Archives - Security Best Practice


Choose internet connections you trust

Use your home service or Long-Term Evolution connection through your wireless carrier. Public networks are not very secure, which makes it easy for others to intercept your data. If you choose to connect to open networks, consider using antivirus and firewall software on your device.

Get backup codes for your Google Account

Google provides many options for securing your account with two-factor authentication. But what if you don’t have access to your phone or other device for confirming a login attempt? This is where backup codes come in handy. These numeric codes can be generated by your Google Account and will work for logging in if you […]

Secure your most important internet accounts with a hardware key

Hardware keys such as the popular YubiKey provide strong second factor authentication when signing into services such as Gmail, Facebook and Dropbox. They can either be plugged into a port on your device or be connected wirelessly through Near-Field Communication. Without this unique key, no one can access your accounts, even if they know the […]

Set up a Guest account on macOS

If you have a Mac and need to share it with someone, you should set up a Guest account before doing so. This can be done from System Preferences -> Users and Groups. A Guest account provides minimal features, so that the user cannot do any damage to the operating system or your data.

Upgrade from Windows 7

Mainstream support for Windows 7 is ending in 2020. That means continuing to run it will come with major security liabilities. If it’s on your main PC, consider upgrading to Windows 10. Replacing Windows 7 with a free Linux-based operating system, like Debian or Ubuntu, is another option.

Modify unnecessary default features

Like removing unnecessary software, modifying or deleting unnecessary default features reduces attackers’ opportunities. Review the features that are enabled by default on your computer, and disable or customize those you don’t need or don’t plan on using. As with removing unnecessary software, be sure to research features before modifying or disabling them.