Priority Ranking of Advice by Users (Computed with Matrix Factorization)
Security Advice by Category | Security Advice Ranking (Expert) | Security Advice Ranking (User) | Advice Experts Rated Useless and Harmful | Advice Experts Rated High Priority | Full Corpus
- Buy devices with security-focused platforms, 0.748
- Not tell anyone your passwords, even IT, 0.748
- Not open unnecessary attachments, 0.84
- Be wary of using public computers that could be infected, 0.84
- Use antivirus, 0.871
- Not click random or unfamiliar links from unknown senders, 0.900
- Verify suspicious email and email contents, 0.936
- Not open email from unknown senders, 0.98
- Not use passwords based on personal information, 1.01
- Not store passwords online, 1.07
- Not friend people you don't know, 1.07
- Be suspicious if something is too good to be true, 1.079
- Not try to be anonymous if you don't need to be , 1.08
- Use both upper and lower case in passwords, 1.123
- Be wary of third-party apps on social networks, 1.13
- Leave unsafe websites, 1.15
- Make sure no one is watching you enter passwords, 1.147
- Set your antivirus/antimalware to run periodic full scans, 1.16
- Install a firewall, 1.17
- Use passwords, 1.204
- Secure your router, 1.218
- Unsubscribe from unwanted email lists, 1.24
- Lock your computer when you're away from it, 1.26
- Write down password clues, 1.28
- Understand where your child accesses Internet out of the house, 1.28
- Not forward cyberbullying, 1.29
- Remove improper and/or sensitive information from the web, 1.30
- Not reply to spam, 1.304
- Use passwords that are dissimilar to previous ones, 1.33
- Watch for spelling mistakes in provided URLs, 1.331
- Encrypt your WiFi, 1.33
- Log out of accounts, 1.337
- Not open attachments from unknown senders, 1.34
- Not do online banking on a public computer, 1.355
- Not meet up with people you've met online, 1.36
- Lock your smartphone with passcode or touch ID, 1.36
- Change passwords often, 1.371
- Update applications, 1.37
- Securely wipe devices before disposal, where possible, 1.40
- Always keep learning about security and privacy, 1.41
- Start your PC in Safe Mode when you need to troubleshoot viruses, 1.407
- Not jailbreak devices, 1.444
- Be suspicious of unusual email, 1.45
- Be suspicious of unusual email if grammar in an email is not good, 1.46
- Only allow authorized users to access your network, 1.458
- Not run or keep unnecessary programs, 1.47
- Be careful who uses your computer, 1.49
- Only reveal financial information to reputable actors, 1.49
- Install firmware on mobile devices, 1.49
- Visit only known websites, 1.502
- Encrypt your device data, 1.508
- Beware of malware, 1.52
- Understand the Internet, 1.524
- Not enter sensitive information or credentials without HTTPS, 1.53
- Not use automatic network log-in, 1.536
- Not use repetitive characters in passwords, 1.544
- Use a combination of letters, numbers, and special characters in passwords, 1.544
- Confirm public WiFi information with staff before using, 1.54
- Install only trusted software, 1.56
- Disable features you aren't using (BlueTooth, WiFi, etc.), 1.56
- Not use a password manager, 1.57
- Do sensitive tasks on dedicated and trusted devices, 1.573
- Scan files downloaded from websites for viruses, 1.58
- Be suspicious of links, 1.579
- Watch out for phishing, 1.60
- Download only trusted programs, 1.60
- Verify who you are talking to, 1.615
- Beware of "free" products, 1.62
- Use secure payment methods like PayPal, BPay, or credit cards, 1.641
- Protect your computer from power surges, 1.681
- Turn off automatic downloads, 1.681
- Keep virus definitions up to date, 1.69
- Keep your private key safe, 1.70
- Store passwords properly, 1.70
- Use anti-malware software, 1.71
- Delete spam, 1.72
- Use different personas online, 1.73
- Beware of incognito mode, 1.742
- Be suspicious of attachments, 1.744
- Manage and track cookies, 1.746
- Avoid illegal or unaffiliated download sites, 1.746
- Turn off remote access/management features, 1.75
- Seek professional help for cybersecurity issues, 1.756
- Encrypt select groups of files, 1.77
- Turn off/limit pop-ups, 1.78
- Turn on automatic updates for applications, 1.786
- Be suspicious of popups and requests, even from known sources, 1.804
- Clear your cookies, 1.80
- Be aware of the Internet, 1.81
- Be wary of false emails from trusted institutions, 1.833
- Check that websites have valid digital certificates, 1.83
