It depends on what your threat model is and what your technical skills are, but here are some basics:<p>Fundamentals:<p>* If you are a Windows user, stop using an administrative account and set up a low priv user account for day to day work.<p>* Update your software, OS, router, etc<p>* Use a password manager (Bitwarden, LastPass, Dashlane, KeypassXC, 1Password, etc) and employ long and unique passwords on every site<p>* Employ the strongest 2FA available whenever possible<p>* Use a full tunnel VPN when you are on a network you don't control (an algo setup with a cloud provider, built in openvpn appliance on your router, custom setup, commercial offering from a reasonable provider like ProtonVPN or Mullvad, your school / workplace's VPN depending on what you are doing, etc). Better yet, avoid networks you don't control when possible.<p>* Use an adblocking extension such as ublock origin<p>* Set your browser to clear browsing data when you close it<p>* Set up a preference for HTTPS in Firefox or use the https everywhere extension<p>* Use DNS over HTTPS which is now built in to firefox<p>* Treat random communications as hostile. Did you get a crazy employment offer that is too good to be true? Does your long lost cousin want you to help them launder money? Are there hot girls or boys in your neighborhood looking to chat with you? Its a scam.<p>More advanced:<p>* Disable macros in office / your PDF reader<p>* Set up script blocking with umatrix, ublock origin, or no script. Check out thehatedone on youtube for tutorials. privacytools.io is another good resource.<p>* Set up a VM for handling links and attachments. Configure a linux VM, update it, and snapshot it. Whenever you receive a link to a site you are not familiar with, a shortened link, or an email attachment, open them within the VM. If the link or attachment is malicious and code is executed, any payload executed will be constrained to the VM and likely will not be able to break out of the VM and harm your actual host OS. Additionally, many malicious payloads won't execute at all if they detect that they are operating in a virtual environment (to try to thwart reverse engineering or analysis by defensive products). After you deal with the attachment or link, revert to the VM snapshot (thus unwinding any changes made since the snapshot) and you will end up with a clean safe state again.<p>* Open attachments in Google Drive if you don't want to deal with a VM. Any payloads present will be executed on Google's servers rather than your box.<p>* If you are running linux, set up apparmor for your browser of choice. Start with the default policies (aa-profiles) and modify to fit your setup.<p>* When in doubt, check certs. Major corps are probably not getting certs from lets encrypt.