Archives - Security Best Practice


Don’t use an admin account on a daily basis

Admin accounts are powerful. They extend certain permissions not available to other accounts on a device. The bad news is that if your device is lost, stolen or hacked, these administrator capabilities could be manipulated to cause a lot of damage. Consider setting up a second account for daily use, one without admin privileges.

Enable Limited Ad Tracking on iOS

Overall, iOS has many built-in security and privacy protections turned on by default. There are additional features that can help shield your data from falling into the wrong hands. Under Settings –> Privacy –> Advertising, you can select “Limit Ad Tracking” to control how much information is shared between apps.

Randomize your hardware address on Windows 10

The hardware address of your Windows 10 device can be used for tracking you as you move between Wi-Fi networks. To avoid this surveillance, toggle on the hardware randomization option in Windows 10’s Wi-Fi settings.

Don’t rely on old unsupported applications

Once an application is no longer supported by its maker via updates for security and functionality, it’s risky to use since you might not even know what unpatched exploits it contains. Old versions of QuickTime, Windows (especially XP) and many other everyday programs are perfect examples and should be avoided in favor of newer ones.

Set your web browsers security settings to the highest level

Your web browser is your primary connection to the rest of the Internet, and multiple applications may rely on your browser, or elements within your browser, to function. Many web applications try to enhance your browsing experience by enabling different types of functionality, but this functionality might be unnecessary and may leave you susceptible to […]

Reduce email spam using filters or spam tagging

Many email programs offer filtering capabilities that allow you to block certain addresses or to allow only email from addresses on your contact list. Many ISPs also offer spam tagging services that allow the user the option to review suspected spam messages before they are deleted. Spam tagging can be useful in conjunction with filtering […]