Archives - Security Best Practice


Get backup codes for your Google Account

Google provides many options for securing your account with two-factor authentication. But what if you don’t have access to your phone or other device for confirming a login attempt? This is where backup codes come in handy. These numeric codes can be generated by your Google Account and will work for logging in if you […]

Secure your most important internet accounts with a hardware key

Hardware keys such as the popular YubiKey provide strong second factor authentication when signing into services such as Gmail, Facebook and Dropbox. They can either be plugged into a port on your device or be connected wirelessly through Near-Field Communication. Without this unique key, no one can access your accounts, even if they know the […]

Set up a Guest account on macOS

If you have a Mac and need to share it with someone, you should set up a Guest account before doing so. This can be done from System Preferences -> Users and Groups. A Guest account provides minimal features, so that the user cannot do any damage to the operating system or your data.

Upgrade from Windows 7

Mainstream support for Windows 7 is ending in 2020. That means continuing to run it will come with major security liabilities. If it’s on your main PC, consider upgrading to Windows 10. Replacing Windows 7 with a free Linux-based operating system, like Debian or Ubuntu, is another option.

Modify unnecessary default features

Like removing unnecessary software, modifying or deleting unnecessary default features reduces attackers’ opportunities. Review the features that are enabled by default on your computer, and disable or customize those you don’t need or don’t plan on using. As with removing unnecessary software, be sure to research features before modifying or disabling them.

Remove unnecessary software

Intruders can attack your computer by exploiting software vulnerabilities, so the fewer software programs you have installed, the fewer avenues there are for potential attack. Review the software installed on your computer. If you don’t know what a software program does, research the program to determine whether or not the program is necessary. Remove any […]