Archives - Security Best Practice


Think of nonsensical phrases for passwords

There are multiple proven ways to make your passwords stronger, including the use of password managers to automatically generate and store all of your logins. Alternatively, you can take matters into your own hands by thinking of nonsensical phrases – e.g., “the Walrus and the Carpenter were preparing three pancakes!” and abbreviate it into a […]

Access your accounts via web browser instead of links

Phishing is one of the oldest and most effective cyberattack techniques. To reduce your risk of having sensitive data stolen, never click on any emailed or texted links purporting to take you to your account page for a password reset or other modification. Instead, if you’re unsure whether action is merited, navigate to the account […]

Remove old search results about yourself

Someone looking up your name on a search engine like Google might find results related to your previous jobs and addresses, along with information about your relatives. This data could be used against you, for example in determining the answers to security questions. Luckily, Google offers a URL removal tool for requesting takedowns of specific […]

Make your devices go to sleep sooner

Password-protected PCs, Macs, tablets and smartphones all have cutoff points at which they lock their screens, requiring re-entry of the passcode or PIN. The time frame for relocking is adjustable, but the safest option is to force anyone attempting to log in to re-enter the device password immediately. That way, you don’t have to worry […]

Don’t bank or shop on untrustworthy networks

When checking your online bank balance or making a purchase, it’s best to avoid networks you don’t normally use, especially public Wi-Fi hotspots that might expose your activity to unwanted third parties. Conduct important transactions on your password-protected home network or with the help of a virtual private network (VPN) service.

Use alternatives to SMS for two-factor authentication

If you use two-factor authentication, it’s best to rely on codes sent to other devices or applications such as Duo or Google Authenticator instead of SMS texts. That’s because SIM hacking is on the rise. This practice entails a cyberattacker tricking a customer service representative into reassigning a phone number to a new SIM card.