Archives - Security Best Practice


Implement a “clean desk, clear screen” policy for employees

A clean desk policy involves removing any sensitive business information from your desk everyday. This can include USB sticks, notebooks, business cards and printed documents. Inadvertently leaving them out is an invitation to data theft, which could result in a serious breach of your business’ network. Add a ‘clear screen’ policy, so employees are required […]

Regularly clear your browser history and cookies

Almost everything you do on the internet is recorded by your browser. Every site you visit, all the information you enter in online forms and cookies (small files downloaded onto your computer when you visit a website) all begin to build up. This could potentially provide someone with all the data they need to access […]

Buy privacy protection when you register a website domain

Normally by default, purchases of new website domains publish your name and mailing address in a publicly searchable database. This may lead to unwanted spam. Luckily, you can typically pay a small annual fee to keep your registration information private.

Use fake answers to security prompts

If you regularly post on social media or disseminate details like addresses and names online, a criminal might attempt to break past your security questions because they have enough information to guess the answers. So why not make them up? Come up with the false name of a childhood best friend, your first street, favorite […]

Adjust your cookie allowances

Cookies track your browsing behavior for a better user experience, which usually means more targeted ads and content. But that information remains with the website; it’s wise to limit your cookie trail. If you’re using Google Chrome, head into Settings > Content > Cookies to toggle your settings. You might want to deny all third-party […]

Enable two-factor authentication on Facebook

If one of your passwords has been compromised, a hacker can easily break into your social media accounts and find much more personal information. They might even imitate you to scam friends or family. It’s worth adding two-factor authentication to your account – verifying a log-in attempt with a code sent to your mobile phone. […]