Archives - Security Best Practice


Use a variety of strong passwords

Use different passwords for different accounts and devices. Do not choose options that allow your device to remember your passwords. Although it’s convenient to store the password, that potentially allows cybercriminals into your accounts if your device is lost or stolen.

Take a pass on that online quiz

Companies like BuzzFeed have turned online quizzes into a cultural phenomenon. Which “Game of Thrones” character are you? Do you remember these 90s TV shows? Before you answer either of those questions via a quiz, consider doing almost anything else – these quizzes are designed in part to harvest your data and sell it to […]

Why is computer security important?

Because computers play such critical roles in our lives, and because we input and view so much personally identifiable information on them, it’s imperative to implement and maintain computer security. Computers are an essential part of our everyday lives. It’s important to properly configure your home computer before connecting it to the internet to keep […]

Watch out for fake antivirus

A lot of security software isn’t reputable. Some programs will actually increase your risk despite branding themselves as “cleaners” or “shields” for your activities. Stick with a well-established vendor such as Total Defense and be wary of insistent warnings and aggressive installation prompts.

Watch out for unsubscribe buttons in sketchy emails

Say you receive an email that has typos and asks you to do something risky like visit a strange site. You click “unsubscribe,” thinking you’ll be spared any such communications in the future. In reality, you might become more vulnerable by doing so. The safest route is to simply delete the message, or blacklist its […]

Perform routine activities from a non-administrator account

If you’re sending an email or quickly checking a website on a PC or Mac, do so from a non-administrator account. That way, if something goes wrong, the permissions available to the attacker or malware will be much less extensive, stemming the potential damage.