My FULL Account Security Strategy Explained (you can copy)

35,550
0
Published 2024-01-11
My online security strategy can be distilled into 7 simple laws that you're welcome to copy. These rules will help you easily make decisions about how you use passwords, password managers, passkey, 2FA and more. Get 20% off DeleteMe: www.joindeleteme.com/allthingssecured

▶ Not in the US? Try the international site: international.joindeleteme.com/

If you care about your personal security and privacy online, download my free security checklist here:
✅ Security Checklist: www.allthingssecured.com/security-checklist-pdf/


🔹🔹What to Should Watch Next🔹🔹

We've got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we're a bit biased). If you're wanting to increase your online cybersecurity, here's what's next:

✅ Change these 7 Facebook Privacy Settings NOW!    • How to Change Your Facebook Privacy S...  

✅ STOP Using VPNs! (here's why):    • Don't Use a VPN...it's not the ultima...  

✅ Are spy apps safe?    • DON'T USE MOBILE SPY APPS!  (there's ...  


🔹🔹Support All Things Secured🔹🔹
If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support!

✅ Recommended Password Manager: www.allthingssecured.com/yt/1password

✅ Recommended Identity Monitoring: www.allthingssecured.com/try/identity-guard-yt

✅ Recommended 2FA Security Key: www.allthingssecured.com/yt/yubikey

✅ Recommended Secure Email: www.allthingssecured.com/try/protonmail-yt

✅ Recommended VPN: www.allthingssecured.com/try/nordvpn-yt


*********************
Video Timestamps
*********************
0:00 - My Account Security Strategy
0:53 - 7 Laws of Account Security
3:13 - The Biggest Account Security Mistake
4:01 - Why I Use DeleteMe for Privacy
4:39 - 4 "New" Laws of Account Security
5:56 - Controversial Thoughts on Passkeys
*********************

Account security is more than just a password and maybe an extra form of authentication. If you really want to upgrade your online security, it requires an intentional security framework. Listen as Josh shares his 7 laws for account security that help determine how he creates passwords, uses password managers, sets up passkeys and even physical 2FA keys.

#passwordmanager #onlinesecuritytips #onlinesecurity

All Comments (21)
  • @rejphotography
    I have a request/suggestion. When you mention another video in your videos, please leave a link in the description in addition to the popup within the video. This has happened to me several times while watching one of your videos. I am wanting to watch the content you refer to, but am not finished watching the current video. So I either have to write down the time stamp, or click the new link, save it to watch later, then go back and finish watching the first video. Leaving the link in the description is more efficient for your watchers. Thank you for all you do.
  • @magarnicle
    A law I'd add is to have a physical safe. Store recovery codes in here, or use it to store passwords you don't want in your password manager, such as the password to you're email where password reset requests get sent. And for people who find an online password manager too complicated, this is where you can store your passwords.
  • @hugo3796
    1 don’t keep all eggs in one basket 2 long passwords 3 always use 2FA (with Authenticator codes NOT SMS) 4 Security Key 6 separate Authenticator apps 7 except for common accounts like Pinterest Bonus: A) Email Alias B) Secure apps with biometrics C) Private number D) Passkey if security key not available
  • @macbitz
    Great video! I have also stuck with passwords and 2FA rather than passkeys because I still feel that the added convenience of passkeys ultimately degrades security and I'm also waiting to be convinced.
  • @mikaellundqvist
    I do it only slightly differently because I mostly focus on making iCloud and Google accounts maximally secure with security keys, passkeys and in iCloud E2EE almost all of it. Then less important accounts can (preferably) Sign in with Apple or the slightly less secure Google. Greetings from Sweden. 👋
  • @ipaemer2604
    Very interesting and very useful video. I always enjoy your videos.
  • @safdjqw0
    Holy cow!! It’s Josh from the Xinjiang channel! I have your PDF book from way back when.
  • Another awesome video josh! Thank you again! I’ve been following you religiously now for right at a year’s time as I’ve been navigating my way through a horrific stalking situation that is the makings of a PsyOps Horror Novel. lol 😂. Because of this channel, I’ve gone from knowing zero things about cyber security to feeling very knowledgeable and empowered about all of my online privacy and security. I’ve made massive shifts in 2023 towards extreme privacy and safety. Because my literal life has depended on it. Thank you so much!!
  • @bigjoegamer
    There are 2 kinds of passkeys: device-bound and synced. Device-bound passkeys can't be replicated; they're like physical security keys in that way.
  • @davinp
    Authy is planning to shut down its desktop authenticator app in August 2024. They still will have their mobile apps on iOS and Android
  • @kaori-3882
    Thanks for the video! I will stick with physical hardware keys for now. Also, it's often said that the main security vulnerability is education, and I just can't understand Passkeys... And if someone as knowledgeable as you also struggling to see it's merits, then it is evidence that passkey proponents have a problem with the education part...
  • @namewithheld367
    So your bonus law number 4. Only use physical keys and not use passkeys if both options are available. I was in this camp until recently. There is something going on with iOS and MacOS recently where Google does not recognize my Yubikeys via Safari anymore. I was able to bypass this by using an old out of date Mac, reregister one of my Yubikeys and then switched back to my modern hardware to reregister all of other keys. So it’s hard to tell if it is Google or Apple, but someone f’d up and almost locked me out of my Google accounts.
  • @Eric-bn3dd
    I really like your advice. I like that you don't go too extreme and still use gmail or facebook like normal people. However taking a few steps towards better security and privacy.
  • @VictorMoraes_dt
    Thank you for the video. I still haven't started using e-mail alias and I couldn't find a decent way to implement that virtual phone strategy in my country (maybe I'm not doing a proper research), but one thing I use in addition to long passwords, password manager and 2FA is the double-blind method, where you only store part of the password in the password manager, but the other part is some special characters that only you know. So when you are signing into an app, you generate and store a password from password manager + your own password I do that for important accounts only, but that gives me more security that, in case my password manager ever got hacked, the hacker still won't have the full information to log into my accounts
  • @elizabeth4053
    Do you suggest logging out of certain apps on your iPhone to allow for entering credentials like the 2FA?
  • @DJOZMET
    Can you talk about outlook firewall. (Security policies)
  • @MakeitZUPER
    Facial recognition or fingerprints don't matter if there's an option to use a pin instead. It seems that a pass key is the wiser option.