It really depends could you elaborate on "locked things up"
1. End point protection , As others have mentioned there are Antivirus solutions that also incorporate Firewall , even Windows has a built in firewall option. There are dedicated Firewall options like ZoneAlarm (wow that brings back memories)
2. Home Border Protection. There are home network routers that come with some basic firewall options you can enable if not already done. If you have an Old PC you could build something and run several options, my first one was IPCOP now taken over by IPFire. Others like PFsense or Opensense, Untangle (paid), etc etc. Currently i use Firewalla Gold (there are cheaper options), as I find it easy to apply parental controls and monitor via phone app. Some home routers you buy offshelf may support OpenWRT which has better firewall features than what comes on the device. Some better firewalls will provide Intrusion Detection, and inspection also. But it again depends on how much you want to manage and can manage. Making a change and having your family scream that things are not working is not fun.
3. End User .... this one is the tough one being aware of what you open and click on or download and install. Being aware not to share information without thinking how it might be used. Insuring you initiate the conversation with banks and other agencies and enable 2 factor authentication. Be aware people who call you may not be who they say they are. When looking to call people for help insure your caling the right people and you can verify who they are. Use diffrent passwords and tools like BitWarden (or similar) to store passwords and generate random passwords for accounts. If you chose Google to create accounts on new sites be aware they just need to hack your google account and then all else is open to them.
4. Physical access, dont write down passwords. how are you locking your mobile devices so someone who finds them dose not gain access. For example many people now using smart locks etc if those locks are opened using an App on a phone, if the phone is compromised then so is the lock. Also if you have 2 factor authentication using SMS etc then if your phone is compromised then there is another breach point.
5. Who is listening ... Google, Amazon smart devices that you enable for voice control.. I have often wondered why my youtube is suddenly populated with videos of a subject i did not search for but was having a conversation about with family. Secure these devices and do some research b4 you buy on if they can be secured.
All of the above is dependent on the value of the information you are trying to protect.
|