Archives - Security Best Practice


Don’t pirate unreleased games

Even if you can’t wait for a new PC game to come out, don’t purchase a pirated version from an illegal website. These sites are littered with malware that can infect your computer and intercept your payment credentials. Don’t fall into that trap. Instead, be patient and buy the game from an official repository when […]

Once you publish something online, realize that you cannot take it back

After you publish content online, it is available to other people and to search engines. You can change or remove information after something has been published, but it is possible that someone has already seen the original version. Even if you try to remove the page(s) from the internet, someone may have saved a copy […]

Consider using a password manager

Password manager applications manage different accounts and passwords while having added benefits, including identifying weak or repeated passwords. There are many different options, so start by looking for an application that has a large install base (e.g., 1 million plus) and an overall positive review. Properly using one of these password managers may help improve […]

Test your VPN service before making the purchase

VPNs are supposed to keep your IP address from getting leaked to the public. However, due to security flaws in their systems, many VPN services fail to do so. Luckily, most providers will allow you to trial their services before making a payment. Test your VPN by writing down your current IP address (which can […]

View the internet as a novel, not a diary

Make sure you are comfortable with anyone seeing the information you put on blogs, social networking sites, and personal websites—write it with the expectation that it is available for public consumption and that people you have never met will find your page. Although some sites use passwords or other security restrictions to protect the information, […]

Turn Off Your Computer

With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being “always on” renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker’s connection—be it spyware or a botnet that […]