This field guide was originally published as a set of recommended practices for my clients who were taking my class “Cyber Security Best Practices for High Net Worth Individuals”. In that class, we focus on the basics of reducing your personal risk from cyber criminals without the uncertainty and time commitment so they can project their family and business.
For my colleagues, this may seem an elusive goal because we’ve all seen the difficulty in preventing cyber events from disrupting business causing significant loss.
Where this program differs is that it addresses many of the simple issues that create some of the largest risks. While no program is able to entirely prevent a dedicated adversary, this program guarantees to lower risk if the user follows the recommendations.
To this point, I’ve been asked for a more detailed set of Standard Operating Procedures in order to enable some of these suggestions. While there isn’t a one sized solution for all users, this is a set of capabilities that can be useful in reducing overall cybersecurity risk. For this reason, it isn’t being published as a book, but rather a set of individual SOPs that can be used by anyone. For that reason, it’s free, open, and setup to encourage feedback and discussion.
This page serves as an index, or table of contents based on the modules of the program. They are laid out in no specific order, except maybe that in which they are created. I hope that you find them useful. If you have any suggestions, please send them to fieldguide@cyberfoundry.io.
Module 1: Secure Your Laptop
ID | Status | Date | Title |
---|---|---|---|
Module 2: Secure Your Smartphone
ID | Status | Date | Title |
---|---|---|---|
Module 3: Security While Traveling
ID | Status | Date | Title |
---|---|---|---|