Don’t Panic Protocol A Cybersecurity Framework for the rest of us. 2024-11-24T21:11:55Z http://dontpanicprotocol.org Michael Helmers 🏗️ The Framework 2024-11-24T21:11:55Z http://dontpanicprotocol.org/framework/ <h2 id="1.-why-cybersecurity-matters" tabindex="-1">1. <strong>Why Cybersecurity Matters</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#1.-why-cybersecurity-matters" aria-hidden="true">#</a></h2> <p>Cybersecurity is the foundation of your digital life. Every click, login, or post contributes to your online footprint, and protecting it ensures peace of mind in an increasingly connected world.</p> <h3 id="the-stakes" tabindex="-1">The Stakes<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#the-stakes" aria-hidden="true">#</a></h3> <ul> <li><strong>Personal Data:</strong> Guard sensitive information like banking credentials and personal files.</li> <li><strong>Identity Theft:</strong> Prevent cybercriminals from exploiting your identity.</li> <li><strong>Peace of Mind:</strong> Explore the digital galaxy without fear of compromise.</li> </ul> <hr /> <h2 id="2.-step-1%3A-authentication" tabindex="-1">2. <strong>Step 1: Authentication</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#2.-step-1%3A-authentication" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/authentication">🔐 Authentication</a></p> <p>Authentication is your first line of defense. Strengthen your digital locks with these best practices:</p> <h3 id="2.1-use-strong-passwords" tabindex="-1">2.1 Use Strong Passwords<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#2.1-use-strong-passwords" aria-hidden="true">#</a></h3> <ul> <li>Use at least 16 characters combining uppercase, lowercase, numbers, and symbols.</li> <li>Store and generate unique passwords with a tool like <a href="https://bitwarden.com/">Bitwarden</a>.</li> </ul> <h3 id="2.2-enable-multifactor-authentication-(mfa)" tabindex="-1">2.2 Enable Multifactor Authentication (MFA)<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#2.2-enable-multifactor-authentication-(mfa)" aria-hidden="true">#</a></h3> <ul> <li>Turn on MFA (sometimes called 2FA) for all accounts.</li> <li>Use apps like <a href="https://authy.com/">Authy</a> or hardware keys like YubiKey.</li> </ul> <hr /> <h2 id="3.-step-2%3A-web-browsing" tabindex="-1">3. <strong>Step 2: Web Browsing</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#3.-step-2%3A-web-browsing" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/web-browsing">🌐 Web Browsing</a></p> <p>Your browser is your gateway to the internet. Make it secure:</p> <h3 id="3.1-use-privacy-focused-browsers" tabindex="-1">3.1 Use Privacy-Focused Browsers<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#3.1-use-privacy-focused-browsers" aria-hidden="true">#</a></h3> <ul> <li>Choose secure browsers like <a href="https://brave.com/">Brave</a> or <a href="https://www.mozilla.org/en-US/">Firefox</a>.</li> </ul> <h3 id="3.2-install-tracker-blockers" tabindex="-1">3.2 Install Tracker Blockers<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#3.2-install-tracker-blockers" aria-hidden="true">#</a></h3> <ul> <li>Extensions like <a href="https://ublockorigin.com/">uBlock Origin</a> and <a href="https://privacybadger.org/">Privacy Badger</a> can block ads and trackers.</li> </ul> <hr /> <h2 id="4.-step-3%3A-ongoing-maintenance" tabindex="-1">4. <strong>Step 3: Ongoing Maintenance</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#4.-step-3%3A-ongoing-maintenance" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/ongoing-maintenance">🔄 Ongoing Maintenance</a></p> <p>Regular upkeep keeps your defenses strong:</p> <h3 id="4.1-schedule-updates-and-backups" tabindex="-1">4.1 Schedule Updates and Backups<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#4.1-schedule-updates-and-backups" aria-hidden="true">#</a></h3> <ul> <li>Enable automatic updates for devices and software.</li> <li>Back up files to both cloud and physical storage.</li> </ul> <h3 id="4.2-monitor-activity" tabindex="-1">4.2 Monitor Activity<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#4.2-monitor-activity" aria-hidden="true">#</a></h3> <ul> <li>Review login attempts and account activity frequently.</li> <li>Run regular security scans with tools like <a href="https://www.malwarebytes.com/">Malwarebytes</a>.</li> </ul> <hr /> <h2 id="5.-step-4%3A-networks" tabindex="-1">5. <strong>Step 4: Networks</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#5.-step-4%3A-networks" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/networks">🌐 Networks</a></p> <p>Your home network is your digital fortress:</p> <h3 id="5.1-secure-your-router" tabindex="-1">5.1 Secure Your Router<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#5.1-secure-your-router" aria-hidden="true">#</a></h3> <ul> <li>Change default router credentials.</li> <li>Enable WPA3 encryption and update firmware.</li> </ul> <h3 id="5.2-create-guest-networks" tabindex="-1">5.2 Create Guest Networks<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#5.2-create-guest-networks" aria-hidden="true">#</a></h3> <ul> <li>Isolate IoT devices on a separate network to limit exposure.</li> </ul> <hr /> <h2 id="6.-step-5%3A-iot-devices" tabindex="-1">6. <strong>Step 5: IoT Devices</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#6.-step-5%3A-iot-devices" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/iot">🌐 Internet of Things (IoT)</a></p> <p>IoT devices are convenient but can pose risks. Secure them by:</p> <h3 id="6.1-changing-default-settings" tabindex="-1">6.1 Changing Default Settings<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#6.1-changing-default-settings" aria-hidden="true">#</a></h3> <ul> <li>Use unique passwords and disable unused features like microphones.</li> </ul> <h3 id="6.2-segmenting-your-network" tabindex="-1">6.2 Segmenting Your Network<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#6.2-segmenting-your-network" aria-hidden="true">#</a></h3> <ul> <li>Use guest Wi-Fi for IoT devices to prevent access to sensitive data.</li> </ul> <hr /> <h2 id="7.-step-6%3A-personal-devices" tabindex="-1">7. <strong>Step 6: Personal Devices</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#7.-step-6%3A-personal-devices" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/personal-devices">📱 Personal Devices</a></p> <p>Protect smartphones, laptops, and tablets:</p> <h3 id="7.1-encrypt-and-update" tabindex="-1">7.1 Encrypt and Update<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#7.1-encrypt-and-update" aria-hidden="true">#</a></h3> <ul> <li>Enable full-disk encryption and automatic updates.</li> </ul> <h3 id="7.2-use-vpns-and-antivirus" tabindex="-1">7.2 Use VPNs and Antivirus<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#7.2-use-vpns-and-antivirus" aria-hidden="true">#</a></h3> <ul> <li>Use VPNs like <a href="https://protonvpn.com/">ProtonVPN</a> on public Wi-Fi.</li> <li>Install antivirus software to protect against malware.</li> </ul> <hr /> <h2 id="8.-step-7%3A-secure-messaging" tabindex="-1">8. <strong>Step 7: Secure Messaging</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#8.-step-7%3A-secure-messaging" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/secure-messaging">📩 Secure Messaging</a></p> <p>Keep your conversations private:</p> <h3 id="8.1-choose-encrypted-apps" tabindex="-1">8.1 Choose Encrypted Apps<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#8.1-choose-encrypted-apps" aria-hidden="true">#</a></h3> <ul> <li>Use apps like <a href="https://signal.org/">Signal</a> or <a href="https://getsession.org/">Session</a>.</li> </ul> <h3 id="8.2-enable-disappearing-messages" tabindex="-1">8.2 Enable Disappearing Messages<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#8.2-enable-disappearing-messages" aria-hidden="true">#</a></h3> <ul> <li>Set messages to auto-delete to minimize long-term exposure.</li> </ul> <hr /> <h2 id="9.-step-8%3A-social-media" tabindex="-1">9. <strong>Step 8: Social Media</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#9.-step-8%3A-social-media" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/social-media">📣 Social Media</a></p> <p>Control what you share and who sees it:</p> <h3 id="9.1-adjust-privacy-settings" tabindex="-1">9.1 Adjust Privacy Settings<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#9.1-adjust-privacy-settings" aria-hidden="true">#</a></h3> <ul> <li>Limit visibility to friends or specific groups.</li> </ul> <h3 id="9.2-avoid-oversharing" tabindex="-1">9.2 Avoid Oversharing<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#9.2-avoid-oversharing" aria-hidden="true">#</a></h3> <ul> <li>Refrain from posting sensitive details like vacation plans or addresses.</li> </ul> <hr /> <h2 id="10.-step-9%3A-physical-security" tabindex="-1">10. <strong>Step 9: Physical Security</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#10.-step-9%3A-physical-security" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/physical-security">🔒 Physical Security</a></p> <p>Physical security complements digital practices:</p> <h3 id="10.1-lock-devices" tabindex="-1">10.1 Lock Devices<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#10.1-lock-devices" aria-hidden="true">#</a></h3> <ul> <li>Use strong passwords or biometrics to secure devices.</li> </ul> <h3 id="10.2-secure-your-workspace" tabindex="-1">10.2 Secure Your Workspace<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#10.2-secure-your-workspace" aria-hidden="true">#</a></h3> <ul> <li>Invest in locked storage and physical barriers like privacy screens.</li> </ul> 📚 Glossary 2024-11-24T21:11:55Z http://dontpanicprotocol.org/glossary/ <p>Understanding cybersecurity starts with mastering the language. Here's your guide to common terms and concepts, explained simply and paired with practical tips.</p> <hr /> <h3 id="%F0%9F%94%91-authentication" tabindex="-1">🔑 <strong>Authentication</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%94%91-authentication" aria-hidden="true">#</a></h3> <p>The process of verifying that a user or device is who they claim to be before granting access to a system. Common methods include:</p> <ul> <li>Passwords</li> <li>Biometrics (like fingerprints)</li> <li>Multifactor authentication (MFA)</li> </ul> <p><strong>Why it matters:</strong> Authentication is your first line of defense against unauthorized access.<br /> <a href="https://en.wikipedia.org/wiki/Authentication">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%9B%A1%EF%B8%8F-cybersecurity" tabindex="-1">🛡️ <strong>Cybersecurity</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%9B%A1%EF%B8%8F-cybersecurity" aria-hidden="true">#</a></h3> <p>The art of protecting systems, networks, and data from attacks. Cybersecurity focuses on three key areas:</p> <ul> <li>Confidentiality: Keeping your information private.</li> <li>Integrity: Ensuring data isn’t altered.</li> <li>Availability: Making sure your data is accessible when you need it.</li> </ul> <p><strong>Why it matters:</strong> Every device and network you use benefits from strong cybersecurity practices.