Archives - Security Best Practice


How to check your privacy is protected

Review the website privacy policy before submitting your name, email address, or other personal information on a website. This policy should state how the information will be used and whether or not the information will be distributed to other organizations. Businesses sometimes share information with partner vendors who offer related products or may offer options […]

How to disable in-app purchases

The advent of the modern smartphone came with a slew of marketing with the slogan “there’s an app for that.” And it’s all but true: there’s an app for nearly any and everything. A lot of these apps come for the low, low price of free, but of course, there’s a catch. Free apps can […]

Connect no more than 50 devices to a single home router

Consumer routers should hold no more than 50 connections. The more devices, the greater the security risk. If one device is compromised, all other devices on the network could be, too. A good rule of thumb is to connect your most used devices — those with the most personal data — to a second home […]

Lock your mobile device

The United States Computer Emergency Readiness Team (US-CERT) advises locking your device when you are not currently using it. You might only step away for a couple of minutes, but that’s enough time for someone to steal or destroy your information. Use strong PINs, passwords and biometric (fingerprints, facial recognition) to prevent others from opening […]

Be careful where you download gaming mods

Downloading mods is a common and often fun way for gamers to squeeze the most out of a game. They can enhance gameplay and make for an all-around better experience. Many, in fact, are supported by the game manufacturers themselves. These are the safest mods for a gamer to download. Not all third-party mods are […]

Delete your old, unused apps on all your devices

Have you ever downloaded an app, used it a few times, but never actually got around to deleting it? Don’t worry, you’re not alone. However, it could be a major security risk. If you don’t keep up with your apps, you may not know which ones aren’t being updated anymore. Those dormant apps lose the […]