.71
- Avoid using open Wi-Fi networks for business, banking, shopping etc., 3.71
- Beware of free VPN programs, 3.72
- Not store mobile passwords directly on the device, 3.72
- Remain anonymous online, 3.72
- Disable extension-hiding for known file types, 3.72
- Use anti-spyware, 3.72
- Use a virtual machine or even multiple virtual machines, 3.73
- Remove unsafe devices from the network, 3.73
- Secure other devices like you would your computer, 3.73
- Use browsers that protect against phishing, 3.74
- Encrypt your hard drive, 3.74
- Not give out your email address for free software downloads, 3.77
- Not store passwords online, 3.77
- Verify file signatures, 3.77
- Check that websites have valid digital certificates, 3.78
- Watch for unusual posts on your account, 3.78
- Do sensitive tasks on dedicated and trusted devices, 3.79
- Encrypt select groups of files, 3.79
- Use secure payment methods like PayPal, BPay, or credit cards, 3.8
- Understand what permissions you give new software downloads, 3.8
- Not blindly trust HTTPS, 3.8
- Use security extensions, 3.8
- Not let computers or browsers remember passwords, 3.81
- Use a proxy server, 3.82
- Only add people you know in the offline world to contact lists, 3.82
- Report account breaches or losses to the appropriate people, 3.82
- Use different computers for work and home use, 3.82
- Verify URLs you visit, 3.84
- Monitor where your kids go online, 3.84
- Exit sites your browser warns are malicious, 3.84
- Run a virus scan on new devices, 3.84
- Be suspicious of popups and requests, even from known sources, 3.84
- Remain calm and talk with kids about bad web experiences, 3.86
- Not use automatic network log-in, 3.87
- Use encryption, 3.87
- Keep your private key safe, 3.87
- Review your root certificates, 3.87
- Use ad blocker extensions, 3.87
- Not send or forward files you haven't scanned for viruses, 3.88
- Overwrite deleted files, 3.88
- Encrypt your WiFi, 3.9
- Unsubscribe from unwanted email lists, 3.9
- Check the extensions of downloaded files, 3.9
- Read privacy policies, 3.91
- Use a paid spam filtering service, 3.91
- Document cyberbullying incidents, 3.91
- Disable message and image previews, 3.91
- Report suspicious things to IT or support, 3.91
- Not be lulled into a false sense of security from antivirus/firewall, 3.91
- Turn off automatic downloads, 3.91
- Use passphrases, 3.91
- Seek expert help, 3.93
- Encrypt cloud data, 3.95
- Make sure no one is watching you enter passwords, 3.95
- Be wary of using public computers that could be infected, 3.95
- Research the security of IoT devices before purchase, 3.95
- Obfuscate something meaningful to generate a password, 3.96
- Log out of accounts, 3.96
- Use passwords that are dissimilar to previous ones, 3.96
- Read terms of service, 3.96
- Start your PC in Safe Mode when you need to troubleshoot viruses, 3.97
- Use unusual phonetics in passwords, 3.97
- Confirm public WiFi information with staff before using, 3.99
- Not send executable programs with macros, 4
- Treat security questions like passwords, 4.01
- Encrypt your other devices, 4.01
- Develop a mnemonic for complex passwords, 4.0199999999999996
- Use both upper and lower case in passwords, 4.04
- Turn off remote access/management features, 4.04
- Restrict physical access to computers and removable media, 4.04
- Discard devices with security weaknesses that can't be fixed, 4.05
- Disable third-party cookies, 4.05
- Buy devices with security-focused platforms, 4.05
- Disable 2G support, 4.06
- Keep your receipts, 4.06
- Delete originals once a document has been encrypted, 4.06
- Beware of malware, 4.07
- Whitelist executable directories to prevent malicious binaries, 4.07
- Regularly search for your name, 4.08
- Consider opening a secondary account for shopping etc., 4.09
- Use a load balancer, 4.09
- Install latest OS updates, 4.09
- Do online banking only on your own computer, 4.10
- Check camera logs, 4.10
- Disable "Universal Plug and Play (UPnP)" on your router, 4.10
- Make sure to overwrite files you want to delete, 4.10
- Not forward email unnecessarily, 4.11
- Enable remote data wiping for devices, 4.11
- Base passwords on upcoming events, 4.11
- Not respond to or retaliate against cyberbullies, 4.12
- Use filters in email, 4.12
- Not forward cyberbullying, 4.13
- Not sign up for unnecessary accounts, 4.13
- Request your data from sites or corporations that store it, 4.13
- Opt out of ad tracking, 4.14
- Be aware of the Internet, 4.15
- Not use a password manager, 4.15
- Not enable file sharing on networks exposed to the Internet, 4.15
- Only copy files onto machines using physical media, 4.16
- Use electronic bank statements, 4.17
- Be aware of what you share, 4.17
- Pay attention to virus warnings, 4.18
- Manage and track cookies, 4.18
- Write down password clues, 4.19
- Report messages as spam, 4.19
- Disconnect your computer from the Internet when you're away, 4.2
- Be suspicious, 4.2
- Keep the computer in a common room in your house if you have children, 4.2
- Check your credit report regularly, 4.21
- Not write down passwords, 4.21
- Keep track of file extensions, 4.22
- Perform a factory reset before device disposal, 4.22
- Not reply to spam, 4.23
- Be careful using email, 4.23
- Disable sharing on peer-to-peer apps, 4.24
- Take note of the countries your VPN providers works in, 4.26
- Change and rethink security questions, 4.27
- Create a network demilitarization zone (DMZ), 4.27
