Threat modeling
Every protective step is a tradeoff: you could lock down your security by going off the grid, ceasing to talk to anyone, and throwing your phone in the ocean. But the reality is that collaboration is necessary for organizing, and you need usability in addition to security. Finding that balance - and figuring out what you want to protect and from whom - is called threat modeling. Here’s a guide to assessing your risks.
Based on your threat modeling, here are a series of steps you can take to secure accounts, browsing, communications and devices, from universal precautions to maximalist measures.