<br /> <a href="https://en.wikipedia.org/wiki/Computer_security">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%8C%90-digital-footprint" tabindex="-1">🌐 <strong>Digital Footprint</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%8C%90-digital-footprint" aria-hidden="true">#</a></h3> <p>The trail of data you leave behind when you go online. This includes:</p> <ul> <li>Social media posts</li> <li>Websites you visit</li> <li>Purchases and subscriptions</li> </ul> <p><strong>Pro Tip:</strong> Use private browsing modes and clear your cookies to minimize your footprint.<br /> <a href="https://en.wikipedia.org/wiki/Digital_footprint">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%94%90-encryption" tabindex="-1">🔐 <strong>Encryption</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%94%90-encryption" aria-hidden="true">#</a></h3> <p>The practice of scrambling data to make it unreadable without a key. Encryption ensures data stays secure during:</p> <ul> <li>File storage</li> <li>Online communication (look for HTTPS in your browser)</li> </ul> <p><strong>Why it matters:</strong> It’s the reason cybercriminals can’t read your messages or steal your credit card info during transactions.<br /> <a href="https://en.wikipedia.org/wiki/Encryption">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%91%BE-malware" tabindex="-1">👾 <strong>Malware</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%91%BE-malware" aria-hidden="true">#</a></h3> <p>Short for &quot;malicious software,&quot; malware is designed to harm your devices or steal your data. Common types include:</p> <ul> <li>Viruses: Infect files and spread.</li> <li>Ransomware: Locks your files and demands payment.</li> <li>Spyware: Secretly gathers information.</li> </ul> <p><strong>Pro Tip:</strong> Install antivirus software and run regular scans to keep malware at bay.<br /> <a href="https://en.wikipedia.org/wiki/Malware">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%94%92-multifactor-authentication-(mfa)" tabindex="-1">🔒 <strong>Multifactor Authentication (MFA)</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%94%92-multifactor-authentication-(mfa)" aria-hidden="true">#</a></h3> <p>An extra layer of security that requires two or more steps to verify your identity, such as:</p> <ul> <li>A password</li> <li>A fingerprint or face scan</li> <li>A one-time code sent to your phone</li> </ul> <p><strong>Pro Tip:</strong> Always enable MFA for important accounts like email and banking.<br /> <a href="https://en.wikipedia.org/wiki/Multi-factor_authentication">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%94%91-password-manager" tabindex="-1">🔑 <strong>Password Manager</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%94%91-password-manager" aria-hidden="true">#</a></h3> <p>A tool that securely stores your passwords and generates strong, unique passwords for your accounts.</p> <ul> <li>Simplifies login processes.</li> <li>Ensures you don’t reuse weak passwords.</li> </ul> <p><strong>Top Picks:</strong> <a href="https://bitwarden.com/">Bitwarden</a>, <a href="https://1password.com/">1Password</a>.<br /> <a href="https://en.wikipedia.org/wiki/Password_manager">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%8E%A3-phishing" tabindex="-1">🎣 <strong>Phishing</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%8E%A3-phishing" aria-hidden="true">#</a></h3> <p>A scam where attackers pose as trusted entities (like your bank) to trick you into revealing sensitive information. Phishing attempts often come through:</p> <ul> <li>Email</li> <li>Text messages</li> <li>Fake websites</li> </ul> <p><strong>How to spot it:</strong> Look for typos, suspicious URLs, and unexpected requests for personal data.<br /> <a href="https://en.wikipedia.org/wiki/Phishing">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%92%B8-ransomware" tabindex="-1">💸 <strong>Ransomware</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%92%B8-ransomware" aria-hidden="true">#</a></h3> <p>Malware that locks your files and demands payment (a ransom) to release them.<br /> <strong>How to avoid it:</strong></p> <ul> <li>Back up your files regularly.</li> <li>Avoid clicking on unknown links or downloading suspicious attachments.<br /> <a href="https://en.wikipedia.org/wiki/Ransomware">Learn more on Wikipedia</a></li> </ul> <hr /> <h3 id="%F0%9F%95%B5%EF%B8%8F-social-engineering" tabindex="-1">🕵️ <strong>Social Engineering</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%95%B5%EF%B8%8F-social-engineering" aria-hidden="true">#</a></h3> <p>A tactic that manipulates people into giving up private information. Examples include:</p> <ul> <li>Phishing</li> <li>Pretexting (creating fake scenarios to gain trust)</li> <li>Tailgating (following someone into a secure area)</li> </ul> <p><strong>Why it matters:</strong> Cybersecurity isn’t just about tech—it’s about people, too.<br /> <a href="https://en.wikipedia.org/wiki/Social_engineering_(security)">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%8C%90-virtual-private-network-(vpn)" tabindex="-1">🌐 <strong>Virtual Private Network (VPN)</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%8C%90-virtual-private-network-(vpn)" aria-hidden="true">#</a></h3> <p>A service that encrypts your internet connection and hides your IP address, making your browsing activity private.<br /> <strong>Pro Tip:</strong> Use a VPN when on public Wi-Fi to prevent data interception.<br /> <a href="https://en.wikipedia.org/wiki/Virtual_private_network">Learn more on Wikipedia</a></p> <hr /> <h3 id="%E2%9A%A0%EF%B8%8F-vulnerability" tabindex="-1">⚠️ <strong>Vulnerability</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%E2%9A%A0%EF%B8%8F-vulnerability" aria-hidden="true">#</a></h3> <p>A weakness in software, hardware, or a network that attackers can exploit.<br /> <strong>Pro Tip:</strong> Regular updates and patches fix vulnerabilities before attackers can use them.<br /> <a href="https://en.wikipedia.org/wiki/Vulnerability_(computing)">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%93%B6-wi-fi-security" tabindex="-1">📶 <strong>Wi-Fi Security</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%93%B6-wi-fi-security" aria-hidden="true">#</a></h3> <p>Measures to protect your wireless network, such as:</p> <ul> <li>Enabling WPA3 or WPA2 encryption.</li> <li>Changing default router credentials.</li> <li>Setting up a guest network for visitors or IoT devices.</li> </ul> <p><strong>Why it matters:</strong> A secure network is the foundation of your digital safety.<br /> <a href="https://en.wikipedia.org/wiki/Wireless_security">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%95%B5%EF%B8%8F-zero-day-exploit" tabindex="-1">🕵️ <strong>Zero-Day Exploit</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%95%B5%EF%B8%8F-zero-day-exploit" aria-hidden="true">#</a></h3> <p>An attack that targets a software vulnerability unknown to the developer, leaving no time for a fix.<br /> <strong>Pro Tip:</strong> Keep software updated to protect against patched exploits.<br /> <a href="https://en.wikipedia.org/wiki/Zero-day_(computing)">Learn more on Wikipedia</a></p> 📖 About 2024-11-24T21:11:55Z http://dontpanicprotocol.org/about/ <blockquote> <p>&quot;It is said that despite its many glaring (and occasionally fatal) inaccuracies, the Hitchhiker's Guide to the Galaxy itself has outsold the Encyclopedia Galactica because it is slightly cheaper, and because it has the words 'DON'T PANIC' in large, friendly letters on the cover.&quot;</p> <p><em>The Hitchhiker's Guide to the Galaxy</em> by Douglas Adams 🚀</p> </blockquote> <h2 id="%F0%9F%8C%9F-inspiration" tabindex="-1">🌟 Inspiration<a class="tdbc-anchor" href="http://dontpanicprotocol.org/about/#%F0%9F%8C%9F-inspiration" aria-hidden="true">#</a></h2> <p>The idea for the Don’t Panic Protocol is inspired by <strong>Douglas Adams’ “The Hitchhiker’s Guide to the Galaxy.”</strong> 📚 In the story, the guidebook has the comforting words “DON’T PANIC” on its cover, a reminder to approach challenges with calm and clarity. This project aims to bring that same approach to cybersecurity: no jargon, no panic, just straightforward steps to stay safe online. 🌈</p> <p>In today’s digital world, everyone deserves to feel secure, regardless of technical background. The Don’t Panic Protocol was created to be a friendly, easy-to-use resource for everyday users and small business owners, with practical guidance and tools to tackle the most common security challenges. 🔐</p> <h2 id="%F0%9F%91%8B-about-the-creator" tabindex="-1">👋 About the Creator<a class="tdbc-anchor" href="http://dontpanicprotocol.org/about/#%F0%9F%91%8B-about-the-creator" aria-hidden="true">#</a></h2> <p>Hi, I’m <strong>Mike Helmers</strong>, the creator and developer of the Don’t Panic Protocol. 👨‍💻 I’m passionate about making technology and security accessible for everyone, especially those who may not have a technical background. Currently, I’m studying cybersecurity in graduate school at the <em>University of Wisconsin - Green Bay</em> and working in the field at <em>Wisconsin Employee Trust Fund (ETF)</em>, where I focus on practical solutions to keep digital information secure. 💼</p> <p>In my free time, I enjoy playing <strong>Dungeons &amp; Dragons</strong> 🎲 and exploring how technology can enrich our lives. The Don’t Panic Protocol is my way of helping others feel more confident and secure in their digital spaces. If you have any questions or feedback, feel free to reach out to me at <a href="mailto:helmmp15@uwgb.edu">helmmp15@uwgb.edu</a> 📩.</p> <p>Thank you for visiting, and remember: <strong>don’t panic</strong> – you’ve got this! 💪😊</p> ❓ FAQ 2024-11-24T21:11:55Z http://dontpanicprotocol.org/faq/ <h2 id="frequently-asked-questions%3A-don%E2%80%99t-panic-protocol" tabindex="-1">Frequently Asked Questions: Don’t Panic Protocol<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#frequently-asked-questions%3A-don%E2%80%99t-panic-protocol" aria-hidden="true">#</a></h2> <h3 id="1.-what-is-the-don%E2%80%99t-panic-protocol%3F-%F0%9F%9B%A1%EF%B8%8F" tabindex="-1">1. <strong>What is the Don’t Panic Protocol?</strong> 🛡️<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#1.-what-is-the-don%E2%80%99t-panic-protocol%3F-%F0%9F%9B%A1%EF%B8%8F" aria-hidden="true">#</a></h3> <ul> <li>The Don’t Panic Protocol is a cybersecurity project offering easy-to-follow resources to help everyday users stay safe online. We provide simple steps for securing accounts, spotting suspicious activity, and staying up-to-date on best practices.</li> </ul> <h3 id="2.-when-will-the-don%E2%80%99t-panic-protocol-launch%3F-%F0%9F%9A%80" tabindex="-1">2. <strong>When will the Don’t Panic Protocol launch?</strong> 🚀<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#2.-when-will-the-don%E2%80%99t-panic-protocol-launch%3F-%F0%9F%9A%80" aria-hidden="true">#</a></h3> <ul> <li>The website and resources launch on <strong>November 24, 2024</strong>. After that, you can drop by anytime for guides, articles, and tips on online safety.</li> </ul> <h3 id="3.