Cross-posted from wired.com[by Lo Benichou]
You can’t lock down all the things all the time—it’s the digital equivalent of hiding in a bunker. Build a personal protection plan that makes sense for you.
Look in the Mirror
Start your security assessment with what’s known as a threat-modeling exercise. Ask yourself what you want to protect and from whom, and estimate the likelihood that the specific parties would compromise your data. Plug the high-risk holes first. Everything else, you can sweat a little less.
Master Your Passwords
A good password manager generates, stores, and updates all your passwords with a button press. The actual passwords are encrypted and accessible solely by you, but the system is only as good as your master password. Use a key generated by the Diceware method, which randomly selects words to build a complex but easy-to-remember phrase.