Archives - Security Best Practice


Modify unnecessary default features on new PCs

Remove unnecessary software, modify or delete unnecessary default features that will reduce attackers’ opportunities. Review the features that are enabled by default on your computer, and disable or customize those you don’t need or don’t plan on using. As with removing unnecessary software, be sure to research features before modifying or disabling them.

Install and use antivirus software

Installing an antivirus software program and keeping it up-to-date is a critical step in protecting your computer. Many types of antivirus software can detect the presence of malware by searching for patterns in your computer’s files or memory. Antivirus software uses signatures provided by software vendors to identify malware. Vendors frequently create new signatures to […]

Your computer security is important

Computers are an indispensable part of our daily lives. It’s imperative to correctly configure your home computer before linking it to the internet to keep it, and your personal information protected. Because computers play such important roles in our lives, and because we enter and view so much personally identifiable information (PII) on them, it’s […]

Turn off auto-fill

While auto-fill is a very useful feature for reducing the laboriousness of entering your personal information every time you order or book online, it also opens up your personal information for exploitation if your account is compromised, or if your device is stolen. While it might be a little more tedious to have to input […]

Parental controls aren’t just for kids

Parental controls are generally used to protect children from certain things on the internet, allowing them to browse freely without the risk of coming across harmful content. But they can be used by adults to protect themselves from potential security risks too. Delve into the specifics of parental control settings — such as blocking gambling […]

Don’t mix work and pleasure

If you work from home, request that your employer give you a dedicated work laptop or computer. Keeping work and personal data separate will reduce the risk of cross contamination or incidental slips that could lead to serious data breaches. Where possible, do the same with mobile devices; ask for a work phone or tablet […]