-who-is-building-this-project%3F-%F0%9F%9B%A0%EF%B8%8F" tabindex="-1">3. <strong>Who is building this project?</strong> 🛠️<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#3.-who-is-building-this-project%3F-%F0%9F%9B%A0%EF%B8%8F" aria-hidden="true">#</a></h3> <ul> <li>This project is developed solely by me, Mike Helmers! I handle all the updates and maintenance to provide you with the best cybersecurity resources.</li> </ul> <h3 id="4.-how-will-this-project-impact-me-as-a-user%3F-%F0%9F%8C%90" tabindex="-1">4. <strong>How will this project impact me as a user?</strong> 🌐<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#4.-how-will-this-project-impact-me-as-a-user%3F-%F0%9F%8C%90" aria-hidden="true">#</a></h3> <ul> <li>The Don’t Panic Protocol is designed to support your cybersecurity efforts. You’ll just need to review your online accounts and gather your passwords initially. No routine tasks are required—just visit the site whenever you want to check out the latest tips!</li> </ul> <h3 id="5.-what-preparation-do-i-need-to-do%3F-%F0%9F%93%9D" tabindex="-1">5. <strong>What preparation do I need to do?</strong> 📝<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#5.-what-preparation-do-i-need-to-do%3F-%F0%9F%93%9D" aria-hidden="true">#</a></h3> <ul> <li>Start by listing your online accounts and gathering your passwords. This way, you’ll be ready to follow along with the guides on launch day.</li> </ul> <h3 id="6.-will-i-need-to-complete-any-training%3F-%F0%9F%93%9A" tabindex="-1">6. <strong>Will I need to complete any training?</strong> 📚<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#6.-will-i-need-to-complete-any-training%3F-%F0%9F%93%9A" aria-hidden="true">#</a></h3> <ul> <li>Yes, there’s a short training session on key security practices. We’ll cover topics like creating strong passwords and recognizing phishing attempts to get you started with the Don’t Panic Protocol.</li> </ul> <h3 id="7.-will-this-project-change-my-daily-routine%3F-%F0%9F%95%92" tabindex="-1">7. <strong>Will this project change my daily routine?</strong> 🕒<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#7.-will-this-project-change-my-daily-routine%3F-%F0%9F%95%92" aria-hidden="true">#</a></h3> <ul> <li>No, there’s no need for daily tasks! Once you set up the recommended security measures, you only need to check the site occasionally for updates or new resources.</li> </ul> <h3 id="8.-what-should-i-do-if-i-have-a-security-question-that-isn%E2%80%99t-answered-on-the-website%3F-%E2%9D%93" tabindex="-1">8. <strong>What should I do if I have a security question that isn’t answered on the website?</strong> ❓<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#8.-what-should-i-do-if-i-have-a-security-question-that-isn%E2%80%99t-answered-on-the-website%3F-%E2%9D%93" aria-hidden="true">#</a></h3> <ul> <li>If you need more help, feel free to reach out to me directly at <a href="mailto:helmmp15@uwgb.edu">helmmp15@uwgb.edu</a>. I’m here to assist you!</li> </ul> <h3 id="9.-do-i-need-to-keep-coming-back-to-the-website%3F-%F0%9F%94%84" tabindex="-1">9. <strong>Do I need to keep coming back to the website?</strong> 🔄<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#9.-do-i-need-to-keep-coming-back-to-the-website%3F-%F0%9F%94%84" aria-hidden="true">#</a></h3> <ul> <li>Yes, it’s helpful to visit occasionally for new guides or updates. We’ll add valuable info to help keep you informed on the latest in cybersecurity.</li> </ul> <h3 id="10.-what-kind-of-information-will-the-website-provide%3F-%F0%9F%93%96" tabindex="-1">10. <strong>What kind of information will the website provide?</strong> 📖<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#10.-what-kind-of-information-will-the-website-provide%3F-%F0%9F%93%96" aria-hidden="true">#</a></h3> <ul> <li>The Don’t Panic Protocol site offers guides on securing accounts, recognizing phishing scams, setting up MFA, and using a password manager. We’ll also cover general cybersecurity topics to help you stay safe.</li> </ul> <h3 id="11.-will-there-be-ongoing-maintenance%3F-%F0%9F%94%A7" tabindex="-1">11. <strong>Will there be ongoing maintenance?</strong> 🔧<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#11.-will-there-be-ongoing-maintenance%3F-%F0%9F%94%A7" aria-hidden="true">#</a></h3> <ul> <li>Yes, I’ll regularly update the website with new tips, practices, and security alerts. No additional work is required on your part—just enjoy the resources!</li> </ul> <h3 id="12.-will-this-project-help-protect-my-business-or-just-my-personal-accounts%3F-%F0%9F%8F%A2%F0%9F%92%BB" tabindex="-1">12. <strong>Will this project help protect my business or just my personal accounts?</strong> 🏢💻<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#12.-will-this-project-help-protect-my-business-or-just-my-personal-accounts%3F-%F0%9F%8F%A2%F0%9F%92%BB" aria-hidden="true">#</a></h3> <ul> <li>We cover both personal and small business cybersecurity basics. Small business owners can find practical advice on safeguarding business accounts too!</li> </ul> <h3 id="13.-can-i-share-this-website-with-friends-or-family%3F-%F0%9F%91%A8%E2%80%8D%F0%9F%91%A9%E2%80%8D%F0%9F%91%A7%E2%80%8D%F0%9F%91%A6" tabindex="-1">13. <strong>Can I share this website with friends or family?</strong> 👨‍👩‍👧‍👦<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#13.-can-i-share-this-website-with-friends-or-family%3F-%F0%9F%91%A8%E2%80%8D%F0%9F%91%A9%E2%80%8D%F0%9F%91%A7%E2%80%8D%F0%9F%91%A6" aria-hidden="true">#</a></h3> <ul> <li>Absolutely! The Don’t Panic Protocol is for everyone, so please share it with friends, family, or colleagues who want to learn more about online safety.</li> </ul> <h3 id="14.-what-if-i-forget-to-check-the-site-regularly%3F-%F0%9F%94%94" tabindex="-1">14. <strong>What if I forget to check the site regularly?</strong> 🔔<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#14.-what-if-i-forget-to-check-the-site-regularly%3F-%F0%9F%94%94" aria-hidden="true">#</a></h3> <ul> <li>You can subscribe to our RSS feed to receive updates. This way, you’ll be notified whenever there’s new content, helping you stay up-to-date.</li> </ul> <h3 id="15.-is-there-any-cost-to-using-the-don%E2%80%99t-panic-protocol%3F-%F0%9F%92%B8" tabindex="-1">15. <strong>Is there any cost to using the Don’t Panic Protocol?</strong> 💸<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#15.-is-there-any-cost-to-using-the-don%E2%80%99t-panic-protocol%3F-%F0%9F%92%B8" aria-hidden="true">#</a></h3> <ul> <li>No, the Don’t Panic Protocol is completely free. It’s an accessible resource for anyone looking to improve their cybersecurity!</li> </ul> <h3 id="16.-will-the-site-provide-updates-on-new-online-security-threats%3F-%F0%9F%93%A2" tabindex="-1">16. <strong>Will the site provide updates on new online security threats?</strong> 📢<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#16.-will-the-site-provide-updates-on-new-online-security-threats%3F-%F0%9F%93%A2" aria-hidden="true">#</a></h3> <ul> <li>Yes, the site will feature a blog with updates on emerging security threats and trends in cybersecurity. Stay informed and proactive about your online safety!</li> </ul> <h3 id="17.-do-i-need-any-technical-skills-to-follow-the-don%E2%80%99t-panic-protocol%3F-%F0%9F%A7%91%E2%80%8D%F0%9F%92%BB" tabindex="-1">17. <strong>Do I need any technical skills to follow the Don’t Panic Protocol?</strong> 🧑‍💻<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#17.-do-i-need-any-technical-skills-to-follow-the-don%E2%80%99t-panic-protocol%3F-%F0%9F%A7%91%E2%80%8D%F0%9F%92%BB" aria-hidden="true">#</a></h3> <ul> <li>Not at all! The site is built to be easy for non-technical users to understand. Our guides include step-by-step instructions, so everyone can follow along.</li> </ul> <h3 id="18.-how-do-i-get-started-with-the-don%E2%80%99t-panic-protocol%3F-%F0%9F%8F%81" tabindex="-1">18. <strong>How do I get started with the Don’t Panic Protocol?</strong> 🏁<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#18.-how-do-i-get-started-with-the-don%E2%80%99t-panic-protocol%3F-%F0%9F%8F%81" aria-hidden="true">#</a></h3> <ul> <li>On launch day, visit <a href="https://dontpanicprotocol.org/">https://dontpanicprotocol.org</a> to explore the resources. Start with the training session and guides on strong passwords and MFA.</li> </ul> <h3 id="19.-what-if-i-have-trouble-setting-up-a-password-manager%3F-%F0%9F%94%92" tabindex="-1">19. <strong>What if I have trouble setting up a password manager?</strong> 🔒<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#19.-what-if-i-have-trouble-setting-up-a-password-manager%3F-%F0%9F%94%92" aria-hidden="true">#</a></h3> <ul> <li>The Don’t Panic Protocol includes a guide to help you start with password managers. If you’re stuck, check the FAQ page or contact me directly for support.</li> </ul> <h3 id="20.-how-often-will-new-content-be-added-to-the-website%3F-%F0%9F%93%85" tabindex="-1">20. <strong>How often will new content be added to the website?</strong> 📅<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#20.-how-often-will-new-content-be-added-to-the-website%3F-%F0%9F%93%85" aria-hidden="true">#</a></h3> <ul> <li>I’ll be adding new content regularly to keep the website current. Visiting every few months ensures you stay updated on the latest in online security.</li> </ul> <h3 id="21.-is-this-website-secure-to-use%3F-%F0%9F%9B%A1%EF%B8%8F" tabindex="-1">21. <strong>Is this website secure to use?</strong> 🛡️<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#21.-is-this-website-secure-to-use%3F-%F0%9F%9B%A1%EF%B8%8F" aria-hidden="true">#</a></h3> <ul> <li>Yes, the site uses HTTPS encryption to keep your experience secure. We take all necessary measures to protect your privacy and safety online.</li> </ul> 📋 Checklist 2024-11-24T21:11:55Z http://dontpanicprotocol.org/checklist/ <h2 id="1.-authentication" tabindex="-1">1. <strong>Authentication</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#1.-authentication" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/authentication">🔐 Authentication</a></p> <p>Authentication is your first line of defense. Strengthen your security by implementing these practices:</p> <h3 id="1.1-use-strong-passwords" tabindex="-1">1.1 Use Strong Passwords<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#1.1-use-strong-passwords" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Create strong, unique passwords for all accounts (16+ characters).</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Use a password manager to organize and secure credentials.</li> </ul> <h3 id="1.2-enable-multifactor-authentication-(mfa)" tabindex="-1">1.2 Enable Multifactor Authentication (MFA)<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#1.2-enable-multifactor-authentication-(mfa)" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Turn on MFA for every account that supports it.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Avoid SMS-based MFA; use app-based codes or hardware keys.