Stronger security practices
The stringent security guides and practices listed below are probably overkill for the average home user. These are not security guesses written by bored fanboys on a rainy Sunday afternoon; they are security guides carefully written and justified by teams of professionals who ground their recommendations in technical facts.
We link these tools in the hopes that they will be useful to operational security professionals. We do not recommend that these guides be slavishly followed from A to Z, but rather seen as lists of technical protections from which any given organization can choose those defenses appropriate to the risks/dangers it faces.
US Department of Defense Security Technical Implementation Guides (STIGs)
US National Security Agency configuration guidance for operating systems
Center for Internet Security - far more than just mainstream OS guides, CIS have security tools/guides for BSD, Linux, Apache, routers, and more.