Archives - Security Best Practice


Check security settings on your web browser

Your web browser is your primary connection to the rest of the internet, and multiple applications may rely on your browser, or elements within your browser, to function. This makes the security settings within your browser even more important. Many web applications try to enhance your browsing experience by enabling different types of functionality, but […]

Keep your wireless printer secure

Remember that every item on your wireless network is a potential entry point for bad actors. This applies to wireless printers, too, and many people share access to these devices. Make sure automatic software or firmware updates are enabled, keep access to the printer protected by a password, and change those passwords regularly. A USB […]

Protect your privacy online

Before submitting your email address or other personally identifiable information online, you need to be sure that the privacy of that information will be protected. To protect your identity and prevent an attacker from easily accessing additional information about you, be cautious about providing your birth date, Social Security number, or other personal information online.

How to protect your passwords

Now that you’ve chosen a password that’s easy for you to remember, but difficult for others to guess, you have to make sure not to leave it someplace for people to find. Writing it down and leaving it in your desk, next to your computer, or, worse, taped to your computer, is just making it […]

Know your e-waste laws and pickup centers

Disposing of electronics is a tricky business. Tossing old monitors, PCs, cellphones and other devices straight into the dumpster is not only dangerous, but in many jurisdictions, it also carries a fine. Research the laws in your area to find out what you can and can’t throw away. Even if trashing e-waste is permitted in […]

Securely wipe your hard drive before donating or recycling an old PC

Always make sure to perform a factory reset before you dispose of used personal electronics. For added security, you should securely erase hard drives, too. This may be required by your employer’s tech policy, so make sure to work closely with the IT department to meet their security protocol. For many uses, free and open-source […]