My starter security stack
When people say they want to improve their digital security, they usually expect one of two bad outcomes.
Either they are about to get a lecture full of dramatic hacker language, or they are about to get handed a shopping list that makes normal life feel like an intelligence operation.
I do not think that is useful.
For most people, the best security setup is not the most advanced one. It is the one you will actually maintain after the first burst of motivation wears off.
That is why my starter stack is very boring on purpose.
If you only fix three things this year, I would make them these:
- a password manager
- MFA that is not terrible
- backups you have actually tested
That trio covers a shocking amount of real-world risk.
It helps with:
- reused passwords
- stolen credentials
- account takeover
- phishing fallout
- lost devices
- dead laptops
- ransomware
- “my phone was my whole life” moments
It is not flashy. It is not tactical. It is just what saves people most often.
Why I start here instead of somewhere fancier
Most everyday security failures are not exotic.
They are the result of familiar habits:
- one password reused across too many sites
- no second factor on the email account that controls everything else
- no recovery plan if a phone disappears
- no backup until something important is already gone
If you solve those, you are already doing better than a huge chunk of normal internet users.
This is what I care about most in a starter setup:
- high impact
- low friction
- easy to explain
- sustainable over time
- good recovery options when life gets messy
That last point matters more than people think.
Good security is not just about blocking bad things. It is also about being able to recover when something breaks, gets lost, or goes sideways at an inconvenient time.
Layer 1: a password manager
This is the highest-value change most people can make.
If you are still trying to remember dozens of passwords in your head, or you have a tiny set of “good enough” variations, the system is already broken.
The entire point of a password manager is simple:
- generate strong passwords
- store them securely
- autofill them when needed
- stop you from reusing the same credential everywhere
That last part is huge.
Password reuse is how a lot of account takeovers happen in practice. One random service gets breached, your email and password leak, and attackers try the same combination on your email, shopping accounts, cloud storage, streaming services, and anything else they can think of.
They do not need to crack your life like a movie hacker. They just need you to have reused the same password twice.
What I want from a password manager
I care less about fanboy debates and more about whether the tool makes good habits easy.
My checklist is:
- strong password generation
- easy autofill on phone and desktop
- solid support across browsers and devices
- passkey support or a credible path toward it
- secure notes or document storage if useful
- family sharing or emergency access options if relevant
- recovery that is clear enough not to become a self-own
If the app is so annoying that you stop using it, it is the wrong app for you.
Good normal-person options
I am not religious about brands here.
- Bitwarden is a very strong default recommendation. Good free tier, cross-platform, open-source reputation, and sensible pricing.
- 1Password is excellent if you want a polished, premium experience and strong family features.
- Apple Passwords/iCloud Keychain is fine for people who live almost entirely inside Apple’s ecosystem.
- Google Password Manager is decent for people who want the lowest-friction Android/Chrome path.
The important thing is not picking the “perfect” password manager. The important thing is picking one and actually moving your accounts into it.
How to switch without making it a giant project
Do not try to fix all 173 accounts in one heroic sitting. That is how people burn out and quit halfway.
Start with the accounts that matter most:
- primary email
- bank and payment services
- Apple, Google, or Microsoft account
- password manager account itself
- phone carrier
- cloud storage
- social accounts you care about
For each one:
- change the password to something unique and long
- save it in the manager
- turn on MFA if available
- store any backup or recovery info properly
Then every time you log into another account over the next few weeks, clean that one up too.
That approach is much more sustainable than trying to complete a massive migration in one night.
Common mistakes with password managers
Mistake 1: still making up your own passwords
Let the manager generate them.
Humans are bad at inventing strong, unique passwords at scale. That is the entire reason the tool exists.
Mistake 2: never storing anything because “I’ll sort it out later”
Later is where bad systems go to die.
If you create or change a login, save it immediately.
Mistake 3: weak master password
Your master password should be long, memorable, and unique. A passphrase works better than a weird short string you will forget.
Mistake 4: no recovery plan
Know what happens if you lose your phone, reset a device, or forget how to sign in.
If the app offers an emergency kit, recovery sheet, or account recovery instructions, take that seriously.
Layer 2: MFA that is not terrible
MFA means multi-factor authentication. Same general idea as 2FA, just slightly broader language.
The point is simple: even if somebody gets your password, they still need a second thing before they can log in.
This matters because passwords leak.
They leak through:
- breaches
- phishing
- malware
- reused credentials
- sketchy extensions
- shoulder-surfing and plain bad luck
MFA is what keeps one bad password incident from automatically becoming a full account takeover.
My rough preference order
For most people, the order is still:
- hardware security keys if you are willing to use them
- authenticator app codes for the best balance of security and convenience
- SMS codes only when better options are unavailable
Hardware security keys
These are excellent for high-value accounts, especially email.
They are resistant to a lot of phishing attacks because they tie authentication to the actual service and require the physical key.
The downside is obvious: they cost money and they add some friction.
If you are the kind of person who will actually carry and manage them, great. They are worth it.
If you are not, do not let perfection stop you from enabling an authenticator app instead.
Authenticator apps
For normal people, this is the sweet spot.
An authenticator app gives you rotating codes or approval flows that are significantly better than relying on SMS alone.
