Archives - Security Best Practice


Be careful of granting sensitive permissions to new apps

Many apps — even well-known ones — ask for a long list of permissions when they’re installed. This can include location data, camera access, your email information, and other potentially sensitive permissions. Be wary of what you grant access: An image-editing app probably doesn’t need access to your emails to function. Note that location data […]

What’s multi-factor authentication (MFA)?

Multi-factor authentication is a type of authentication that requires multiple pieces of evidence to validate a user’s identity. It typically involves up to three factors – something the user knows (like a password or PIN), something the user has (such as a security token or cellphone), and something the user is (a biometric characteristic, like […]

Take advantage of cloud storage — but don’t neglect physical backups

Cloud storage can be an invaluable way to access your important documents and data remotely and keep it safe in case your local storage fails. However, cloud storage is typically kept behind a password, meaning an unauthorized user can potentially access it if they have your credentials. In addition, cloud storage isn’t 100% safe from […]

Comparing the security of popular browsers: Which is best at protecting your privacy?

Privacy is a big selling point for many internet users. Many rightfully worry that they’re being identified and tracked online. In the age after the Cambridge Analytica scandal, it’s become obvious that many companies want as much of your personal data as they can get their hands on. In response, virtually every browser has extensive […]

Use two-factor authentication

Two-factor authentication adds an extra step to logging in after you enter a password. This usually involves entering a code sent via text message or email to complete the login process. Sometimes, an app such as Google Authenticator is used. The benefit of this is that even if someone has your password, they won’t be […]

If you’re still using older devices, keep a close eye on them

There’s no problem with holding onto a phone, tablet, or computer for a long period of time, but there are two important conditions you should keep in mind. If the device’s support has reached its end-of-life and is connected to the internet, you should seriously consider upgrading to a newer model. This is because devices […]