Archives - Security Best Practice


Use an encrypted email service

Secure email services can encrypt your messages to ensure they’re only accessible to authorized parties – not even the email provider will be able to access them. Some services go one step further and allow you to create aliases that protect your private correspondence and keep your primary address anonymous.

Be careful when using public PCs

When staying in a hotel or studying in a library, be mindful of how you use publicly accessible computers. There’s no telling who accessed these PCs or how safe they may be. Don’t log in to any personal accounts or input any sensitive information – public computers may be infected with keylogging malware designed to […]

Classify your corporate data by sensitivity

Data classification is a staple part of data security. It helps your organization determine where they should focus their efforts and which types of data are better left unattended. Classifying data by sensitivity – that is, how damaging the information could be if it were destroyed or exposed – is a great way to prioritize […]

Don’t hurry to click links

Links online may be tricky. If incorporated in text, you can’t directly see where they go to, meaning a simple click could take you somewhere you did not want to go, like a webpage infested with adware. Try hovering over them with a mouse, or copying them with a press and hold contextual menu on […]

Allow common sense to guide your online posting

It’s a good idea, before you post something online, that you think about what value it provides and consider the consequences of having the information available to the public. Identity theft is an increasing problem, and the more information an attacker can gather about you, the easier it is to pretend to be you. Act […]

Beware of sharing personally identifiable information

Whether you’re a business or a consumer, it’s important to keep personally identifiable information (PII) secure. PII is any type of data that could be used to identify, locate or contact an individual, such as name, date of birth or place of residence. PII is often targeted by hackers because it can be sold for […]