Archives - Security Best Practice


Take notice of top-level domains on websites

You may not think much about top-level domains (TLDs), which include .com, .org and .net. Many new TLDs came online in the last few years, and a lot of them are connected with malicious activities like spam distribution. Be wary of .country, .stream and .download in particular, since they are almost exclusively suspicious.

Adopt a zero-trust security model

It’s far, far better to be too suspicious than too lax when it comes to your security, especially when using company devices on personal networks while working remotely. A combination of a zero-trust approach (which flags anything not explicitly known not to be a threat) with a robust IT support system (to swiftly give and […]

Grant granular access to shared files

Sharing files by email should be discontinued across the board. Instead, use a secure file sharing system with granular access control. This permits you to authorize different levels of access, such as viewing, commenting and editing. Never include files that contain ways to access your network.

Watch what info you give away

Be alert to the kinds of information being collected to complete your transaction. If the merchant is requesting more data than you feel comfortable sharing, cancel the transaction. You only need to fill out required fields at checkout and you should not save your payment information in your profile. If the account autosaves it, after […]

Use automatic updates and reboots

A patch issue causing problems (or your own lack of IT urgency) can entice you to turn off automatic updates — no more annoying alerts! Months down the road, though, a hack through an unpatched vulnerability can infiltrate your system. Employ automatic updates and reboots so that you’re proactively dealing with issues before they become […]

Only buy from security-minded providers

Your security is only as strong as the weakest link. Ensure that every company you work with — ISP, SaaS, Bluetooth-enabled consumer electronics, etc. — has the same strict security requirements as your home and work environment demand. Advanced security across the board can help protect you from provider-side vulnerabilities.