Archives - Security Best Practice


Use Startpage for private web searches

If you appreciate Google for its accuracy in finding relevant information while you’re searching, but don’t appreciate the added tracking and clickable ads, Startpage might be a great alternative for you. This privacy-focused search engine pays Google for the right to use its search algorithm, so you get results that are just as helpful, but […]

Use the Epic Privacy Browser for more protection while searching

Epic Privacy Browser is secure because it uses a virtual private network (VPN) with servers in eight countries and provides free VPN access. It blocks ads, trackers, fingerprinting, cryptomining and ultrasound signaling, and it can stop over 600 tracking attempts every browsing session. Epic Privacy Browser is available for Apple, Windows and Android devices. To […]

Don’t put all of your important data in a single location

It’s a bad idea to keep all of your important photos, videos, documents and apps that you would never want to lose track of on one local system that hasn’t been backed up. Best practice is to maintain multiple copies across different locations, using online backup and/or external hard drive solutions as needed.

If your device is no longer receiving updates, think about upgrading

Countless smartphones, tablets and laptops are eventually abandoned by their manufacturers, at least when it comes to regular security and operating system updates. When this happens to a device you rely on, consider switching it out for a newer or alternative version or one that is still getting these critical patches and upgrades.

Watch out for requests to update your personal information

Most organizations – banks, universities, companies, etc. –  will not request your personal information over email. Do not disclose personally identifiable information online such as your full name, telephone number, address, social security number, insurance policy number, credit card information, or doctor’s name. Avoid opening attachments, clicking on links, or responding to email messages from […]

Delete accounts you haven’t used in six months or longer

If you do not regularly use an account, it shouldn’t exist. If an account that you don’t check regularly gets hacked, you may not even notice until the hacker causes significant damage. You may think that your old social media accounts don’t contain much sensitive information, but you’d be surprised. They might contain your email, […]