Archives - Security Best Practice


Prune revealing content from your social media accounts

It’s prudent to review your social media accounts every now and then to see if you’ve left any photos, videos, or textual updates on them that might reveal sensitive details about your identity or location. Delete such posts or at least hide them from public viewing to minimize exposure.

Enable and configure your firewall

A firewall is a device that controls the flow of information between your computer and the internet. Most modern operating systems (OSs) include a software firewall. The majority of home routers also have a built-in firewall. Refer to your router’s user guide for instructions on how to enable your firewall and configure the security settings. […]

Learn to spot fake technical support accounts

Having a technical issue with an application or device? Consider going to the vendor’s official site or a reputable forum to get help. Don’t call support numbers that show up in browser ads or interact with unverified social media accounts claiming to offer technical support, as these channels can put your data at risk. See […]

Remove unused browser extensions to improve performance and security

Browser extensions can be useful, but they can also consume inordinate CPU resources and potentially expose sensitive data. Regularly review your extensions to see if you really need them and remove any that aren’t used or essential. Also pay attention to the permissions each one asks for when you install it.

Don’t put all of your important information on one device

If you have photos, documents and other data that you don’t want to lose, you should distribute it across multiple locations. Consider using local backup options like external HDDs with cloud-based services to diversify where your data lives and avoid creating a single point of failure.

How do you find out what software updates you need to install?

When software updates become available, vendors usually put them on their websites for users to download. Install updates as soon as possible to protect your computer, phone, or other digital device against attackers who would take advantage of system vulnerabilities. Attackers may target vulnerabilities for months or even years after updates are available. Some software […]