- Not post vulnerable information (addresses, credit card numbers, etc.), 1.843
- Delete phishing or spam emails, even if you might know the sender, 1.85
- Use a secure machine to hold confidential data, 1.87
- Not store mobile passwords directly on the device, 1.877
- Use long passwords, 1.89
- Not open documents downloaded through Tor while online, 1.893
- Beware of revealing personal information unless you know who you're talking to, 1.91
- Cancel or change accounts if you are being cyberbullied, 1.94
- Keep antivirus/antimalware up to date, 1.94
- Not run tasks as administrator if unnecessary, 1.944
- Use unique passwords, 1.97
- Use parental controls, 1.978
- Encrypt your email, 1.99
- Be aware of what you share, 1.99
- Not sign up for unnecessary accounts, 1.992
- Encrypt cloud data, 2.00
- Whitelist executable directories to prevent malicious binaries, 2.00
- Not send or forward files you haven't scanned for viruses, 2.004
- Read terms of service, 2.00
- Not download or execute any files, 2.008
- Ensure Wifi is secured to at least WPA2 level, 2.01
- Use a password to protect your WiFi, 2.01
- Not use your real name online, 2.02
- Keep your devices with you when traveling, 2.02
- Clear your cache, 2.03
- Only use open-source software, 2.04
- Backup your password database, 2.05
- Use a disposable email service, 2.06
- Document cyberbullying incidents, 2.06
- Update devices, 2.06
- Use browsers that protect against phishing, 2.07
- Look at the URL bar to verify you're at the intended website, 2.07
- Not post your email address on forums, 2.07
- Be suspicious, 2.08
- Use a password that's different from your username, 2.09
- Report suspicious things to IT or support, 2.093
- Pin your SSL certificate, 2.1
- Be cautious when picking an email address, 2.10
- Change and rethink security questions, 2.137
- Check the extensions of downloaded files, 2.14
- Set antivirus to autoscan email, 2.165
- Disable extension-hiding for known file types, 2.17
- Perform a factory reset before device disposal, 2.17
- Understand new features before you try them, 2.18
- Monitor online accounts for unusual activity, 2.181
- Minimize network exposure for control systems, 2.181
- Not share third party personal information i.e. friends and family, 2.19
- Encourage the positive sides of the Internet with children and friends, 2.21
- Set rules for your kids about the Internet, 2.21
- Secure other devices like you would your computer, 2.23
- Disable and/or limit caching, 2.23
- Configure antivirus to scan all files in real time, 2.23
- Not follow links in spam, 2.24
- Not enter passwords after clicking links in email, 2.24
- Educate yourself on how to avoid fraud, 2.24
- Turn on download notifications, 2.24
- Avoid using open Wi-Fi networks for business, banking, shopping etc., 2.25
- Double check email addresses, 2.259
- Look for the lock icon in the address bar, 2.25
- Research the security of IoT devices before purchase, 2.262
- Use anti-spyware, 2.27
- Test your firewall, 2.28
- Not change browser security settings, 2.28
- Disconnect your computer from the Internet when you're away, 2.28
- Shut down your computer, 2.29
- Ask for advice and information about online security and privacy, 2.29
- Limit the amount of personal info being collected about you online, 2.31
- Report account breaches or losses to the appropriate people, 2.31
- Set browser to click-to-play for videos and ads, 2.31
- Take only devices you need when traveling, 2.32
- Restrict physical access to computers and removable media, 2.32
- Regularly back up your data, 2.32
- Make sure to overwrite files you want to delete, 2.331
- Seek expert help, 2.33
- Monitor credit cards for unauthorized activity, 2.34
- Understand what permissions you give new software downloads, 2.34
- Use an unbranded smartphone, 2.35
- Monitor network traffic on your router, 2.35
- Increase firewall security measures to inspect incoming data, 2.35
- Apply real-world common sense and follow your instincts, 2.355
- Be aware of your online reputation, 2.36
- Not be lulled into a false sense of security from antivirus/firewall, 2.37
- Do online banking only on your own computer, 2.39
- Develop a mnemonic for complex passwords, 2.387
- Delete originals once a document has been encrypted, 2.387
- Protect devices against power surges, 2.403
- Use strong passwords, 2.40
- Be careful with permissions, 2.41
- Not store passwords in a file, 2.41
- Secure devices and fix vulnerabilities that caused the breach, 2.431