</li> </ul> <h3 id="1.3-monitor-and-update-passwords" tabindex="-1">1.3 Monitor and Update Passwords<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#1.3-monitor-and-update-passwords" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Sign up for breach notification services like <strong><a href="https://haveibeenpwned.com/">Have I Been Pwned</a></strong>.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Regularly update passwords and review account recovery settings.</li> </ul> <hr /> <h2 id="2.-internet-of-things-(iot)" tabindex="-1">2. <strong>Internet of Things (IoT)</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#2.-internet-of-things-(iot)" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/iot">🌐 Internet of Things (IoT)</a></p> <p>IoT devices can be a gateway for attackers. Secure them with these steps:</p> <h3 id="2.1-change-default-settings" tabindex="-1">2.1 Change Default Settings<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#2.1-change-default-settings" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Change default passwords on all IoT devices.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Disable unnecessary features like cameras and microphones.</li> </ul> <h3 id="2.2-update-and-monitor-devices" tabindex="-1">2.2 Update and Monitor Devices<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#2.2-update-and-monitor-devices" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Enable automatic updates to keep firmware current.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Monitor your network for unusual devices or activity.</li> </ul> <h3 id="2.3-segment-your-network" tabindex="-1">2.3 Segment Your Network<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#2.3-segment-your-network" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Set up a guest network for IoT devices.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Research devices before purchase to ensure they prioritize security.</li> </ul> <hr /> <h2 id="3.-networks" tabindex="-1">3. <strong>Networks</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#3.-networks" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/networks">🌐 Networks</a></p> <p>Your home network is the backbone of your digital security. Protect it with these actions:</p> <h3 id="3.1-secure-your-router" tabindex="-1">3.1 Secure Your Router<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#3.1-secure-your-router" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Change default router username and password.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Enable WPA3 (or WPA2) encryption.</li> </ul> <h3 id="3.2-monitor-and-update" tabindex="-1">3.2 Monitor and Update<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#3.2-monitor-and-update" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Update router firmware regularly.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Monitor connected devices and block any unknown ones.</li> </ul> <h3 id="3.3-strengthen-access" tabindex="-1">3.3 Strengthen Access<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#3.3-strengthen-access" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Create a guest network for visitors or IoT devices.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Consider using a VPN at the router level.</li> </ul> <hr /> <h2 id="4.-ongoing-maintenance" tabindex="-1">4. <strong>Ongoing Maintenance</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#4.-ongoing-maintenance" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/ongoing-maintenance">🔄 Ongoing Maintenance</a></p> <p>Cybersecurity is an ongoing process. Keep your defenses strong by:</p> <h3 id="4.1-enable-automatic-updates" tabindex="-1">4.1 Enable Automatic Updates<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#4.1-enable-automatic-updates" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Enable updates for all devices and software.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Schedule backups to both cloud storage and external drives.</li> </ul> <h3 id="4.2-monitor-and-review" tabindex="-1">4.2 Monitor and Review<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#4.2-monitor-and-review" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Regularly monitor accounts and devices for suspicious activity.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Review and limit app permissions to protect sensitive data.</li> </ul> <h3 id="4.3-test-your-defenses" tabindex="-1">4.3 Test Your Defenses<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#4.3-test-your-defenses" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Test backups periodically to ensure reliability.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Run weekly security scans for threats like malware or viruses.</li> </ul> <hr /> <h2 id="5.-personal-devices" tabindex="-1">5. <strong>Personal Devices</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#5.-personal-devices" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/personal-devices">📱 Personal Devices</a></p> <p>Your personal devices are treasure troves of data. Secure them with these steps:</p> <h3 id="5.1-encrypt-and-update" tabindex="-1">5.1 Encrypt and Update<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#5.1-encrypt-and-update" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Enable encryption and automatic updates for all devices.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Set up strong passwords or biometric authentication.</li> </ul> <h3 id="5.2-add-layers-of-protection" tabindex="-1">5.2 Add Layers of Protection<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#5.2-add-layers-of-protection" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Install antivirus and anti-malware tools.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Use a VPN when on public Wi-Fi.</li> </ul> <h3 id="5.3-manage-app-permissions" tabindex="-1">5.3 Manage App Permissions<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#5.3-manage-app-permissions" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Regularly review app permissions.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Secure your IoT devices and home network.</li> </ul> <hr /> <h2 id="6.-physical-security" tabindex="-1">6. <strong>Physical Security</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#6.-physical-security" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/physical-security">🔒 Physical Security</a></p> <p>Physical security complements your digital practices. Follow these steps:</p> <h3 id="6.1-secure-your-devices" tabindex="-1">6.1 Secure Your Devices<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#6.1-secure-your-devices" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Lock devices when not in use and enable auto-lock timers.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Use tracking features to locate or secure stolen devices.</li> </ul> <h3 id="6.2-protect-your-workspace" tabindex="-1">6.2 Protect Your Workspace<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#6.2-protect-your-workspace" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Invest in physical security tools like locks and privacy screens.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Secure your home office with locked storage and monitored security.</li> </ul> <hr /> <h2 id="7.-secure-messaging" tabindex="-1">7. <strong>Secure Messaging</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#7.-secure-messaging" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/secure-messaging">📩 Secure Messaging</a></p> <p>Keep your conversations private with these practices:</p> <h3 id="7.1-choose-encrypted-apps" tabindex="-1">7.1 Choose Encrypted Apps<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#7.1-choose-encrypted-apps" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Install and use secure apps like <strong><a href="https://signal.org/">Signal</a></strong> or <strong><a href="https://getsession.org/">Session</a></strong>.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Use decentralized apps like <strong>Jami</strong> for enhanced anonymity.</li> </ul> <h3 id="7.2-enable-privacy-features" tabindex="-1">7.2 Enable Privacy Features<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#7.2-enable-privacy-features" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Turn on disappearing messages for sensitive chats.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Verify contact identities to avoid impersonation attacks.</li> </ul> <hr /> <h2 id="8.-social-media" tabindex="-1">8. <strong>Social Media</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#8.-social-media" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/social-media">📣 Social Media</a></p> <p>Take control of your online presence with these steps:</p> <h3 id="8.1-adjust-privacy-settings" tabindex="-1">8.1 Adjust Privacy Settings<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#8.1-adjust-privacy-settings" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Review and adjust your privacy settings on all platforms.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Revoke unnecessary third-party app access.</li> </ul> <h3 id="8.2-be-mindful-of-what-you-share" tabindex="-1">8.2 Be Mindful of What You Share<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#8.2-be-mindful-of-what-you-share" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Turn off location tagging.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Avoid posting sensitive information like vacation plans.</li> </ul> <hr /> <h2 id="9.-web-browsing" tabindex="-1">9. <strong>Web Browsing</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#9.-web-browsing" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/web-browsing">🌐 Web Browsing</a></p> <p>Navigate the web safely with these actions:</p> <h3 id="9.1-use-secure-tools" tabindex="-1">9.1 Use Secure Tools<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#9.1-use-secure-tools" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Use privacy-focused browsers like <strong><a href="https://brave.com/">Brave</a></strong> or <strong><a href="https://www.mozilla.org/">Firefox</a></strong>.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Install tracker-blocking browser extensions like <strong>uBlock Origin</strong>.</li> </ul> <h3 id="9.2-protect-your-activity" tabindex="-1">9.2 Protect Your Activity<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#9.2-protect-your-activity" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Clear cookies and cache regularly.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Verify HTTPS before entering sensitive data.</li> </ul> <h3 id="9.3-add-extra-privacy" tabindex="-1">9.3 Add Extra Privacy<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#9.3-add-extra-privacy" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Use a VPN for public Wi-Fi.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Consider using the <strong>Tor Browser</strong> for anonymous browsing.</li> </ul>
This XML file does not appear to have any style information associated with it. The document tree is shown below.
