Archives - Security Best Practice


Beware of publicly accessible computers.

Hotel business centers, libraries, and cyber cafes provide computers that anyone can use. However, travelers cannot trust that these computers are secure. They may not be running the latest operating systems or have updated anti-virus software. Cyber criminals may have infected these machines with malicious viruses or install malicious software.

What are cookies?

When you browse the Internet, information about your computer may be collected and stored. This information might be general information about your computer (such as IP address, the domain you used to connect (e.g., .edu, .com, .net), and the type of browser you used). It might also be more specific information about your browsing habits […]

Beware the tech support pop-up message scam

Individuals receive an on-screen pop-up message claiming a virus has been found on their computer. In order to receive assistance, the message requests the victim call a phone number associated with the fraudulent tech support company. Individuals who receive a pop-up or locked screen, should shut down the device immediately. Ignore any pop-ups instructing to […]

Don’t spam other people

Be a responsible and considerate user. Some people consider email forwards a type of spam, so be selective with the messages you redistribute. Don’t forward every message to everyone in your address book, and if recipients ask that you not forward messages to them, respect their requests.

Carefully review before you post on social networks

When posting on the internet – only post information you are comfortable with anyone seeing – remember it is a public resource. This includes information and photos in your profile and in blogs and other forums. Additionally, once you post information online, you can’t take it back. You may delete the information from a site, […]

Regularly delete emails in your spam folder

Depending on the time of year, spam messages account for between 50 and 60 percent of all email traffic. In addition to containing potentially dangerous content, at that volume they can also easily eat up your entire inbox capacity. Instead of waiting the normal 30 days for automatic deletion, consider manually mass-deleting them each day […]