Tip Number 1: Non-digital Security
Not all attacks are sophisticated, like stealing a sticky note with a password written on it (thanks Silicon Valley) or looking over someone's shoulder as they access an account. So being aware of non-digital measures are important. Be aware of your surroundings, where/how you store passwords and, who you give access to your device. Admittedly this first one is not really a single "tip" as it is a lifestyle, but failing to do this can render all other measures useless. After all, no security measure will block your own password and username.
Tip Number 2: Segregating Networks
Hide your home network. First off your network should be hidden and password protected. Also, separate it into different camps. Creating divisions within your home network can allow you to control users and vulnerabilities. An example of this would be to create a "work" network, a "friends and kids" network, and a "devices" network. Doing this will keep visitors and less internet savvy users from creating vulnerabilities for your work network and data.
Tip Number 3: Implementing a Password Manager
This is an instance where recycling is a terrible idea. Most of us are guilty of using the same password for many of our accounts and devices. A password manager can help with the logistics of never using the same or similar passwords. Utilizing multifactor authentication for sites and applications can also enhance managing your password. This requires you to not only have the correct password but also the mobile device associated with the account.
Tip Number 4: Dedicated Email Accounts
Our email accounts are precious even if we don't always treat them as such. They provide direct access to us from the digital world rather than seeking out content. As a result, we sometimes fall into a sense of security and trust while in our inbox. Creating dedicated email accounts for highly sensitive correspondence can help us know exactly who we are talking to. Creating an account solely for banking or insurance can help you identify false or misleading emails claiming to be from these institutions.
Tip Number 5: Security Focused Software
Lastly, it is important to know and recognize the strengths and limits of any software that you are using. If it has known security risks or security features that you could be utilized but are not. Let's look at some in two common applications you may have.