- Keep your own data locally (not in the cloud or on a remote server), 4.28
- Not use your real name online, 4.28
- Understand data usage and storage, 4.28
- Change your router name from the default, 4.28
- Unmount encrypted disks, 4.28
- Not use extensions or plugins, 4.28
- Monitor online accounts for unusual activity, 4.28
- Remove improper and/or sensitive information from the web, 4.28
- Securely wipe devices before disposal, where possible, 4.28
- Configure antivirus to scan all files in real time, 4.29
- Use incognito mode, 4.3
- Create separate networks for devices, 4.31
- Not open email from unknown senders, 4.31
- Consider partitioning your computer into seperate accounts, 4.34
- Not overwrite SSDs, 4.34
- Only do business with trusted institutions, 4.34
- Cancel or change accounts if you are being cyberbullied, 4.35
- Leave unsafe websites, 4.35
- Clear your browser history, 4.35
- Seek professional help for cybersecurity issues, 4.36
- Understand the Internet, 4.36
- Limit the number of antivirus applications you install, 4.37
- Look for the lock icon in the address bar, 4.37
- Be aware of your online reputation, 4.37
- Turn down transmission strength, 4.38
- Use an alarm on your devices, 4.39
- Disconnect from the Internet, 4.39
- Discuss identifiable information in private (so you are not overheard), 4.39
- Not rely on mobile access as a primary means for email, 4.40
- Draw shapes on your keyboard to generate passwords, 4.40
- Set browser to click-to-play for videos and ads, 4.40
- Consider opening a credit card for online use only, 4.40
- Keep sensitive information on removable storage media, 4.40
- Try alternate URLs to avoid censorship, 4.40
- Be cautious when picking an email address, 4.40
- Store passwords properly, 4.41
- Not jailbreak devices, 4.43
- Pin your SSL certificate, 4.44
- Cover your camera, 4.46
- Ask for advice and information about online security and privacy, 4.46
- Let your children teach you about the Internet too, 4.49
- Be wary of third-party apps on social networks, 4.5
- Change your MAC address, 4.51
- Not run tasks as administrator if unnecessary, 4.51
- Talk to children about their online habits, 4.51
- Keep your devices with you when traveling, 4.52
- Remove sensitive files from your machine, 4.52
- Pay attention to and follow software warnings, 4.52
- Use private search engines, 4.56
- Ask people to remove your personal information and photos, 4.57
- Not need to use antivirus on Mac, 4.57
- Disable active content (JavaScript, Flash, etc.), 4.58
- Create copies of your websites (mirror sites), 4.59
- Limit the amount of personal info being collected about you online, 4.61
- Create pronounceable passwords, 4.61
- Use a content delivery network or caching service, 4.61
- Not post your email address on forums, 4.62
- Transfer sensitive files to network shares, 4.63
- Not change browser security settings, 4.66
- Use an air gap, 4.66
- Do online banking on a separate computer, 4.69
- Feel comfortable making weak passwords for sites thar don't keep personal info, 4.69
- Manually type links you receive into the URL bar, 4.7
- Not use encryption when sending e-mail to a listserv, 4.71
- Not meet up with people you've met online, 4.71
- Use Tor, 4.74
- Not try to be anonymous if you don't need to be , 4.74
- Turn off WiFi, 4.75
- Not open documents downloaded through Tor while online, 4.75
- Understand new features before you try them, 4.76
- Suspend unused accounts, 4.76
- Upgrade your email provider, 4.76
- Enable "Do Not Track" or similar options, 4.8
- Download a filtering software to prevent website access, 4.82
- Increase firewall security measures to inspect incoming data, 4.83
- Avoid common passwords, 4.85
- Bring proof-of-purchase for computer equipment when travelling, 4.86
- Use parental controls, 4.86
- Not download or execute any files, 4.8600000000000003
- Not include sensitive information in email, 4.88
- Use a cable lock for your laptop, 4.88
- Use different browsers for different activities, 4.89
- Contact police or authority figures in case of a cyberattack or cyberbullying, 4.89
- Not use Facebook, 4.94
- Only use open-source software, 4.96
- Use less common software, 4.97
- Clear your cache, 4.98
- Isolate IoT devices on their own network, 5.04
- Understand where your child accesses Internet out of the house, 5.06
- Change your username regularly, 5.11
- Make your email subject lines vague since they are not encrypted, 5.11
- Use airplane mode in stores with retail tracking, 5.11
- Use tracking applications, 5.11
- Install software in phases, 5.13
- Use different personas online, 5.14
- Not shut down your computer, 5.15
- Protect your computer from power surges, 5.16
- Not change your passwords unless they become compromised, 5.18
- Not use credit or debit cards online, 5.2
- Store passwords in a file, 5.23
- Carry laptops in something other than laptop cases, 5.27
- Encourage the positive sides of the Internet with children and friends, 5.35
- Shut down your computer, 5.35
- Not use banking apps or websites, 5.4
- Create keyboard patterns to help with remembering passwords, 5.46
- Lock your SIM card in your smartphone, 5.52
- Create multiple accounts, 5.58
- Disable and/or limit caching, 5.63
- Write down passwords on paper, 5.75
- File taxes early, 5.75
- Install firmware on mobile devices, 5.81
- Use an unbranded smartphone, 6.36
- Create a new email address if your last one is compromised, 7.01