<feed xmlns="http://www.w3.org/2005/Atom">
<title>Don’t Panic Protocol</title>
<subtitle>A Cybersecurity Framework for the rest of us.</subtitle>
<link href="http://dontpanicprotocol.org/feed/" rel="self"/>
<link href="http://dontpanicprotocol.org"/>
<updated>2024-11-24T21:11:55Z</updated>
<id>http://dontpanicprotocol.org</id>
<author>
<name>Michael Helmers</name>
</author>
<entry>
<title>🏗️ The Framework</title>
<link href="http://dontpanicprotocol.org/framework/"/>
<updated>2024-11-24T21:11:55Z</updated>
<id>http://dontpanicprotocol.org/framework/</id>
<content type="html"><h2 id="1.-why-cybersecurity-matters" tabindex="-1">1. <strong>Why Cybersecurity Matters</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#1.-why-cybersecurity-matters" aria-hidden="true">#</a></h2> <p>Cybersecurity is the foundation of your digital life. Every click, login, or post contributes to your online footprint, and protecting it ensures peace of mind in an increasingly connected world.</p> <h3 id="the-stakes" tabindex="-1">The Stakes<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#the-stakes" aria-hidden="true">#</a></h3> <ul> <li><strong>Personal Data:</strong> Guard sensitive information like banking credentials and personal files.</li> <li><strong>Identity Theft:</strong> Prevent cybercriminals from exploiting your identity.</li> <li><strong>Peace of Mind:</strong> Explore the digital galaxy without fear of compromise.</li> </ul> <hr /> <h2 id="2.-step-1%3A-authentication" tabindex="-1">2. <strong>Step 1: Authentication</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#2.-step-1%3A-authentication" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/authentication">🔐 Authentication</a></p> <p>Authentication is your first line of defense. Strengthen your digital locks with these best practices:</p> <h3 id="2.1-use-strong-passwords" tabindex="-1">2.1 Use Strong Passwords<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#2.1-use-strong-passwords" aria-hidden="true">#</a></h3> <ul> <li>Use at least 16 characters combining uppercase, lowercase, numbers, and symbols.</li> <li>Store and generate unique passwords with a tool like <a href="https://bitwarden.com/">Bitwarden</a>.</li> </ul> <h3 id="2.2-enable-multifactor-authentication-(mfa)" tabindex="-1">2.2 Enable Multifactor Authentication (MFA)<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#2.2-enable-multifactor-authentication-(mfa)" aria-hidden="true">#</a></h3> <ul> <li>Turn on MFA (sometimes called 2FA) for all accounts.</li> <li>Use apps like <a href="https://authy.com/">Authy</a> or hardware keys like YubiKey.</li> </ul> <hr /> <h2 id="3.-step-2%3A-web-browsing" tabindex="-1">3. <strong>Step 2: Web Browsing</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#3.-step-2%3A-web-browsing" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/web-browsing">🌐 Web Browsing</a></p> <p>Your browser is your gateway to the internet. Make it secure:</p> <h3 id="3.1-use-privacy-focused-browsers" tabindex="-1">3.1 Use Privacy-Focused Browsers<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#3.1-use-privacy-focused-browsers" aria-hidden="true">#</a></h3> <ul> <li>Choose secure browsers like <a href="https://brave.com/">Brave</a> or <a href="https://www.mozilla.org/en-US/">Firefox</a>.</li> </ul> <h3 id="3.2-install-tracker-blockers" tabindex="-1">3.2 Install Tracker Blockers<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#3.2-install-tracker-blockers" aria-hidden="true">#</a></h3> <ul> <li>Extensions like <a href="https://ublockorigin.com/">uBlock Origin</a> and <a href="https://privacybadger.org/">Privacy Badger</a> can block ads and trackers.</li> </ul> <hr /> <h2 id="4.-step-3%3A-ongoing-maintenance" tabindex="-1">4. <strong>Step 3: Ongoing Maintenance</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#4.-step-3%3A-ongoing-maintenance" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/ongoing-maintenance">🔄 Ongoing Maintenance</a></p> <p>Regular upkeep keeps your defenses strong:</p> <h3 id="4.1-schedule-updates-and-backups" tabindex="-1">4.1 Schedule Updates and Backups<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#4.1-schedule-updates-and-backups" aria-hidden="true">#</a></h3> <ul> <li>Enable automatic updates for devices and software.</li> <li>Back up files to both cloud and physical storage.</li> </ul> <h3 id="4.2-monitor-activity" tabindex="-1">4.2 Monitor Activity<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#4.2-monitor-activity" aria-hidden="true">#</a></h3> <ul> <li>Review login attempts and account activity frequently.</li> <li>Run regular security scans with tools like <a href="https://www.malwarebytes.com/">Malwarebytes</a>.</li> </ul> <hr /> <h2 id="5.-step-4%3A-networks" tabindex="-1">5. <strong>Step 4: Networks</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#5.-step-4%3A-networks" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/networks">🌐 Networks</a></p> <p>Your home network is your digital fortress:</p> <h3 id="5.1-secure-your-router" tabindex="-1">5.1 Secure Your Router<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#5.1-secure-your-router" aria-hidden="true">#</a></h3> <ul> <li>Change default router credentials.</li> <li>Enable WPA3 encryption and update firmware.</li> </ul> <h3 id="5.2-create-guest-networks" tabindex="-1">5.2 Create Guest Networks<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#5.2-create-guest-networks" aria-hidden="true">#</a></h3> <ul> <li>Isolate IoT devices on a separate network to limit exposure.</li> </ul> <hr /> <h2 id="6.-step-5%3A-iot-devices" tabindex="-1">6. <strong>Step 5: IoT Devices</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#6.-step-5%3A-iot-devices" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/iot">🌐 Internet of Things (IoT)</a></p> <p>IoT devices are convenient but can pose risks. Secure them by:</p> <h3 id="6.1-changing-default-settings" tabindex="-1">6.1 Changing Default Settings<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#6.1-changing-default-settings" aria-hidden="true">#</a></h3> <ul> <li>Use unique passwords and disable unused features like microphones.</li> </ul> <h3 id="6.2-segmenting-your-network" tabindex="-1">6.2 Segmenting Your Network<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#6.2-segmenting-your-network" aria-hidden="true">#</a></h3> <ul> <li>Use guest Wi-Fi for IoT devices to prevent access to sensitive data.</li> </ul> <hr /> <h2 id="7.-step-6%3A-personal-devices" tabindex="-1">7. <strong>Step 6: Personal Devices</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#7.-step-6%3A-personal-devices" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/personal-devices">📱 Personal Devices</a></p> <p>Protect smartphones, laptops, and tablets:</p> <h3 id="7.1-encrypt-and-update" tabindex="-1">7.1 Encrypt and Update<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#7.1-encrypt-and-update" aria-hidden="true">#</a></h3> <ul> <li>Enable full-disk encryption and automatic updates.</li> </ul> <h3 id="7.2-use-vpns-and-antivirus" tabindex="-1">7.2 Use VPNs and Antivirus<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#7.2-use-vpns-and-antivirus" aria-hidden="true">#</a></h3> <ul> <li>Use VPNs like <a href="https://protonvpn.com/">ProtonVPN</a> on public Wi-Fi.</li> <li>Install antivirus software to protect against malware.</li> </ul> <hr /> <h2 id="8.-step-7%3A-secure-messaging" tabindex="-1">8. <strong>Step 7: Secure Messaging</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#8.-step-7%3A-secure-messaging" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/secure-messaging">📩 Secure Messaging</a></p> <p>Keep your conversations private:</p> <h3 id="8.1-choose-encrypted-apps" tabindex="-1">8.1 Choose Encrypted Apps<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#8.1-choose-encrypted-apps" aria-hidden="true">#</a></h3> <ul> <li>Use apps like <a href="https://signal.org/">Signal</a> or <a href="https://getsession.org/">Session</a>.</li> </ul> <h3 id="8.2-enable-disappearing-messages" tabindex="-1">8.2 Enable Disappearing Messages<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#8.2-enable-disappearing-messages" aria-hidden="true">#</a></h3> <ul> <li>Set messages to auto-delete to minimize long-term exposure.</li> </ul> <hr /> <h2 id="9.-step-8%3A-social-media" tabindex="-1">9. <strong>Step 8: Social Media</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#9.-step-8%3A-social-media" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/social-media">📣 Social Media</a></p> <p>Control what you share and who sees it:</p> <h3 id="9.1-adjust-privacy-settings" tabindex="-1">9.1 Adjust Privacy Settings<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#9.1-adjust-privacy-settings" aria-hidden="true">#</a></h3> <ul> <li>Limit visibility to friends or specific groups.</li> </ul> <h3 id="9.2-avoid-oversharing" tabindex="-1">9.2 Avoid Oversharing<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#9.2-avoid-oversharing" aria-hidden="true">#</a></h3> <ul> <li>Refrain from posting sensitive details like vacation plans or addresses.</li> </ul> <hr /> <h2 id="10.-step-9%3A-physical-security" tabindex="-1">10. <strong>Step 9: Physical Security</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#10.-step-9%3A-physical-security" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/physical-security">🔒 Physical Security</a></p> <p>Physical security complements digital practices:</p> <h3 id="10.1-lock-devices" tabindex="-1">10.1 Lock Devices<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#10.1-lock-devices" aria-hidden="true">#</a></h3> <ul> <li>Use strong passwords or biometrics to secure devices.</li> </ul> <h3 id="10.2-secure-your-workspace" tabindex="-1">10.2 Secure Your Workspace<a class="tdbc-anchor" href="http://dontpanicprotocol.org/framework/#10.2-secure-your-workspace" aria-hidden="true">#</a></h3> <ul> <li>Invest in locked storage and physical barriers like privacy screens.</li> </ul> </content>
</entry>
<entry>
<title>📚 Glossary</title>
<link href="http://dontpanicprotocol.org/glossary/"/>
<updated>2024-11-24T21:11:55Z</updated>
<id>http://dontpanicprotocol.org/glossary/</id>
