Hello everyone,
Having benefited greatly from the wisdom shared in this forum, I felt it timely to initiate a dedicated thread on OPSEC.
Operational Security (OPSEC) is not just a buzzword—it's a necessity in our tech-driven world, and it extends far beyond KYC (Dangers of KYC and compliance officers).
Our personal and business data's safety is paramount in today's digital world. Drawing on the collective knowledge here, let's delve deeper into tools and strategies to mitigate risks.
I warmly invite all to share their insights and expertise. Thank you!
Here's a collection of different "technological areas" and relevant tools to get the discussion going.
Do you use any of them or something else? Why? Why not?
Operating Systems:
Having benefited greatly from the wisdom shared in this forum, I felt it timely to initiate a dedicated thread on OPSEC.
Operational Security (OPSEC) is not just a buzzword—it's a necessity in our tech-driven world, and it extends far beyond KYC (Dangers of KYC and compliance officers).
Our personal and business data's safety is paramount in today's digital world. Drawing on the collective knowledge here, let's delve deeper into tools and strategies to mitigate risks.
I warmly invite all to share their insights and expertise. Thank you!
Here's a collection of different "technological areas" and relevant tools to get the discussion going.
Do you use any of them or something else? Why? Why not?
Operating Systems:
- Windows 10/11 Pro: With features like BitLocker for disk encryption and Windows Defender for built-in malware protection.
- Linux Distributions: Such as Ubuntu, Fedora, or Debian which are known for robust security and can be further hardened for corporate use.
- Qubes OS: Uses compartmentalization to isolate different tasks on a computer.
- Tails: A live operating system that you can start on almost any computer from a USB stick or a DVD. It helps you use the internet anonymously.
- Microsoft Office 365: It offers cloud-based productivity tools and has advanced security features.
- Google Workspace: Previously G Suite, offers cloud-native applications with built-in security features.
- LibreOffice: open-sourced office alternative
- Tor Browser: Helps anonymize web browsing activities.
- Brave: A privacy-focused browser that blocks trackers and ads.
- DuckDuckGo: extension for chrome/firefox
- DuckDuckGo: A search engine that doesn't track you.
- StartPage: Offers Google search results in a privacy-focused manner.
- Wireshark: For capturing and analyzing network packets.
- Little Snitch: Monitors outbound connections from your computer.
- Barracuda Email Security Gateway: Protects against phishing, spam, and malware.
- Mimecast: Offers email security, archiving, and continuity solutions.
- Proofpoint: Provides advanced threat protection for email.
- ProtonMail: Encrypted email service based in Switzerland.
- eM Client - Email Client and Calendar Software for Windows and Mac
- Tutanota: end-to-end encrypted email app and a freemium secure email service.
- Bitdefender GravityZone Business Security: Offers protection against malware, phishing, and more.
- Kaspersky Endpoint Security: Provides robust security features for corporate endpoints.
- Symantec Endpoint Protection: A comprehensive endpoint security solution.
- SET up your private VPN?
- Mullvad: Known for its strict no-logs policy and anonymous payment methods.
- ProtonVPN: Offers strong encryption and based in Switzerland, which has strong privacy laws (or does it?)
- WireGuard: A new VPN protocol that is lightweight and highly secure.
- Fortinet FortiGate: A high-performance firewall solution.
- Cisco Meraki MX: Cloud-managed security and SD-WAN.
- Sophos UTM: Provides firewall, web filtering, email security, and more.
- LastPass Enterprise: For centralized password management in companies.
- 1Password for Business: Secure password manager with a team focus.
- Dashlane Business: Provides password management and dark web monitoring.
- KeePassXC: Open-source password manager where you control the database.
- Bitwarden: Open-source password manager with end-to-end encryption.
- Box: Offers enterprise-level security and collaboration features.
- Tresorit: Known for its end-to-end encryption.
- Dropbox Business: With advanced security features.
- Session - encrypted messenger getsession.org
- Slack Enterprise Grid: Collaboration tool with enterprise-level security.
- Microsoft Teams: Part of the Office 365 suite with advanced security options.
- Zoom: Offers video conferencing with end-to-end encryption.
- Signal: End-to-end encrypted messaging app.
- Wire: Secure and encrypted chat, voice, and video calls.
- Okta: Provides identity and access management solutions.
- Microsoft Azure Active Directory: Offers identity services and access management.
- OneLogin: Unified access management for applications.
- Veeam Backup & Replication: Protects critical data.
- Acronis Cyber Backup: Provides cyber protection with secure backup.
- Druva inSync: Cloud-based data protection and management.
- VMware Workspace ONE: Unified endpoint management for devices.
- MobileIron: Offers mobile-centric, zero-trust security approach.
- Microsoft Intune: Part of the Microsoft Enterprise Mobility + Security offering.
- VeraCrypt: Successor to TrueCrypt, it provides on-the-fly encryption for files and whole drives.
- GNU Privacy Guard (GPG): For file and email encryption.
- Cryptomator: open source, encrypts your data quickly and easily. Afterwards, you can upload them protected to your favourite cloud service.
- Malwarebytes: For malware detection and removal.
- GlassWire: Monitor network activity and block potential threats.
- BleachBit: Open-source tool for cleaning your computer and freeing up space while also shredding documents.
- Eraser: Securely erases data from hard drives.
- JohnnyDoes device: Patent for secure erasing of data
- RedkeyUSB
- Bitcoin (with proper usage): Cryptocurrency that can be used for anonymous transactions.
- Monero: A privacy-centric cryptocurrency.
- BusKill - Dead Man Switch triggered when a magnetic breakaway is tripped