Archives - Security Best Practice


Pay attention to how you charge your devices

Just because a connector fits your device doesn’t mean you should use it for charging. Unlicensed third-party cables might damage your phone or PC. There’s also the more subtle risk of quicker-than-normal battery degradation through fast-charging. All batteries lose their ability to hold a charge over time, but high-voltage charging accelerates this process.

Install your big software updates overnight

While many updates to operating systems and applications are minor and take just a few minutes to complete, others are huge and make require hours. To minimize delays and hassle, it’s a good idea to schedule updates overnight, when you’re not using the device and when update servers aren’t as busy. This will also help […]

Block pop-up advertisements

Pop-up blockers disable windows that could potentially contain malicious code. Most modern browsers have a feature that you can enable to block pop-up advertisements, check in the browser settings.

What is Shoulder Surfing?

In public areas malicious actors can simply glance over your shoulder as you type. By simply watching you, they can steal sensitive or personal information. Screen protectors which prevent shoulder-surfers from seeing your device screen can be purchased for little money. For smaller devices, such as phones, be cognizant of your surroundings while viewing sensitive […]

Avoid oversharing on the Internet

There is such a thing as too much information. Oversharing is more than simply annoying. When a criminal decides to target someone for an identity theft scheme, they sometimes begin their attack by simply researching the person’s social media accounts. If the intended victim doesn’t have privacy settings set up, or if they do but […]

Be careful with shortened links

Vanity link shorteners such as bit.ly and goo.gl were once popular as a space-saving techniques on platforms like Twitter. They carry risks, though, since you cannot immediately see where they lead. Truncated URLs have been used in several scams. For example, a goo.gl address was central to a phishing campaign that pointed victims to a […]