<content type="html"><p>Understanding cybersecurity starts with mastering the language. Here's your guide to common terms and concepts, explained simply and paired with practical tips.</p> <hr /> <h3 id="%F0%9F%94%91-authentication" tabindex="-1">🔑 <strong>Authentication</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%94%91-authentication" aria-hidden="true">#</a></h3> <p>The process of verifying that a user or device is who they claim to be before granting access to a system. Common methods include:</p> <ul> <li>Passwords</li> <li>Biometrics (like fingerprints)</li> <li>Multifactor authentication (MFA)</li> </ul> <p><strong>Why it matters:</strong> Authentication is your first line of defense against unauthorized access.<br /> <a href="https://en.wikipedia.org/wiki/Authentication">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%9B%A1%EF%B8%8F-cybersecurity" tabindex="-1">🛡️ <strong>Cybersecurity</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%9B%A1%EF%B8%8F-cybersecurity" aria-hidden="true">#</a></h3> <p>The art of protecting systems, networks, and data from attacks. Cybersecurity focuses on three key areas:</p> <ul> <li>Confidentiality: Keeping your information private.</li> <li>Integrity: Ensuring data isn’t altered.</li> <li>Availability: Making sure your data is accessible when you need it.</li> </ul> <p><strong>Why it matters:</strong> Every device and network you use benefits from strong cybersecurity practices.<br /> <a href="https://en.wikipedia.org/wiki/Computer_security">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%8C%90-digital-footprint" tabindex="-1">🌐 <strong>Digital Footprint</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%8C%90-digital-footprint" aria-hidden="true">#</a></h3> <p>The trail of data you leave behind when you go online. This includes:</p> <ul> <li>Social media posts</li> <li>Websites you visit</li> <li>Purchases and subscriptions</li> </ul> <p><strong>Pro Tip:</strong> Use private browsing modes and clear your cookies to minimize your footprint.<br /> <a href="https://en.wikipedia.org/wiki/Digital_footprint">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%94%90-encryption" tabindex="-1">🔐 <strong>Encryption</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%94%90-encryption" aria-hidden="true">#</a></h3> <p>The practice of scrambling data to make it unreadable without a key. Encryption ensures data stays secure during:</p> <ul> <li>File storage</li> <li>Online communication (look for HTTPS in your browser)</li> </ul> <p><strong>Why it matters:</strong> It’s the reason cybercriminals can’t read your messages or steal your credit card info during transactions.<br /> <a href="https://en.wikipedia.org/wiki/Encryption">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%91%BE-malware" tabindex="-1">👾 <strong>Malware</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%91%BE-malware" aria-hidden="true">#</a></h3> <p>Short for &quot;malicious software,&quot; malware is designed to harm your devices or steal your data. Common types include:</p> <ul> <li>Viruses: Infect files and spread.</li> <li>Ransomware: Locks your files and demands payment.</li> <li>Spyware: Secretly gathers information.</li> </ul> <p><strong>Pro Tip:</strong> Install antivirus software and run regular scans to keep malware at bay.<br /> <a href="https://en.wikipedia.org/wiki/Malware">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%94%92-multifactor-authentication-(mfa)" tabindex="-1">🔒 <strong>Multifactor Authentication (MFA)</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%94%92-multifactor-authentication-(mfa)" aria-hidden="true">#</a></h3> <p>An extra layer of security that requires two or more steps to verify your identity, such as:</p> <ul> <li>A password</li> <li>A fingerprint or face scan</li> <li>A one-time code sent to your phone</li> </ul> <p><strong>Pro Tip:</strong> Always enable MFA for important accounts like email and banking.<br /> <a href="https://en.wikipedia.org/wiki/Multi-factor_authentication">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%94%91-password-manager" tabindex="-1">🔑 <strong>Password Manager</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%94%91-password-manager" aria-hidden="true">#</a></h3> <p>A tool that securely stores your passwords and generates strong, unique passwords for your accounts.</p> <ul> <li>Simplifies login processes.</li> <li>Ensures you don’t reuse weak passwords.</li> </ul> <p><strong>Top Picks:</strong> <a href="https://bitwarden.com/">Bitwarden</a>, <a href="https://1password.com/">1Password</a>.<br /> <a href="https://en.wikipedia.org/wiki/Password_manager">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%8E%A3-phishing" tabindex="-1">🎣 <strong>Phishing</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%8E%A3-phishing" aria-hidden="true">#</a></h3> <p>A scam where attackers pose as trusted entities (like your bank) to trick you into revealing sensitive information. Phishing attempts often come through:</p> <ul> <li>Email</li> <li>Text messages</li> <li>Fake websites</li> </ul> <p><strong>How to spot it:</strong> Look for typos, suspicious URLs, and unexpected requests for personal data.<br /> <a href="https://en.wikipedia.org/wiki/Phishing">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%92%B8-ransomware" tabindex="-1">💸 <strong>Ransomware</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%92%B8-ransomware" aria-hidden="true">#</a></h3> <p>Malware that locks your files and demands payment (a ransom) to release them.<br /> <strong>How to avoid it:</strong></p> <ul> <li>Back up your files regularly.</li> <li>Avoid clicking on unknown links or downloading suspicious attachments.<br /> <a href="https://en.wikipedia.org/wiki/Ransomware">Learn more on Wikipedia</a></li> </ul> <hr /> <h3 id="%F0%9F%95%B5%EF%B8%8F-social-engineering" tabindex="-1">🕵️ <strong>Social Engineering</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%95%B5%EF%B8%8F-social-engineering" aria-hidden="true">#</a></h3> <p>A tactic that manipulates people into giving up private information. Examples include:</p> <ul> <li>Phishing</li> <li>Pretexting (creating fake scenarios to gain trust)</li> <li>Tailgating (following someone into a secure area)</li> </ul> <p><strong>Why it matters:</strong> Cybersecurity isn’t just about tech—it’s about people, too.<br /> <a href="https://en.wikipedia.org/wiki/Social_engineering_(security)">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%8C%90-virtual-private-network-(vpn)" tabindex="-1">🌐 <strong>Virtual Private Network (VPN)</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%8C%90-virtual-private-network-(vpn)" aria-hidden="true">#</a></h3> <p>A service that encrypts your internet connection and hides your IP address, making your browsing activity private.<br /> <strong>Pro Tip:</strong> Use a VPN when on public Wi-Fi to prevent data interception.<br /> <a href="https://en.wikipedia.org/wiki/Virtual_private_network">Learn more on Wikipedia</a></p> <hr /> <h3 id="%E2%9A%A0%EF%B8%8F-vulnerability" tabindex="-1">⚠️ <strong>Vulnerability</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%E2%9A%A0%EF%B8%8F-vulnerability" aria-hidden="true">#</a></h3> <p>A weakness in software, hardware, or a network that attackers can exploit.<br /> <strong>Pro Tip:</strong> Regular updates and patches fix vulnerabilities before attackers can use them.<br /> <a href="https://en.wikipedia.org/wiki/Vulnerability_(computing)">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%93%B6-wi-fi-security" tabindex="-1">📶 <strong>Wi-Fi Security</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%93%B6-wi-fi-security" aria-hidden="true">#</a></h3> <p>Measures to protect your wireless network, such as:</p> <ul> <li>Enabling WPA3 or WPA2 encryption.</li> <li>Changing default router credentials.</li> <li>Setting up a guest network for visitors or IoT devices.</li> </ul> <p><strong>Why it matters:</strong> A secure network is the foundation of your digital safety.<br /> <a href="https://en.wikipedia.org/wiki/Wireless_security">Learn more on Wikipedia</a></p> <hr /> <h3 id="%F0%9F%95%B5%EF%B8%8F-zero-day-exploit" tabindex="-1">🕵️ <strong>Zero-Day Exploit</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/glossary/#%F0%9F%95%B5%EF%B8%8F-zero-day-exploit" aria-hidden="true">#</a></h3> <p>An attack that targets a software vulnerability unknown to the developer, leaving no time for a fix.<br /> <strong>Pro Tip:</strong> Keep software updated to protect against patched exploits.<br /> <a href="https://en.wikipedia.org/wiki/Zero-day_(computing)">Learn more on Wikipedia</a></p> </content>
</entry>
<entry>
<title>📖 About</title>
<link href="http://dontpanicprotocol.org/about/"/>
<updated>2024-11-24T21:11:55Z</updated>
<id>http://dontpanicprotocol.org/about/</id>
<content type="html"><blockquote> <p>&quot;It is said that despite its many glaring (and occasionally fatal) inaccuracies, the Hitchhiker's Guide to the Galaxy itself has outsold the Encyclopedia Galactica because it is slightly cheaper, and because it has the words 'DON'T PANIC' in large, friendly letters on the cover.&quot;</p> <p><em>The Hitchhiker's Guide to the Galaxy</em> by Douglas Adams 🚀</p> </blockquote> <h2 id="%F0%9F%8C%9F-inspiration" tabindex="-1">🌟 Inspiration<a class="tdbc-anchor" href="http://dontpanicprotocol.org/about/#%F0%9F%8C%9F-inspiration" aria-hidden="true">#</a></h2> <p>The idea for the Don’t Panic Protocol is inspired by <strong>Douglas Adams’ “The Hitchhiker’s Guide to the Galaxy.”</strong> 📚 In the story, the guidebook has the comforting words “DON’T PANIC” on its cover, a reminder to approach challenges with calm and clarity. This project aims to bring that same approach to cybersecurity: no jargon, no panic, just straightforward steps to stay safe online. 🌈</p> <p>In today’s digital world, everyone deserves to feel secure, regardless of technical background. The Don’t Panic Protocol was created to be a friendly, easy-to-use resource for everyday users and small business owners, with practical guidance and tools to tackle the most common security challenges. 🔐</p> <h2 id="%F0%9F%91%8B-about-the-creator" tabindex="-1">👋 About the Creator<a class="tdbc-anchor" href="http://dontpanicprotocol.org/about/#%F0%9F%91%8B-about-the-creator" aria-hidden="true">#</a></h2> <p>Hi, I’m <strong>Mike Helmers</strong>, the creator and developer of the Don’t Panic Protocol. 👨‍💻 I’m passionate about making technology and security accessible for everyone, especially those who may not have a technical background. Currently, I’m studying cybersecurity in graduate school at the <em>University of Wisconsin - Green Bay</em> and working in the field at <em>Wisconsin Employee Trust Fund (ETF)</em>, where I focus on practical solutions to keep digital information secure. 💼</p> <p>In my free time, I enjoy playing <strong>Dungeons &amp; Dragons</strong> 🎲 and exploring how technology can enrich our lives. The Don’t Panic Protocol is my way of helping others feel more confident and secure in their digital spaces. If you have any questions or feedback, feel free to reach out to me at <a href="mailto:helmmp15@uwgb.edu">helmmp15@uwgb.edu</a> 📩.</p> <p>Thank you for visiting, and remember: <strong>don’t panic</strong> – you’ve got this! 💪😊</p> </content>
</entry>
<entry>
<title>❓ FAQ</title>
<link href="http://dontpanicprotocol.org/faq/"/>
<updated>2024-11-24T21:11:55Z</updated>
<id>http://dontpanicprotocol.org/faq/</id>
