Archives - Security Best Practice


Use alternatives to SMS for two-factor authentication

If you use two-factor authentication, it’s best to rely on codes sent to other devices or applications such as Duo or Google Authenticator instead of SMS texts. That’s because SIM hacking is on the rise. This practice entails a cyberattacker tricking a customer service representative into reassigning a phone number to a new SIM card.

Recognize ‘dark patterns’ when you see them

A dark pattern is an intentionally misleading user experience in an app or on a website. A classic example is having to click a bunch of buttons to try to close an account, only to find you actually have to call someone. Needing to deselect a huge list of options is also common. Be aware […]

Lie on your security questions

This might seem like strange advice, but hear us out: If someone finds key details about you online, that information could help answer the security questions for accessing an important account. Considering lying on purpose to mislead would-be attackers. Alternatively, select opinion-based questions like “What is your favorite color?”

Alter your browser preferences to limit pop-up windows

Many times, pop-up windows are spawned by a kind of scripting or active content. You can adjust the settings within your browser to reduce or prevent. Some browsers offer a specific option to block or limit pop-up windows. Certain types of cookies are occasionally considered spyware because they reveal what web pages you have visited. […]

Choose antivirus software carefully

Antivirus software is essential in fending off a specific set of known threats. At the same time, some forms of it enact significant performance penalties as they constantly run in the background and consume CPU resources. Go with a solution like Total Defense Unlimited Internet Security that best balances protection and performance.

Beware of Online Vehicle Sales Scams

When it comes to making online purchases, be cautious of items being advertised well below their market value. Remember, if the deal appears too good to be true, it probably is. Use the Internet to research the advertised item and the seller’s name, email addresses, telephone numbers, and other unique identifiers. Avoid sellers who refuse […]