Archives - Security Best Practice


Take the Google Security Checkup

The Security Checkup offered by Google is a step-by-step guide for making sure your account is secure and recoverable in case it’s attacked. Open your account page, then select the Security tab. At the top, you’ll see a message that says “We keep your account protected.” Click “Get started” and follow the on-screen instructions. If […]

Fib the answers to your security questions

If you’re tired of trying to remember who you said your favorite actor was or whether you should use the abbreviation or spell out “Street” for the address of your first home, here’s some good news: It’s better to make up the information for your security questions anyway. This will make it easier to remember […]

Add a second email address for Google account recovery

For many people, their Gmail account is the only personal email address they use. However, if your lose access to your Google account or it becomes compromised, selecting a secondary email address can help you recover the account. From your Google account page, open the Security tab. Then, scroll down to the section that says […]

Be cautious with signing into apps with social network accounts

Some apps are integrated with social network sites—in these cases, the app can collect information from your social network account and vice versa. Ensure you are comfortable with this type of information sharing before you sign into an app via your social network account. Alternatively, use your email address and a unique password to sign […]

Use Google’s Inactive Account Manager to make a legacy plan

Dormant Google accounts can contain a treasure trove of information. It could be valuable to cybercriminals or provide crucial information that you want to share with your loved ones. To ensure that your data is protected once you are no longer able to access it, use Inactive Account Manager. From the main page of your […]

Store your backups separately

Best practice is to store your backups on a separate device that cannot be accessed from a network, such as on an external hard drive. Once the backup is completed, make sure to disconnect the external hard drive, or separate device from the network or computer.