Archives - Security Best Practice


View the internet as a novel, not a diary

Make sure you are comfortable with anyone seeing the information you put on blogs, social networking sites, and personal websites—write it with the expectation that it is available for public consumption and that people you have never met will find your page. Although some sites use passwords or other security restrictions to protect the information, […]

Turn Off Your Computer

With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being “always on” renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker’s connection—be it spyware or a botnet that […]

Delete sensitive files the right way

If you need to delete a PDF with your banking information on it, don’t just drag-and-drop it into the trash folder on your desktop. This won’t entirely delete the file, which means it can still be accessed by hackers. Instead, use a dedicated erasure app to eliminate any chance of the file being recovered.

When it comes to password protection, listen to the experts

Cybersecurity professionals recommend creating passwords that are at least 20 characters long, with a unique mix of letters, numbers and symbols. They also say you should never use the same password twice and update them every 90 days.

Keep tabs on your bank and credit card statements

Be sure to continuously check your accounts for any unauthorized activity. Good record keeping goes hand-in-hand with managing your cybersecurity. Another tip for monitoring activity is to set up alerts so that if your credit card is used, you will receive an email or text message with the transaction details.

Secure your wireless network

Properly secure the wireless network you use to connect Internet-enabled devices. Consider placing these devices on a separate and dedicated network. Whether it’s your computer, smartphone, game device, or other network devices, the best defense is to stay on top of things by updating to the latest security software, web browser, and operating systems. If […]