It is not magic, but it is a meaningful upgrade with tolerable hassle.
Just make sure you understand how your authenticator app itself is backed up or transferred. People sometimes secure every account beautifully and then discover the second-factor app was sitting on one phone with no migration plan.
SMS codes
SMS is better than nothing.
That sentence annoys security purists, but it remains true.
SMS has known weaknesses, including SIM-swap risks and interception concerns. But for many ordinary accounts, turning on SMS-based verification is still safer than leaving MFA off entirely.
Use something stronger where you can. Use SMS where you must. Just do not pretend “none” is somehow cleaner.
The most important accounts to protect first
If you only have energy for a few accounts tonight, do these first:
- your main email
- your bank and payment services
- your Apple/Google/Microsoft account
- your password manager account
- your phone carrier account
That list is not random.
Those accounts often function as recovery paths or control points for everything else.
Common MFA mistakes
Mistake 1: not saving backup codes
This is incredibly common.
People enable MFA, feel proud for thirty seconds, and then ignore the recovery codes.
Then the phone gets lost, replaced, or reset.
Store backup codes somewhere separate and intentional:
- printed and stored safely
- in a secure note inside a password manager if that fits your model
- in a protected family vault if shared recovery matters
Mistake 2: securing everything except email
Your email is the reset lever for half your digital life.
If your email is weak, the rest of your account security can collapse behind it.
Mistake 3: assuming MFA makes phishing irrelevant
MFA helps a lot, but you still need basic caution. Some phishing attacks are designed to capture more than just a password, and some tricks target recovery flows instead.
Layer 3: backups you can actually restore from
Backups are the least emotionally exciting part of the stack right up until they become the only thing standing between you and a very stupid week.
A backup matters when:
- a phone is lost
- a laptop dies
- a drive fails
- ransomware hits
- you delete something important
- sync behaves badly and wipes data everywhere
- a child, pet, or cup of coffee ends a device’s career
People often say they “have backups” when what they actually have is one of these:
- files only on the original device
- cloud sync, but no real recovery history
- an old external drive that has not been plugged in for a year
- vague optimism
That is not a backup strategy. That is wishful thinking with cables.
The 3-2-1 rule still holds up
You do not have to follow it with religious precision, but it remains a great mental model:
- 3 copies of important data
- 2 different storage types
- 1 copy off-site
For normal people, that often looks like:
- your working copy on the device
- cloud backup or sync with version history
- external drive or second backup destination
What to back up first
Do not get lost in edge cases. Start with the stuff that would really hurt to lose:
- family photos and videos
- personal documents
- tax and financial records
- school or work files you control
- phone data and settings
- password manager recovery info and MFA backup codes
- any irreplaceable creative work
Test restores, not just backups
This is the part people skip.
A backup you have never restored from is just a theory.
Test something small:
- restore a folder
- recover a deleted note
- verify you can restore a phone from backup
- open an old file from your backup destination
If you cannot do that calmly, your backup system is unfinished.
Backups are also part of security
People think of backups as hardware failure protection, but they matter for security too.
If ransomware, account compromise, or a bad sync event hits you, the ability to recover clean copies matters a lot.
Backups do not stop every attack. They do stop some attacks from becoming disasters.
How these three layers work together
The nice thing about this stack is that the layers reinforce each other.
- The password manager gives every account a unique credential.
- MFA limits damage when one credential leaks anyway.
- Backups help you recover when a device or account problem still happens.
That combination is what makes it practical.
You are not betting everything on one perfect defense. You are giving yourself multiple ways not to have a terrible day.
A one-hour setup plan if you want to stop procrastinating
If you want a simple starting session, do this:
In the first 20 minutes
- choose a password manager
- create a strong master password or passphrase
- save the recovery details properly
- install the app on your phone and computer
In the next 20 minutes
Secure your five highest-value accounts:
- Apple/Google/Microsoft account
- bank
- password manager account
- phone carrier
For each one, set a unique password and enable MFA.
In the last 20 minutes
- check your phone backup status
- confirm your computer backup method
- verify where family photos and critical files live
- test one small restore or recovery step
That is already a major improvement.
Who should keep this simple
If you are a normal home user, do not overcomplicate the first version of your security setup.
You do not need ten niche tools, a dramatic threat model, or a bunker mentality.
You need reliable habits.
Boring, repeatable, well-understood habits beat fancy security cosplay every time.
The takeaway
If you only do three things well, make them these:
- unique passwords in a real password manager
- MFA on the accounts that matter most
- backups you have tested at least once
That stack will not make you invincible.
It will make you much harder to mess with, much easier to recover, and much less likely to lose your week to something preventable.
Which, for normal people, is the whole point.
Frequently Asked Questions
Do I need a paid password manager?
Not necessarily. Free tiers from reputable services are enough for many people. Paid plans become useful when you want family sharing, advanced recovery, passkey syncing, or extra storage and convenience features.
Is SMS-based MFA useless?
No. It is weaker than hardware keys or authenticator apps, but it is still better than having no second factor at all.
What counts as a real backup?
A backup counts when it is separate from the original device and you have verified you can restore from it. If you have never tested recovery, you mostly have a theory, not a backup.
