Archives - Security Best Practice


Use private browsing, but don’t rely on it exclusively to keep you safe

Private browsing is a good way to keep browsing history secret and avoid cluttering your machine with cookies and temporary files. However, it’s not a security measure per se – you can still be spied on and hit with malware infections while nominally incognito. Combine private browsing with antivirus software and other protective measures.

Enable automatic updates for your security and data management apps

Outdated software is one of the biggest risks to data security. Countless attacks have targeted known exploits in older versions of popular applications and operating systems. To stay safe, use solutions like Total Defense Internet Security that automatically implement new updates as they become available.

Beware of publicly accessible computers.

Hotel business centers, libraries, and cyber cafes provide computers that anyone can use. However, travelers cannot trust that these computers are secure. They may not be running the latest operating systems or have updated anti-virus software. Cyber criminals may have infected these machines with malicious viruses or install malicious software.

What are cookies?

When you browse the Internet, information about your computer may be collected and stored. This information might be general information about your computer (such as IP address, the domain you used to connect (e.g., .edu, .com, .net), and the type of browser you used). It might also be more specific information about your browsing habits […]

Beware the tech support pop-up message scam

Individuals receive an on-screen pop-up message claiming a virus has been found on their computer. In order to receive assistance, the message requests the victim call a phone number associated with the fraudulent tech support company. Individuals who receive a pop-up or locked screen, should shut down the device immediately. Ignore any pop-ups instructing to […]

Don’t spam other people

Be a responsible and considerate user. Some people consider email forwards a type of spam, so be selective with the messages you redistribute. Don’t forward every message to everyone in your address book, and if recipients ask that you not forward messages to them, respect their requests.