Archives - Security Best Practice


A powerline adapter has more security than a home Wi-Fi network

Whereas home Wi-Fi networks use a broadcasted signal that can potentially be broken into, you can also opt for a powerline setup that establishes a connection through your home’s electrical circuit. These connections are completely private. Powerline adapters can boost home network speeds. Some homes just aren’t very well made for Wi-Fi networks, leading to […]

Cancel free trials as soon as you sign up for them to avoid getting charged

Free trials for anything can be a great way to try out something new, whether it’s a radio service or a subscription-based online game. Many of these deals require you to enter your credit card information. However, it’s very easy to forget to cancel free trials before they expire, leading to an unwanted renewal that […]

Avoid downloading anything you didn’t explicitly seek out

When you’re browsing the web, you might be tempted by a pop-up ad to install some kind of program, usually a security one. But to be on the safe side, it’s best to avoid downloading any programs you weren’t actually looking for. This will help keep you away from any suspicious software that, even if […]

Meet at a police station any time you want to perform an in-person transaction

If you try to buy something from someone online and both parties agree to meet in person, you should always meet in a well-lit public location and never at your home. The safest option may be a police station’s parking lot. Some of these locations even have dedicated spots for completing in-person transactions.

Have a backup email account in case your primary is compromised

If someone gets a hold of your email credentials, they can potentially do a lot of damage to your privacy. This makes it a good idea to have at least one other email address that you can use as a backup recovery email. All major email services allow you to register a backup email for […]

What’s a phishing attack?

Phishing is a type of social engineering tactic intended to steal personal information from unsuspecting people. It generally occurs in the form of emails or websites appearing to come from reputable companies or organizations, such as credit card companies or charities. The messages often indicate that there is a problem and will request for individuals […]