Introduction
As technology and networking become increasingly integrated into our lives, the threat of cybercrime will only grow. It’s a scary reality, and if you find yourself feeling paranoid, you’re probably justified. In this article, I’ll share how I approach this complex digital landscape and offer some advice on how you might want to think about it too. Be warned, this perspective isn’t for the faint of heart.
The Escalating Cyber Threat
In recent years, we’ve been bombarded with news about cyber attacks, ransomware infections, and data breaches. It makes sense that these events are on the rise. If technological advancements follow Moore’s Law, then the associated risks and incidents should also increase in both frequency and impact.
As computing becomes more abstracted from the binary code that drives it, and as chips and data processing become ubiquitous in our environments, we find ourselves increasingly vulnerable. We are at the mercy of computers and those who know how to manipulate them. In this new reality, you have three choices:
1. Reject this reality. You could move to the countryside and live a simple life without computers. It might seem possible, but think about it—can you really go without a bank account, on-demand entertainment, or digital communication with loved ones? The truth is, escaping technology entirely is much harder than it seems.
2. Become an expert. You could immerse yourself in learning everything there is to know about computers. Start by understanding how to customise your machine, manage software, and secure your files. Then delve deeper into programming languages, web development, and eventually, the hardware itself. See computers not as magical devices, but as machines governed by simple rules and intricate arrangements of switches.
3. Learn how to behave in this reality. The third option, and likely the most practical, is to find a balance. You don’t need to be at the mercy of experts, but you also don’t need to become one. Instead, learn how to interact with technology in a way that minimises your risk. Be selective about the tech you use, and take the time to understand it fully.
The first two options are extreme, so in this article, we’ll focus on the third: how to think and act in an ever-evolving technological world.
Embrace the Reality: You Have No Privacy
The default mindset you should adopt is that if you have something on a computer (a text file, a photo, or any type of file) and that computer is connected to the internet, someone else can potentially access it. Everything on your computer is vulnerable, and it’s important to start believing that everything you do online is visible to others. Every site you visit, every word you type, is logged. The internet builds a profile of you, learns from your behaviour, and can adapt and replicate accordingly.
This awareness can lead to what is known as the “Chilling Effect." People often modify their behaviour online, knowing they are being tracked. (Did you know that everything you type into Facebook is logged, even if you delete it before posting?) However, you don’t want to adjust your real life to fit a false online persona. Instead, understand what should and shouldn’t remain on your computer. By starting with the mindset that you’re never truly alone online, you’ll either act more cautiously or rethink when and how you use your PC.
What do you do with things that matter?
This leads to an important question: What should you do with your valuable data? Your private photos, videos, and documents?
The second mindset you need is that all technology will eventually fail. Never keep just one copy of anything important. Hard drives can fail unexpectedly, devices can be stolen, and data can be corrupted or rendered obsolete.
Most of what you have on your computer (OS, software and settings) can be replaced. If your laptop gets destroyed, you can buy a new one and reinstall the programs. It’s inconvenient and costly, but not catastrophic. The real concern is losing irreplaceable data. Here’s how I manage my important files:
I keep two SATA hard drives (both from HGST) with the exact same directory structure. These drives are stored in anti-static bags, kept out of a computer, and regularly checked for bad sectors. If one shows signs of failure, I immediately sync the data to a new drive and destroy the old one. (Update - I now additionally keep NVMe drives) While I’m not particularly concerned about movies or music that can be re-downloaded, I do maintain a library of documents, images, and irreplaceable personal data. For these, I aim to have hard copies where possible (print the photos!) and also keep a backup in the cloud.
Can you trust the cloud?
What is the “cloud”?
The cloud is both everything and nothing—a term used to describe the vast, interconnected network that makes up the internet. More specifically, it refers to data storage and processing managed by companies like Apple (iCloud). Storing data in the cloud simply means that your files are on someone else’s hard drive, somewhere in the world. But is it safe? Not entirely. While it might be more secure than your personal computer, large companies are bigger targets for hackers.
Encrypt everything you can
If you plan to use the cloud for storing important data, I highly recommend using Mega. You get 50GB of storage for free, and it’s fully encrypted. This means that even if a hacker gets access to the data, it will be scrambled and unreadable without the encryption key. Mega was created by Kim Dotcom, a privacy advocate and brilliant technician, making it a trustworthy option for secure cloud storage.
Passwords, passwords, passwords…
Passwords are a necessary evil in the digital world. Unfortunately, many people use passwords that are easily guessed or cracked. To protect your accounts, use a random key generator to create complex, unique passwords for each account. Store these in a password manager, like Keepass, so you never have to remember them (which would be nearly impossible anyway). Another good strategy is to use passphrases, which can be both strong and easier to remember. Additionally, enable two-factor authentication (2FA) wherever possible, especially for accounts that hold sensitive information.
Cloudwards have written a fairly comprehensive article here, on setting up strong passwords which is worth a read, but beware of password checkers which are mentioned. They use techniques that don’t always translate into strong passwords. Here is a good article explaining why.
Avoid Social Engineering
Social engineering is a tactic used by cybercriminals to manipulate people into revealing confidential information. Don’t fall for it. Don’t get phished. Don’t get manipulated. If you don’t know your passwords, no one can coax them out of you. Be cautious with unsolicited messages, emails, or links. Legitimate companies will never ask for your passwords or access to your computer out of the blue. If you receive a suspicious message, don’t panic and click on links or install software.
Conclusion
n this ever-evolving cyber world, the best approach is to be vigilant and proactive. I would go on and talk about Private Clouds, TOR, VPNs, torrenting and the such, but that’s for another time. To summarise:
- Assume everything you do online is visible to others.
- Assume your computer can be accessed while connected to the internet.
- Keep important files duplicated and stored offline if possible.
- Expect your computer to fail at the worst possible time.
- Create hard copies of irreplaceable data.
- Only create online accounts that are truly necessary and delete them when they are needed.
- Use encryption and two-factor authentication wherever possible.
- Make strong passwords and store them securely.
- Don’t let fear or manipulation lead you to compromise your security.
If you follow these steps and adjust your behaviour accordingly, you can navigate the digital world with greater confidence. Your personal data will be secure, your accounts locked down, and everything else is just transient; less important than the memories and money you might lose.