Archives - Security Best Practice


Test your VPN service before making the purchase

VPNs are supposed to keep your IP address from getting leaked to the public. However, due to security flaws in their systems, many VPN services fail to do so. Luckily, most providers will allow you to trial their services before making a payment. Test your VPN by writing down your current IP address (which can […]

View the internet as a novel, not a diary

Make sure you are comfortable with anyone seeing the information you put on blogs, social networking sites, and personal websites—write it with the expectation that it is available for public consumption and that people you have never met will find your page. Although some sites use passwords or other security restrictions to protect the information, […]

Turn Off Your Computer

With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being “always on” renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker’s connection—be it spyware or a botnet that […]

Delete sensitive files the right way

If you need to delete a PDF with your banking information on it, don’t just drag-and-drop it into the trash folder on your desktop. This won’t entirely delete the file, which means it can still be accessed by hackers. Instead, use a dedicated erasure app to eliminate any chance of the file being recovered.

When it comes to password protection, listen to the experts

Cybersecurity professionals recommend creating passwords that are at least 20 characters long, with a unique mix of letters, numbers and symbols. They also say you should never use the same password twice and update them every 90 days.

Keep tabs on your bank and credit card statements

Be sure to continuously check your accounts for any unauthorized activity. Good record keeping goes hand-in-hand with managing your cybersecurity. Another tip for monitoring activity is to set up alerts so that if your credit card is used, you will receive an email or text message with the transaction details.