Archives - Security Best Practice


Don’t spam other people

Be a responsible and considerate user. Some people consider email forwards a type of spam, so be selective with the messages you redistribute. Don’t forward every message to everyone in your address book, and if recipients ask that you not forward messages to them, respect their requests.

Carefully review before you post on social networks

When posting on the internet – only post information you are comfortable with anyone seeing – remember it is a public resource. This includes information and photos in your profile and in blogs and other forums. Additionally, once you post information online, you can’t take it back. You may delete the information from a site, […]

Regularly delete emails in your spam folder

Depending on the time of year, spam messages account for between 50 and 60 percent of all email traffic. In addition to containing potentially dangerous content, at that volume they can also easily eat up your entire inbox capacity. Instead of waiting the normal 30 days for automatic deletion, consider manually mass-deleting them each day […]

Make your PC or Mac log off after a set period of time

Once you leave your computer, you don’t want someone else gaining unauthorized access to it. Setting an automatic logoff timer ensures that it’s not vulnerable when you step away for an extended period. This can be done easily on both Windows and macOS.

Avoid Java unless you really need it

Like Flash, Java has long been associated with specific types of desktop applications and with numerous security issues. The weakest link in your security chain is the most popular app you haven’t’ updated, and for a lot of people, that’s Java. Luckily, it’s possible to get by without Java in many cases. Disable or uninstall […]

When in doubt, uninstall an app or extension

Chances are you have a lot of apps on your phone or tablet that you don’t use. In 2017, App Annie estimated the average smartphone has 60 to 90 apps installed. It’s important to regularly review all of them and see if any can be deleted, since they might be unsupported, compromised or performing unwanted […]