Archives - Security Best Practice


Customize applications you have access to when your iPhone is locked

The release of iOS 15.4 introduced a suite of new features for iPhone users. One new ability – the ability to customize which apps you can access from the lock screen – could pose a risk to your cybersecurity. When trying this new addition, be careful which apps you enable. Messages and the Wallet app, […]

Use an encrypted email service

Secure email services can encrypt your messages to ensure they’re only accessible to authorized parties – not even the email provider will be able to access them. Some services go one step further and allow you to create aliases that protect your private correspondence and keep your primary address anonymous.

Be careful when using public PCs

When staying in a hotel or studying in a library, be mindful of how you use publicly accessible computers. There’s no telling who accessed these PCs or how safe they may be. Don’t log in to any personal accounts or input any sensitive information – public computers may be infected with keylogging malware designed to […]

Classify your corporate data by sensitivity

Data classification is a staple part of data security. It helps your organization determine where they should focus their efforts and which types of data are better left unattended. Classifying data by sensitivity – that is, how damaging the information could be if it were destroyed or exposed – is a great way to prioritize […]

Don’t hurry to click links

Links online may be tricky. If incorporated in text, you can’t directly see where they go to, meaning a simple click could take you somewhere you did not want to go, like a webpage infested with adware. Try hovering over them with a mouse, or copying them with a press and hold contextual menu on […]

Allow common sense to guide your online posting

It’s a good idea, before you post something online, that you think about what value it provides and consider the consequences of having the information available to the public. Identity theft is an increasing problem, and the more information an attacker can gather about you, the easier it is to pretend to be you. Act […]