- Change default passwords on devices/networks/services, 2.44
- Consider opening a secondary account for shopping etc., 2.44
- Physically destroy drives you're done with and wish to erase, 2.46
- Be careful using email, 2.47
- Report messages as spam, 2.47
- Be suspicious of unusual email of things even from known people, 2.47
- Only use HTTPS, 2.476
- Not use look-alike substitutions for your password, 2.484
- File taxes early, 2.484
- Only do business with trusted institutions, 2.48
- Discuss identifiable information in private (so you are not overheard), 2.49
- Not click on flashy things, 2.49
- Avoid common passwords, 2.508
- Create a new email address if your last one is compromised, 2.512
- Don't trust sites with certificate warnings, 2.52
- Limit the number of antivirus applications you install, 2.52
- Disable automatic download of email attachments, 2.52
- Check if website you're visiting uses HTTPS, 2.53
- Exit sites your browser warns are malicious, 2.536
- Only download things you are looking for, 2.536
- Avoid passwords with only numbers, 2.55
- Turn on automatic updates for devices, 2.55
- Be careful entering passwords in public computers, 2.552
- Remember your passwords, 2.58
- Keep your receipts, 2.577
- Keep sensitive information on removable storage media, 2.585
- Remove unsafe devices from the network, 2.589
- Not use extensions or plugins, 2.59
- Watch for unusual posts on your account, 2.60
- Use a proxy server, 2.605
- Contact police or authority figures in case of a cyberattack or cyberbullying, 2.61
- Disable your webcam, 2.61
- Suspend unused accounts, 2.62
- Obfuscate something meaningful to generate a password, 2.63
- Create copies of your websites (mirror sites), 2.633
- Apply the highest level of security that's practical, 2.637
- Use electronic bank statements, 2.645
- Make your email subject lines vague since they are not encrypted, 2.645
- Download a filtering software to prevent website access, 2.665
- Overwrite deleted files, 2.68
- Remain anonymous online, 2.68
- Not send executable programs with macros, 2.68
- Disable sharing on peer-to-peer apps, 2.68
- Install latest OS updates, 2.70
- Not blindly trust HTTPS, 2.70
- Be careful of downloads, 2.70
- Not give out your email address without good reason, 2.70
- Check your credit report regularly, 2.70
- Replace letters with symbols in your passwords, 2.71
- Use single sign-on SSO, 2.71
- Not store data if you don't need to, 2.71
- Not respond to or retaliate against cyberbullies, 2.722
- Not trust the From address on an email, 2.722
- Read install prompts, 2.72
- Fully reset hacked devices, 2.74
- Pay attention to and follow software warnings, 2.73
- Disable third-party cookies, 2.73
- Upgrade your email provider, 2.74
- Not give out your email address for free software downloads, 2.746
- Cover your camera, 2.754
- Turn off location services, 2.758
- Scan attachments you open for viruses, 2.758
- Be wary of proxy servers, 2.758
- Beware of free VPN programs, 2.76
- Treat security questions like passwords, 2.77
- Use 2+ factor authentication, 2.78
- Understand data usage and storage, 2.78
- Use unusual phonetics in passwords, 2.80
- Clear your browser history, 2.80
- Use randomly generated passwords or password generator websites, 2.80
- Draw shapes on your keyboard to generate passwords, 2.81
- Change passwords and security questions on compromised accounts, 2.84
- Use privacy settings, 2.86
- Not use banking apps or websites, 2.86
- Only add people you know in the offline world to contact lists, 2.87
- Read privacy policies, 2.87
- Only copy files onto machines using physical media, 2.87
- Unmount encrypted disks, 2.88
- Buy devices with passwords, preferably passwords that you can change, 2.88
- Keep your own data locally (not in the cloud or on a remote server), 2.88
- Use passphrases, 2.88
- Use administrator rights to prevent unauthorized actions, 2.91
- Install software in phases, 2.92
- Transfer sensitive files to network shares, 2.92
- Use end-to-end encryption for communication, 2.927
- Use different computers for work and home use, 2.931
- Enable "Do Not Track" or similar options, 2.94
- Use different passwords for different accounts/devices, 2.94
- Keep track of file extensions, 2.94
- Run a virus scan on new devices, 2.944
- Discard devices with security weaknesses that can't be fixed, 2.95
- Look for real-world contact information while online, 2.96
- Avoid plugging external devices into computers, 2.96
