Archives - Security Best Practice


Take advantage of security features on the Google Pixel 6

In updates to its Pixel line of smartphones, Google is upgrading the device’s security features. With a new dashboard, users can see if their device is up to date with the latest security updates, or if there’s an app on their phone that could be harmful. Users will also be able to tell if their […]

Proactively delete text messages

It’s easy for text messages, like emails, to pile up. Long after you’ve read them, texts can still lay dormant on your phone. If you have old text threads, it’s a good idea to delete them as soon as possible. They may contain private information that could compromise your safety if they fell into the […]

Set user-specific restrictions on your business network

Not every employee needs access to every file. You can keep sensitive information safe by setting specific access permissions so that only authorized users can read certain documents. This reduces the risk that private information will be leaked, whether it be by someone on the inside or outside of the organization.

Get in the habit of pressing “Deny” rather than “Accept”

The benefits of accepting permissions or cookies are relatively few for the average consumer. Yes, your ad experience may be more relevant and your mobile experience may be more efficient, but your private information may also be at risk. When you land on a site you don’t often visit — or have no plans of […]

The fewer devices and accounts you have, the more protected you are

The best way to stay protected online is to reduce the surface area for bad actors to attack. For every account, there’s a doorway into your private data. For every device, there may be a dozen different accounts. Risk, as a result, increases exponentially as this process goes on. Rather than spread yourself thin across […]

Have your devices go to sleep quicker

Password-protected PCs, Macs, tablets and smartphones all have limit points at which they lock their screens, requiring re-entry of the passcode or PIN. The time frame for relocking is changeable, but the safest option is to force anyone attempting to log in to re-enter the device password immediately. That way, you don’t have to worry […]