Archives - Security Best Practice


Never post your email address to a public forum

If you want to give someone on a message board or social network you email address, it’s best to send it to them via a private message. Alternatively, you can type out the address, substituting actual words for the “@” and “.” symbols. These techniques protect you from having your email captured by automatic scanners […]

Don’t click the unsubscribe button in a spam email

Unsubscribe buttons are useful for removing your email address from high-volume mailing lists, like those from political campaigns or big box stores. However, they can also be used against you by spammers: Clicking one of these buttons confirms your account is in active use and in some cases redirects to you a compromised webpage. Flagging […]

Uninstall Adobe Flash Player

Flash is a holdover from a previous era of the web, when most traffic was from PCs. Mobile devices don’t even support it and there are now safer desktop alternatives, such as HTML5, for running certain browser apps. Consider uninstalling it to shield yourself from the many threats that exploit it.

Log out of websites when you’re done using them

Staying logged in to a website or app is convenient, but it creates some security risks. Attackers may be able to impersonate your session ID and hijack your account. Log out when you’re finished and use a password manager so it’s easy to log back in.

Protect your privacy by doing business with credible companies

Before supplying any information online, consider the answers to the following questions: Do you trust the business? Is it an established organization with a credible reputation? Does the information on the site suggest that there is a concern for the privacy of user information? Is legitimate contact information provided? If you answered “No” to any […]

Set child computer safety rules and warn about dangers

Make sure your child knows the boundaries of what they are allowed to do on the computer. These boundaries should be appropriate for the child’s age, knowledge, and maturity, but they may include rules about how long they are allowed to be on the computer, what sites they are allowed to visit, what software programs […]