- Opt out of ad tracking, 2.972
- Turn down transmission strength, 2.99
- Make a threat model, 3.00
- Use encryption, 3.00
- Use a VPN, 3.00
- Remain calm and talk with kids about bad web experiences, 3.01
- Manually type links you receive into the URL bar, 3.01
- Encrypt your other devices, 3.01
- Disconnect from the Internet, 3.02
- Use unique passwords for different accounts, 3.02
- Talk to children about their online habits, 3.04
- Remove sensitive files from your machine, 3.05
- Not shut down your computer, 3.05
- Block unwanted users, 3.07
- Use filters in email, 3.073
- Regularly search for your name, 3.08
- Not enable file sharing on networks exposed to the Internet, 3.09
- Use airplane mode in stores with retail tracking, 3.09
- Disable 2G support, 3.09
- Verify URLs you visit, 3.10
- Disable Autorun to prevent malicious code from running, 3.10
- Isolate IoT devices on their own network, 3.10
- Pay attention to virus warnings, 3.10
- Use a password manager, 3.11
- Request your data from sites or corporations that store it, 3.11
- Encourage others to use strong passwords, 3.12
- Not include sensitive information in email, 3.12
- Use private search engines, 3.121
- Lock your SIM card in your smartphone, 3.15
- Use security extensions, 3.15
- Ask people to remove your personal information and photos, 3.15
- Not use debit cards, 3.16
- Consider partitioning your computer into seperate accounts, 3.17
- Not identify yourself to websites, 3.18
- Keep passwords safe if written down, 3.19
- Bring proof-of-purchase for computer equipment when travelling, 3.20
- Use tracking applications, 3.206
- Review your root certificates, 3.21
- Use less common software, 3.21
- Not click on ads, 3.22
- Use an alarm on your devices, 3.22
- Turn off Bluetooth, 3.22
- Not write down passwords, 3.23
- Not need to use antivirus on Mac, 3.23
- Set up auto-lock timers for your smartphone, 3.23
- Use different browsers for different activities, 3.23
- Create pronounceable passwords, 3.26
- Do online banking on a separate computer, 3.26
- Not forward email unnecessarily, 3.27
- Encourage children to follow age limit guidelines for websites, 3.28
- Write down passwords on paper, 3.28
- Consider opening a credit card for online use only, 3.30
- Not use Facebook, 3.30
- Not give out your email address for free samples or products, 3.3
- Change your username regularly, 3.30
- Check camera logs, 3.306
- Encourage children to talk to you if they feel uncomfortable online, 3.31
- Use a paid spam filtering service, 3.31
- Enable remote data wiping for devices, 3.31
- Disable message and image previews, 3.32
- Take note of the countries your VPN providers works in, 3.32
- Use a load balancer, 3.371
- Store passwords in a file, 3.375
- Feel comfortable making weak passwords for sites that don't keep personal info, 3.37
- Monitor where your kids go online, 3.39
- Verify file signatures, 3.4
- Disable active content (JavaScript, Flash, etc.), 3.43
- Encrypt your hard drive, 3.432
- Not use built-in erasing on SSDs, 3.44
- Turn off WiFi, 3.45
- Disable macros, 3.46
- Understand who to trust online, 3.468
- Not use dictionary words as or in passwords, 3.468
- Use incognito mode, 3.48
- Encourage others to use Tor, 3.488
- Keep the computer in a common room in your house if you have children, 3.49
- Create keyboard patterns to help with remembering passwords, 3.492
- Use a content delivery network or caching service, 3.50
- Change your router name from the default, 3.52
- Not use encryption when sending e-mail to a listserv, 3.54
- Not overwrite SSDs, 3.56
- Not let computers or browsers remember passwords, 3.56
- Not change your passwords unless they become compromised, 3.589
- Create separate networks for devices, 3.61
- Not use credit or debit cards online, 3.62
- Disable "Universal Plug and Play (UPnP)" on your router, 3.622
- Use a virtual machine or even multiple virtual machines, 3.633
- Base passwords on upcoming events, 3.66
- Use ad blocker extensions, 3.67
- Not rely on mobile access as a primary means for email, 3.68
- Use an air gap, 3.738
- Carry laptops in something other than laptop cases, 3.798
- Create a network demilitarization zone (DMZ), 3.82
- Create multiple accounts, 3.83
- Let your children teach you about the Internet too, 3.851
- Use Tor, 3.87
- Use a cable lock for your laptop, 4.01
- Try alternate URLs to avoid censorship, 4.01
- Not use loyalty cards, 4.05
- Change your MAC address, 4.173