← Back to Tools

Security Basics

Understand cybersecurity threats, how attacks work, and how to defend yourself

Contents

  1. The Threat Landscape
  2. Common Attack Types
  3. Core Security Principles
  4. Recognizing Phishing
  5. Malware Prevention
  6. Updates & Patching
  7. Backups: Your Last Line of Defense
πŸ—ΊοΈ

The Threat Landscape

Cybersecurity threats come from many directions: opportunistic criminals running automated attacks, targeted attacks by skilled adversaries, malicious insiders, and nation-state actors. Most people only face the first category β€” automated opportunistic attacks.

The good news: most cyberattacks are not sophisticated. They exploit the same basic weaknesses: reused passwords, unpatched software, and clicking on malicious links. Fixing these three problems eliminates the vast majority of your risk.

The 80/20 rule of security: 80% of breaches are caused by just a few root causes β€” weak passwords, phishing, unpatched vulnerabilities, and misconfigured systems. Fixing these is more valuable than exotic defenses.
βš”οΈ

Common Attack Types

🎣 Phishing
Tricking you into revealing credentials or installing malware via deceptive emails, SMS, or calls. Over 90% of data breaches start with phishing.
βœ“ Verify sender addresses β€’ Don't click unexpected links β€’ Use 2FA β€’ Hover over links before clicking
πŸ” Credential Stuffing
Attackers take email/password combinations from breached databases and try them on other services. Works because most people reuse passwords.
βœ“ Unique password for every site β€’ Use a password manager β€’ Enable 2FA β€’ Check haveibeenpwned.com
πŸ’° Ransomware
Malware that encrypts your files and demands payment to decrypt them. Often delivered via phishing or exploit kits. Can spread across networks.
βœ“ Regular offline backups (3-2-1 rule) β€’ Don't open unexpected attachments β€’ Keep systems patched β€’ Email filtering
πŸ•΅οΈ Social Engineering
Manipulating people into taking actions or revealing information. Exploits trust, urgency, authority, and reciprocity β€” not technical vulnerabilities.
βœ“ Verify requests through known channels β€’ Never give credentials to inbound callers β€’ Create a verification code word with family
πŸ”“ Unpatched Vulnerabilities
Attackers exploit known security flaws in software that hasn't been updated. Eternal Blue (used in WannaCry) was patched by Microsoft months before it caused $4B in damage.
βœ“ Enable automatic updates β€’ Patch within 48 hours of critical releases β€’ Remove unused software
πŸ›οΈ

Core Security Principles

🎯 Least Privilege
Grant users only the minimum access needed. If a process doesn't need admin rights, don't give it admin rights.
πŸ›‘οΈ Defense in Depth
Multiple layers of security. If one layer fails, others still protect. No single control is sufficient.
πŸ”’ Zero Trust
Never trust, always verify. Assume breach. Don't trust network location β€” verify every access request explicitly.
πŸ“ Attack Surface Reduction
Remove what you don't use. Fewer services, ports, users, and software = fewer ways to attack.
πŸ“‹ Separation of Duties
No single person should have enough access to commit and conceal fraud. Split critical functions across multiple people.
πŸ“Š Audit & Monitor
Log everything. You can't detect what you can't measure. Anomalies in logs often reveal breaches in progress.
🎣

Recognizing Phishing

Email Red Flags

Golden rule: If an email asks you to click a link to log in, don't use the link. Instead, type the website address directly into your browser or use your saved bookmark.
🦠

Malware Prevention

πŸ”„

Updates & Patching

The majority of successful cyberattacks exploit vulnerabilities that have already been patched. Updates are not optional β€” they are your most reliable defense against known threats.

The WannaCry ransomware (2017) infected 230,000 computers using a vulnerability Microsoft had patched two months earlier. Patching is free. Ransomware recovery is not.
πŸ’Ύ

Backups: Your Last Line of Defense

Backups protect against ransomware, hardware failure, accidental deletion, and theft. The 3-2-1 rule is the gold standard:

Critical: A backup connected to your computer can also be encrypted by ransomware. Keep at least one backup that is offline or air-gapped.

Test your backups periodically by actually restoring a file. A backup you've never tested is not a backup β€” it's a hope.