<content type="html"><h2 id="frequently-asked-questions%3A-don%E2%80%99t-panic-protocol" tabindex="-1">Frequently Asked Questions: Don’t Panic Protocol<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#frequently-asked-questions%3A-don%E2%80%99t-panic-protocol" aria-hidden="true">#</a></h2> <h3 id="1.-what-is-the-don%E2%80%99t-panic-protocol%3F-%F0%9F%9B%A1%EF%B8%8F" tabindex="-1">1. <strong>What is the Don’t Panic Protocol?</strong> 🛡️<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#1.-what-is-the-don%E2%80%99t-panic-protocol%3F-%F0%9F%9B%A1%EF%B8%8F" aria-hidden="true">#</a></h3> <ul> <li>The Don’t Panic Protocol is a cybersecurity project offering easy-to-follow resources to help everyday users stay safe online. We provide simple steps for securing accounts, spotting suspicious activity, and staying up-to-date on best practices.</li> </ul> <h3 id="2.-when-will-the-don%E2%80%99t-panic-protocol-launch%3F-%F0%9F%9A%80" tabindex="-1">2. <strong>When will the Don’t Panic Protocol launch?</strong> 🚀<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#2.-when-will-the-don%E2%80%99t-panic-protocol-launch%3F-%F0%9F%9A%80" aria-hidden="true">#</a></h3> <ul> <li>The website and resources launch on <strong>November 24, 2024</strong>. After that, you can drop by anytime for guides, articles, and tips on online safety.</li> </ul> <h3 id="3.-who-is-building-this-project%3F-%F0%9F%9B%A0%EF%B8%8F" tabindex="-1">3. <strong>Who is building this project?</strong> 🛠️<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#3.-who-is-building-this-project%3F-%F0%9F%9B%A0%EF%B8%8F" aria-hidden="true">#</a></h3> <ul> <li>This project is developed solely by me, Mike Helmers! I handle all the updates and maintenance to provide you with the best cybersecurity resources.</li> </ul> <h3 id="4.-how-will-this-project-impact-me-as-a-user%3F-%F0%9F%8C%90" tabindex="-1">4. <strong>How will this project impact me as a user?</strong> 🌐<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#4.-how-will-this-project-impact-me-as-a-user%3F-%F0%9F%8C%90" aria-hidden="true">#</a></h3> <ul> <li>The Don’t Panic Protocol is designed to support your cybersecurity efforts. You’ll just need to review your online accounts and gather your passwords initially. No routine tasks are required—just visit the site whenever you want to check out the latest tips!</li> </ul> <h3 id="5.-what-preparation-do-i-need-to-do%3F-%F0%9F%93%9D" tabindex="-1">5. <strong>What preparation do I need to do?</strong> 📝<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#5.-what-preparation-do-i-need-to-do%3F-%F0%9F%93%9D" aria-hidden="true">#</a></h3> <ul> <li>Start by listing your online accounts and gathering your passwords. This way, you’ll be ready to follow along with the guides on launch day.</li> </ul> <h3 id="6.-will-i-need-to-complete-any-training%3F-%F0%9F%93%9A" tabindex="-1">6. <strong>Will I need to complete any training?</strong> 📚<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#6.-will-i-need-to-complete-any-training%3F-%F0%9F%93%9A" aria-hidden="true">#</a></h3> <ul> <li>Yes, there’s a short training session on key security practices. We’ll cover topics like creating strong passwords and recognizing phishing attempts to get you started with the Don’t Panic Protocol.</li> </ul> <h3 id="7.-will-this-project-change-my-daily-routine%3F-%F0%9F%95%92" tabindex="-1">7. <strong>Will this project change my daily routine?</strong> 🕒<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#7.-will-this-project-change-my-daily-routine%3F-%F0%9F%95%92" aria-hidden="true">#</a></h3> <ul> <li>No, there’s no need for daily tasks! Once you set up the recommended security measures, you only need to check the site occasionally for updates or new resources.</li> </ul> <h3 id="8.-what-should-i-do-if-i-have-a-security-question-that-isn%E2%80%99t-answered-on-the-website%3F-%E2%9D%93" tabindex="-1">8. <strong>What should I do if I have a security question that isn’t answered on the website?</strong> ❓<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#8.-what-should-i-do-if-i-have-a-security-question-that-isn%E2%80%99t-answered-on-the-website%3F-%E2%9D%93" aria-hidden="true">#</a></h3> <ul> <li>If you need more help, feel free to reach out to me directly at <a href="mailto:helmmp15@uwgb.edu">helmmp15@uwgb.edu</a>. I’m here to assist you!</li> </ul> <h3 id="9.-do-i-need-to-keep-coming-back-to-the-website%3F-%F0%9F%94%84" tabindex="-1">9. <strong>Do I need to keep coming back to the website?</strong> 🔄<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#9.-do-i-need-to-keep-coming-back-to-the-website%3F-%F0%9F%94%84" aria-hidden="true">#</a></h3> <ul> <li>Yes, it’s helpful to visit occasionally for new guides or updates. We’ll add valuable info to help keep you informed on the latest in cybersecurity.</li> </ul> <h3 id="10.-what-kind-of-information-will-the-website-provide%3F-%F0%9F%93%96" tabindex="-1">10. <strong>What kind of information will the website provide?</strong> 📖<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#10.-what-kind-of-information-will-the-website-provide%3F-%F0%9F%93%96" aria-hidden="true">#</a></h3> <ul> <li>The Don’t Panic Protocol site offers guides on securing accounts, recognizing phishing scams, setting up MFA, and using a password manager. We’ll also cover general cybersecurity topics to help you stay safe.</li> </ul> <h3 id="11.-will-there-be-ongoing-maintenance%3F-%F0%9F%94%A7" tabindex="-1">11. <strong>Will there be ongoing maintenance?</strong> 🔧<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#11.-will-there-be-ongoing-maintenance%3F-%F0%9F%94%A7" aria-hidden="true">#</a></h3> <ul> <li>Yes, I’ll regularly update the website with new tips, practices, and security alerts. No additional work is required on your part—just enjoy the resources!</li> </ul> <h3 id="12.-will-this-project-help-protect-my-business-or-just-my-personal-accounts%3F-%F0%9F%8F%A2%F0%9F%92%BB" tabindex="-1">12. <strong>Will this project help protect my business or just my personal accounts?</strong> 🏢💻<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#12.-will-this-project-help-protect-my-business-or-just-my-personal-accounts%3F-%F0%9F%8F%A2%F0%9F%92%BB" aria-hidden="true">#</a></h3> <ul> <li>We cover both personal and small business cybersecurity basics. Small business owners can find practical advice on safeguarding business accounts too!</li> </ul> <h3 id="13.-can-i-share-this-website-with-friends-or-family%3F-%F0%9F%91%A8%E2%80%8D%F0%9F%91%A9%E2%80%8D%F0%9F%91%A7%E2%80%8D%F0%9F%91%A6" tabindex="-1">13. <strong>Can I share this website with friends or family?</strong> 👨‍👩‍👧‍👦<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#13.-can-i-share-this-website-with-friends-or-family%3F-%F0%9F%91%A8%E2%80%8D%F0%9F%91%A9%E2%80%8D%F0%9F%91%A7%E2%80%8D%F0%9F%91%A6" aria-hidden="true">#</a></h3> <ul> <li>Absolutely! The Don’t Panic Protocol is for everyone, so please share it with friends, family, or colleagues who want to learn more about online safety.</li> </ul> <h3 id="14.-what-if-i-forget-to-check-the-site-regularly%3F-%F0%9F%94%94" tabindex="-1">14. <strong>What if I forget to check the site regularly?</strong> 🔔<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#14.-what-if-i-forget-to-check-the-site-regularly%3F-%F0%9F%94%94" aria-hidden="true">#</a></h3> <ul> <li>You can subscribe to our RSS feed to receive updates. This way, you’ll be notified whenever there’s new content, helping you stay up-to-date.</li> </ul> <h3 id="15.-is-there-any-cost-to-using-the-don%E2%80%99t-panic-protocol%3F-%F0%9F%92%B8" tabindex="-1">15. <strong>Is there any cost to using the Don’t Panic Protocol?</strong> 💸<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#15.-is-there-any-cost-to-using-the-don%E2%80%99t-panic-protocol%3F-%F0%9F%92%B8" aria-hidden="true">#</a></h3> <ul> <li>No, the Don’t Panic Protocol is completely free. It’s an accessible resource for anyone looking to improve their cybersecurity!</li> </ul> <h3 id="16.-will-the-site-provide-updates-on-new-online-security-threats%3F-%F0%9F%93%A2" tabindex="-1">16. <strong>Will the site provide updates on new online security threats?</strong> 📢<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#16.-will-the-site-provide-updates-on-new-online-security-threats%3F-%F0%9F%93%A2" aria-hidden="true">#</a></h3> <ul> <li>Yes, the site will feature a blog with updates on emerging security threats and trends in cybersecurity. Stay informed and proactive about your online safety!</li> </ul> <h3 id="17.-do-i-need-any-technical-skills-to-follow-the-don%E2%80%99t-panic-protocol%3F-%F0%9F%A7%91%E2%80%8D%F0%9F%92%BB" tabindex="-1">17. <strong>Do I need any technical skills to follow the Don’t Panic Protocol?</strong> 🧑‍💻<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#17.-do-i-need-any-technical-skills-to-follow-the-don%E2%80%99t-panic-protocol%3F-%F0%9F%A7%91%E2%80%8D%F0%9F%92%BB" aria-hidden="true">#</a></h3> <ul> <li>Not at all! The site is built to be easy for non-technical users to understand. Our guides include step-by-step instructions, so everyone can follow along.</li> </ul> <h3 id="18.-how-do-i-get-started-with-the-don%E2%80%99t-panic-protocol%3F-%F0%9F%8F%81" tabindex="-1">18. <strong>How do I get started with the Don’t Panic Protocol?</strong> 🏁<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#18.-how-do-i-get-started-with-the-don%E2%80%99t-panic-protocol%3F-%F0%9F%8F%81" aria-hidden="true">#</a></h3> <ul> <li>On launch day, visit <a href="https://dontpanicprotocol.org/">https://dontpanicprotocol.org</a> to explore the resources. Start with the training session and guides on strong passwords and MFA.</li> </ul> <h3 id="19.-what-if-i-have-trouble-setting-up-a-password-manager%3F-%F0%9F%94%92" tabindex="-1">19. <strong>What if I have trouble setting up a password manager?</strong> 🔒<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#19.-what-if-i-have-trouble-setting-up-a-password-manager%3F-%F0%9F%94%92" aria-hidden="true">#</a></h3> <ul> <li>The Don’t Panic Protocol includes a guide to help you start with password managers. If you’re stuck, check the FAQ page or contact me directly for support.</li> </ul> <h3 id="20.-how-often-will-new-content-be-added-to-the-website%3F-%F0%9F%93%85" tabindex="-1">20. <strong>How often will new content be added to the website?</strong> 📅<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#20.-how-often-will-new-content-be-added-to-the-website%3F-%F0%9F%93%85" aria-hidden="true">#</a></h3> <ul> <li>I’ll be adding new content regularly to keep the website current. Visiting every few months ensures you stay updated on the latest in online security.</li> </ul> <h3 id="21.-is-this-website-secure-to-use%3F-%F0%9F%9B%A1%EF%B8%8F" tabindex="-1">21. <strong>Is this website secure to use?</strong> 🛡️<a class="tdbc-anchor" href="http://dontpanicprotocol.org/faq/#21.-is-this-website-secure-to-use%3F-%F0%9F%9B%A1%EF%B8%8F" aria-hidden="true">#</a></h3> <ul> <li>Yes, the site uses HTTPS encryption to keep your experience secure. We take all necessary measures to protect your privacy and safety online.</li> </ul> </content>
</entry>
<entry>
<title>📋 Checklist</title>
<link href="http://dontpanicprotocol.org/checklist/"/>
<updated>2024-11-24T21:11:55Z</updated>
<id>http://dontpanicprotocol.org/checklist/</id>
