Archives - Security Best Practice


Keep your software up to date

New vulnerabilities are continually emerging, but the best defense against attackers exploiting patched vulnerabilities is simple: keep your software up to date. You should enable software updates whenever possible. This is the most effective measure you can take to protect your computer, phone, and other digital devices. Try our Ultimate software it’s built-in vulnerability module […]

Establish end-of-life plans for your online accounts

Today, part of end-of-life planning entails managing a myriad of digital details. It’s very important to use a vaulted password manager and leave clear instructions for how to manage your social media and other accounts in the event of your passing. As always, we recommend using a password manager instead of writing passwords down.

Access important accounts from web browser not links

Phishing is one of the oldest and most effective cyberattack techniques. Never click on any emailed or texted links claiming to take you to your account page for a password reset or other modification to decrease your risk of having sensitive data stolen. Instead, if you’re uncertain whether action is warranted, type the URL directly […]

Use Bluetooth alternatives for better battery life and greater security

Bluetooth access can serve as an entry point to your laptop or mobile device for malicious actors, and leaving it on could drain the battery. Try alternatives that allow you to reduce the attack surface while lasting longer on a single charge. For instance, if you play music from an external source, plug in using […]

Follow the 3-2-1 backup rule by getting an external HDD

Catastrophic incidents and ransomware can leave you without access to important data. Back up everything according to the 3-2-1 rule. That is, have at least three copies of the data, two of which should be stored on different types of media, and one located elsewhere. Use an external HDD for the local backup.

Weed out old Chrome Extensions

Outdated Chrome Extensions can be exploited by malicious actors. Periodically review your Extensions to make sure they appear in good working order and that they’re properly updated. If you’re no longer using an Extension, delete it, particularly if it appears to no longer be supported by the developer.