Archives - Security Best Practice


Why are security settings for web browsers important?

Your web browser is your primary connection to the rest of the internet, and multiple applications may rely on your browser, or elements within your browser, to function. This makes the security settings within your browser even more important. Many web applications try to enhance your browsing experience by enabling different types of functionality, but […]

Use private browsing, but don’t rely on it exclusively to keep you safe

Private browsing is a good way to keep browsing history secret and avoid cluttering your machine with cookies and temporary files. However, it’s not a security measure per se – you can still be spied on and hit with malware infections while nominally incognito. Combine private browsing with antivirus software and other protective measures.

Enable automatic updates for your security and data management apps

Outdated software is one of the biggest risks to data security. Countless attacks have targeted known exploits in older versions of popular applications and operating systems. To stay safe, use solutions like Total Defense Internet Security that automatically implement new updates as they become available.

Beware of publicly accessible computers.

Hotel business centers, libraries, and cyber cafes provide computers that anyone can use. However, travelers cannot trust that these computers are secure. They may not be running the latest operating systems or have updated anti-virus software. Cyber criminals may have infected these machines with malicious viruses or install malicious software.

What are cookies?

When you browse the Internet, information about your computer may be collected and stored. This information might be general information about your computer (such as IP address, the domain you used to connect (e.g., .edu, .com, .net), and the type of browser you used). It might also be more specific information about your browsing habits […]

Beware the tech support pop-up message scam

Individuals receive an on-screen pop-up message claiming a virus has been found on their computer. In order to receive assistance, the message requests the victim call a phone number associated with the fraudulent tech support company. Individuals who receive a pop-up or locked screen, should shut down the device immediately. Ignore any pop-ups instructing to […]