Archives - Personal Information


How to avoid being a phishing victim

Phishing is a type of cyberattack where criminals try to trick you into revealing personal information or clicking on malicious links. Phishing emails often look like they’re from a legitimate company, such as your bank or credit card company. But they’re actually designed to steal your information or infect your device with malware. Here are […]

Utilize biometric authentication for sensitive apps

Biometric authentication is considered one of the most secure and convenient methods of user authentication for sensitive applications. This technology leverages fingerprint recognition, facial recognition, iris scanning, voice recognition and — in certain cases — behavioral biometrics to facilitate streamlined, secure access.  This approach eliminates the need for memorizing and managing complex passwords, making it […]

Configure your smartphone to automatically lock after a short period of inactivity

While there’s no one-size-fits-all for how long it should take for your phone to lock following inactivity, generally, the earlier, the better — though, not at the complete expense of convenience. Consider setting an automatic inactivity lock on your smartphone after approximately five minutes or fewer, depending on preference. This, in turn, will help improve […]

Invest in a webcam cover, or ensure your webcam is disabled when it’s not in use

Webcams are a common target for those who seek to invade your privacy. To best safeguard yourself, webcam covers are an affordable, easily implementable safety measure that prevents cybercriminals from gaining unauthorized vision. Alternatively, disabling your webcam while it’s not in use serves a similar purpose, ensuring that no one can access your camera without […]

Implement a device password policy for your household and/or organization

Such policies and/or guidelines may include the following: You may also like to consider implementing an incident response plan, outlining what to do in the case of a security breach or device theft — working to reduce risk by ensuring that everyone is on the same page.

Shred digital files for secure disposal

Deleting files from your computer doesn’t mean they’re really gone. With the right tools, someone could recover sensitive data even after you’ve deleted it. That’s why it’s important to shred digital files before you dispose of them. File shredding software overwrites deleted items to make them far less accessible. There are many different file shredding […]