Archives - Security Best Practice


When in doubt, uninstall an app or extension

Chances are you have a lot of apps on your phone or tablet that you don’t use. In 2017, App Annie estimated the average smartphone has 60 to 90 apps installed. It’s important to regularly review all of them and see if any can be deleted, since they might be unsupported, compromised or performing unwanted […]

Don’t use an admin account on a daily basis

Admin accounts are powerful. They extend certain permissions not available to other accounts on a device. The bad news is that if your device is lost, stolen or hacked, these administrator capabilities could be manipulated to cause a lot of damage. Consider setting up a second account for daily use, one without admin privileges.

Enable Limited Ad Tracking on iOS

Overall, iOS has many built-in security and privacy protections turned on by default. There are additional features that can help shield your data from falling into the wrong hands. Under Settings –> Privacy –> Advertising, you can select “Limit Ad Tracking” to control how much information is shared between apps.

Randomize your hardware address on Windows 10

The hardware address of your Windows 10 device can be used for tracking you as you move between Wi-Fi networks. To avoid this surveillance, toggle on the hardware randomization option in Windows 10’s Wi-Fi settings.

Don’t rely on old unsupported applications

Once an application is no longer supported by its maker via updates for security and functionality, it’s risky to use since you might not even know what unpatched exploits it contains. Old versions of QuickTime, Windows (especially XP) and many other everyday programs are perfect examples and should be avoided in favor of newer ones.

Set your web browsers security settings to the highest level

Your web browser is your primary connection to the rest of the Internet, and multiple applications may rely on your browser, or elements within your browser, to function. Many web applications try to enhance your browsing experience by enabling different types of functionality, but this functionality might be unnecessary and may leave you susceptible to […]