<content type="html"><h2 id="1.-authentication" tabindex="-1">1. <strong>Authentication</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#1.-authentication" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/authentication">🔐 Authentication</a></p> <p>Authentication is your first line of defense. Strengthen your security by implementing these practices:</p> <h3 id="1.1-use-strong-passwords" tabindex="-1">1.1 Use Strong Passwords<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#1.1-use-strong-passwords" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Create strong, unique passwords for all accounts (16+ characters).</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Use a password manager to organize and secure credentials.</li> </ul> <h3 id="1.2-enable-multifactor-authentication-(mfa)" tabindex="-1">1.2 Enable Multifactor Authentication (MFA)<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#1.2-enable-multifactor-authentication-(mfa)" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Turn on MFA for every account that supports it.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Avoid SMS-based MFA; use app-based codes or hardware keys.</li> </ul> <h3 id="1.3-monitor-and-update-passwords" tabindex="-1">1.3 Monitor and Update Passwords<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#1.3-monitor-and-update-passwords" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Sign up for breach notification services like <strong><a href="https://haveibeenpwned.com/">Have I Been Pwned</a></strong>.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Regularly update passwords and review account recovery settings.</li> </ul> <hr /> <h2 id="2.-internet-of-things-(iot)" tabindex="-1">2. <strong>Internet of Things (IoT)</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#2.-internet-of-things-(iot)" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/iot">🌐 Internet of Things (IoT)</a></p> <p>IoT devices can be a gateway for attackers. Secure them with these steps:</p> <h3 id="2.1-change-default-settings" tabindex="-1">2.1 Change Default Settings<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#2.1-change-default-settings" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Change default passwords on all IoT devices.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Disable unnecessary features like cameras and microphones.</li> </ul> <h3 id="2.2-update-and-monitor-devices" tabindex="-1">2.2 Update and Monitor Devices<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#2.2-update-and-monitor-devices" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Enable automatic updates to keep firmware current.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Monitor your network for unusual devices or activity.</li> </ul> <h3 id="2.3-segment-your-network" tabindex="-1">2.3 Segment Your Network<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#2.3-segment-your-network" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Set up a guest network for IoT devices.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Research devices before purchase to ensure they prioritize security.</li> </ul> <hr /> <h2 id="3.-networks" tabindex="-1">3. <strong>Networks</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#3.-networks" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/networks">🌐 Networks</a></p> <p>Your home network is the backbone of your digital security. Protect it with these actions:</p> <h3 id="3.1-secure-your-router" tabindex="-1">3.1 Secure Your Router<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#3.1-secure-your-router" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Change default router username and password.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Enable WPA3 (or WPA2) encryption.</li> </ul> <h3 id="3.2-monitor-and-update" tabindex="-1">3.2 Monitor and Update<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#3.2-monitor-and-update" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Update router firmware regularly.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Monitor connected devices and block any unknown ones.</li> </ul> <h3 id="3.3-strengthen-access" tabindex="-1">3.3 Strengthen Access<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#3.3-strengthen-access" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Create a guest network for visitors or IoT devices.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Consider using a VPN at the router level.</li> </ul> <hr /> <h2 id="4.-ongoing-maintenance" tabindex="-1">4. <strong>Ongoing Maintenance</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#4.-ongoing-maintenance" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/ongoing-maintenance">🔄 Ongoing Maintenance</a></p> <p>Cybersecurity is an ongoing process. Keep your defenses strong by:</p> <h3 id="4.1-enable-automatic-updates" tabindex="-1">4.1 Enable Automatic Updates<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#4.1-enable-automatic-updates" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Enable updates for all devices and software.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Schedule backups to both cloud storage and external drives.</li> </ul> <h3 id="4.2-monitor-and-review" tabindex="-1">4.2 Monitor and Review<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#4.2-monitor-and-review" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Regularly monitor accounts and devices for suspicious activity.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Review and limit app permissions to protect sensitive data.</li> </ul> <h3 id="4.3-test-your-defenses" tabindex="-1">4.3 Test Your Defenses<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#4.3-test-your-defenses" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Test backups periodically to ensure reliability.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Run weekly security scans for threats like malware or viruses.</li> </ul> <hr /> <h2 id="5.-personal-devices" tabindex="-1">5. <strong>Personal Devices</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#5.-personal-devices" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/personal-devices">📱 Personal Devices</a></p> <p>Your personal devices are treasure troves of data. Secure them with these steps:</p> <h3 id="5.1-encrypt-and-update" tabindex="-1">5.1 Encrypt and Update<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#5.1-encrypt-and-update" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Enable encryption and automatic updates for all devices.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Set up strong passwords or biometric authentication.</li> </ul> <h3 id="5.2-add-layers-of-protection" tabindex="-1">5.2 Add Layers of Protection<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#5.2-add-layers-of-protection" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Install antivirus and anti-malware tools.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Use a VPN when on public Wi-Fi.</li> </ul> <h3 id="5.3-manage-app-permissions" tabindex="-1">5.3 Manage App Permissions<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#5.3-manage-app-permissions" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Regularly review app permissions.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Secure your IoT devices and home network.</li> </ul> <hr /> <h2 id="6.-physical-security" tabindex="-1">6. <strong>Physical Security</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#6.-physical-security" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/physical-security">🔒 Physical Security</a></p> <p>Physical security complements your digital practices. Follow these steps:</p> <h3 id="6.1-secure-your-devices" tabindex="-1">6.1 Secure Your Devices<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#6.1-secure-your-devices" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Lock devices when not in use and enable auto-lock timers.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Use tracking features to locate or secure stolen devices.</li> </ul> <h3 id="6.2-protect-your-workspace" tabindex="-1">6.2 Protect Your Workspace<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#6.2-protect-your-workspace" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Invest in physical security tools like locks and privacy screens.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Secure your home office with locked storage and monitored security.</li> </ul> <hr /> <h2 id="7.-secure-messaging" tabindex="-1">7. <strong>Secure Messaging</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#7.-secure-messaging" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/secure-messaging">📩 Secure Messaging</a></p> <p>Keep your conversations private with these practices:</p> <h3 id="7.1-choose-encrypted-apps" tabindex="-1">7.1 Choose Encrypted Apps<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#7.1-choose-encrypted-apps" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Install and use secure apps like <strong><a href="https://signal.org/">Signal</a></strong> or <strong><a href="https://getsession.org/">Session</a></strong>.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Use decentralized apps like <strong>Jami</strong> for enhanced anonymity.</li> </ul> <h3 id="7.2-enable-privacy-features" tabindex="-1">7.2 Enable Privacy Features<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#7.2-enable-privacy-features" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Turn on disappearing messages for sensitive chats.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Verify contact identities to avoid impersonation attacks.</li> </ul> <hr /> <h2 id="8.-social-media" tabindex="-1">8. <strong>Social Media</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#8.-social-media" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/social-media">📣 Social Media</a></p> <p>Take control of your online presence with these steps:</p> <h3 id="8.1-adjust-privacy-settings" tabindex="-1">8.1 Adjust Privacy Settings<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#8.1-adjust-privacy-settings" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Review and adjust your privacy settings on all platforms.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Revoke unnecessary third-party app access.</li> </ul> <h3 id="8.2-be-mindful-of-what-you-share" tabindex="-1">8.2 Be Mindful of What You Share<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#8.2-be-mindful-of-what-you-share" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Turn off location tagging.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Avoid posting sensitive information like vacation plans.</li> </ul> <hr /> <h2 id="9.-web-browsing" tabindex="-1">9. <strong>Web Browsing</strong><a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#9.-web-browsing" aria-hidden="true">#</a></h2> <p><a href="https://dontpanicprotocol.org/web-browsing">🌐 Web Browsing</a></p> <p>Navigate the web safely with these actions:</p> <h3 id="9.1-use-secure-tools" tabindex="-1">9.1 Use Secure Tools<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#9.1-use-secure-tools" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Use privacy-focused browsers like <strong><a href="https://brave.com/">Brave</a></strong> or <strong><a href="https://www.mozilla.org/">Firefox</a></strong>.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Install tracker-blocking browser extensions like <strong>uBlock Origin</strong>.</li> </ul> <h3 id="9.2-protect-your-activity" tabindex="-1">9.2 Protect Your Activity<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#9.2-protect-your-activity" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Clear cookies and cache regularly.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Verify HTTPS before entering sensitive data.</li> </ul> <h3 id="9.3-add-extra-privacy" tabindex="-1">9.3 Add Extra Privacy<a class="tdbc-anchor" href="http://dontpanicprotocol.org/checklist/#9.3-add-extra-privacy" aria-hidden="true">#</a></h3> <ul class="contains-task-list"> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Use a VPN for public Wi-Fi.</li> <li class="task-list-item enabled"><input class="task-list-item-checkbox" type="checkbox" /> Consider using the <strong>Tor Browser</strong> for anonymous browsing.</li> </ul> </content>
</entry>
</feed>