Archives - Security Best Practice


Switch to contactless payments for better hygiene

Worried about getting pathogens on your credit/debit card or on the change you receive after a cash payment? Explore options for contactless payments. These range from NFC/chip-based technologies like Apple Pay and Google Pay to code scanners like Walmart Pay and Target Wallet. All you need is a bank account or card to link the […]

Stay current – Keep pace with new ways to stay safe online

Keep up with new technology and ways to manage privacy. Visit staysafeonline.org, our own Security Tip of the Day or other trusted websites for the latest information about ways to stay safe online. Talk about what you discovered with your family and engage them on a regular basis to share what they know about privacy.

Personal information is like money – Value it. Protect it.

Your devices make it easy to connect to the world around you, but they can also pack a lot of info about you and your friends and family, such as your contacts, photos, videos, location and health and financial data. Information about you, such as the games you like to play, what you search for […]

Never leave devices unattended

It is important to remember that laptops, phones and tablets should never be left unattended. Ensure your devices are with you at all times. If you are staying in a hotel, the best thing to do is lock them in a safe. If a safe is not available, lock them in your luggage. And, while […]

Switch off automatic syncing to your iCloud

Sensitive files from your Apple devices may be uploaded to your iCloud account without your knowledge. If your account gets hacked, that data can get stolen even if you deleted it off your device. Have more control over which items you store in the cloud and which ones you keep local by switching off Apples’ […]

Don’t use your work email for personal reasons

Remember, when a hacker gets access to one device, they can potentially infect all the other devices on that network. So, if you accidentally click on a bad link in an email during work, you could be putting your entire company at risk. To reduce the likelihood of hackers breaching your company’s network, never use […]