Archives - Security Best Practice


When using public Wi-Fi, don’t download any sensitive assets

The programs and applications you download, as well as your internet history, can be monitored by the operator of a public network. To protect your privacy, set limitations on your activity while using public Wi-Fi in coffee shops, airports, etc. 

Enable auto-updates for your smart TV

Like mobile devices and laptops, smart TVs are more at-risk of being compromised by hackers if they contain older firmware and applications. That’s why you need to make sure new versions are always installed when they’re available. But it’s hard to remember to do this every time, so enabling auto-updates can be helpful. This option […]

Update your router

Malware attacks on routers are becoming more common among individuals and businesses. Once hackers have access to your router, they can infect all of the devices connected to that network, such as laptops, mobile devices and security cameras. Older routers are more vulnerable to attacks, so make sure you’re keeping up to date with the […]

Don’t trust a URL just because it ends with .gov

Obtaining a .gov domain is easier than you think. By successfully impersonating elected officials (like the mayor of a small town), and filling out an application, hackers can illegally purchase .gov domains with little proof of authority. Keep this in mind the next time you’re entering private information into a .gov website.

Treat business information as personal information

Business information typically includes a mix of personal and proprietary data. While you may think of trade secrets and company credit accounts, it also includes employee personally identifiable information (PII) through tax forms and payroll accounts. Do not share PII with unknown parties or over unsecured networks.

Be cautious of shortened links

URL shortening is a technique used to make links friendlier and easier to remember, particularly when displayed on social media channels. For example, with Twitter’s 140-character limit, shortened links help give users more space in their tweets. However, they’re also used by cybercriminals as a tool for malware, so don’t be too quick to click […]