I do not do a lot of tech talk on this blog since that is not it’s purpose. Or recommending of products, but I want to mention an area that has serious implications and offer a few suggestions. That is the area of web browsers. If you are the typical user you probably use Google Chrome or Internet Explorer, and many use Firefox or Safari. While all of these browsers are good they may not be ideal.
There is an assumption in cybersecurity that all connection from the outside is bad and untrusted until proven to be trusted. This is called the trust model of security. It is an important basic building block to building a secure posture. Unfortunately, the browsers mentioned above do not follow this trust model.
Proper Assumptions
The main commercial browsers are in the first place marketing tools and they are very effective at this. Their job is to collect and distribute information while you the individual user navigates the internet. So their assumption is to make everything as open as possible and to offer you security and privacy tools to lock them down if you want to.
The problem is that most people do not know what to lockdown and when and where. So most browsers are in a very vulnerable and open stance most of the time. There may be a better way.
Other Options
I do not endorse these products but consider them a good start into securing your browser. Comodo Dragon is a good start. It allows you to select two versions one for chrome and one for Firefox. It also has very strong DNS protection capabilities.
The next is EPIC who takes out all of the cookies and other trackers you currently have on your normal browser. It also has an encryption feature that uses one button proxy. It does slow down the connection but gives you good protection.
Brave is another one. It has great privacy features and anti-tracking control. It is newer than the other two but has many features and a strong development community behind it. Also, its performance is very good being a lightweight browser.
There is a brief roundup. Take a look at these and think about how secure browsers may be included in your cybersecurity posture. It is a basic level control that can be very beneficial.