Archives - Security Best Practice


Remove unnecessary software

Intruders can attack your computer by exploiting software vulnerabilities, so the fewer software programs you have installed, the fewer avenues there are for potential attack. Review the software installed on your computer. If you don’t know what a software program does, research the program to determine whether or not the program is necessary. Remove any […]

Secure your router

When you connect a computer to the internet, it’s also connected to millions of other computers—a connection that could allow attackers access to your computer. Although cable modems, digital subscriber lines (DSLs), and internet service providers (ISPs) have some level of security monitoring, it’s crucial to secure your router—the first securable device that receives information […]

Use a unique password for each site

Recycling passwords is easy, but dangerous. Make sure that every site you create an account for has a unique and strong password. You can use your own methodology to create such passwords, for example by turning a long and memorable phrase into acronym. Alternatively, you can use a password generator.

Find out where a link redirects to

Not every link leads to where it says it does. Redirects can send you to a site you wouldn’t have visited voluntarily and potentially cause your device to be infected. Services like Redirect Detective and Where Goes can help you see where a link goes to before you click it, sparing you the risk of […]

Why you need strong passwords

You probably use a number of personal identification numbers (PINs), passwords every day: from getting money from the ATM or using your debit card in a store, to logging in to your email or into an online retailer. Keeping track of all of the number, letter, and word combinations may be frustrating at times, but […]

Encrypt your main hard drive

PCs and Macs support full-disk encryption, which is a useful way to protect your data if your device is ever lost or stolen. On a Mac, enabling it is as simple as activating FileVault. On Windows, use Device Encryption or the more advanced BitLocker (which can also encrypt devices like removable USB drives). Phones and […]