My pragmatic suggestion is that you
can't protect yourself against the agencies whose names are three-letter acronyms.
However, by and large:
"These aren't the 'droids you're looking for.™"
Mostly, you're looking to defend yourself against: asshole opportunists
, disgruntled former employees, and maybe industrial spies.
Usually, these people don't know you, don't want anything you have, and don't care if they wind up targeting
you. They literally just want to cause trouble.
Often, the simplest solutions are the most effective:
- The door is securely locked – and concealed.
- There are no open windows.
- The information is always-currently backed up, and the backups protected.
- Software updates are timely applied.
- Sensible security-management practices are observed.
Your house becomes: "Why
bother with this one? Just go on to the house next door. We have no particular motive to break in to
this house."
And, really, "it's the same for Linux, OS/X, Windows, Z/OS, or any-and-every other operating system." Security is a
process.