Archives - Security Best Practice


Don’t hurry to click links

Links online may be tricky. If incorporated in text, you can’t directly see where they go to, meaning a simple click could take you somewhere you did not want to go, like a webpage infested with adware. Try hovering over them with a mouse, or copying them with a press and hold contextual menu on […]

Allow common sense to guide your online posting

It’s a good idea, before you post something online, that you think about what value it provides and consider the consequences of having the information available to the public. Identity theft is an increasing problem, and the more information an attacker can gather about you, the easier it is to pretend to be you. Act […]

Beware of sharing personally identifiable information

Whether you’re a business or a consumer, it’s important to keep personally identifiable information (PII) secure. PII is any type of data that could be used to identify, locate or contact an individual, such as name, date of birth or place of residence. PII is often targeted by hackers because it can be sold for […]

Use a zero-trust approach to network security

If you manage an enterprise-grade network, you’re likely responsible for keeping sensitive corporate data under lock and key. When employees and outsiders access your corporate network, they could also potentially access unprotected data. Zero-Trust Network Access verifies the identity of a user before allowing them entry into the network – thus preventing unauthorized users from […]

Backup your files and data to an offline copy

Data is a lucrative target for cybercriminals. If your accounts become compromised, they could access your sensitive data and personal information. Backup programs mitigate the risk that bad actors delete or hold data ransom. Automated programs can even schedule routine backups at an interval to ensure your most recent data is protected. Storing this backup […]

Watch out for email autocomplete

Many times, just entering a couple of letters in the “to:” field of an email often results in your email client filling an auto-completion. Sometimes it may be great feature, but one that may backfire. It might for instance, result in you mistakenly sending sensitive information to someone who shouldn’t have received it.