Archives - Security Best Practice


Enable firewall protection

Firewall protection works by either blocking or permitting network traffic — also referred to as network packets and data packets — based on a set of predefined security rules. Its primary purpose is to act as a barrier between your computer and potential threats. By enabling firewall protection, you establish an additional line of defense for […]

Create a disaster recovery plan

In the instance of your sensitive information becoming breached, a well-structured disaster recovery plan is necessary to mitigate potential damages. While the plan will differ depending on the nature of the breach, you generally want to consider a risk assessment, backup restoration and legal and compliance matters. The specific plan will vary depending on the […]

Configure your smartphone to automatically lock after a short period of inactivity

While there’s no one-size-fits-all for how long it should take for your phone to lock following inactivity, generally, the earlier, the better — though, not at the complete expense of convenience. Consider setting an automatic inactivity lock on your smartphone after approximately five minutes or fewer, depending on preference. This, in turn, will help improve […]

Implement email filtering rules to automatically categorize and prioritize incoming messages

The main objective of email filtering is a reduction in phishing risk. By analyzing sender information, content and attachments, these filters identify suspicious emails and arrange them into categories relative to their nature. You can set up email filtering rules either by using the built-in features of your email provider or by utilizing a dedicated […]

What is file sharing and how does it work?

File sharing is the practice of distributing digital files with others. It can be done in a variety of ways, including: File sharing is a popular way to share music, movies, photos, and other types of files with friends and family. It can also be used to share work documents or educational materials with colleagues […]

Spot HTTPS indicators to protect your browsing

HTTPS is the secure version of HTTP, the protocol used to transfer data between web browsers and servers. How do you know if a site is protected by HTTPS? Look in the URL bar. It should start with “https://”. Depending on the browser and site, it might also show a padlock icon or a green […]