Archives - Cybersecurity Tips


What is file sharing and how does it work?

File sharing is the practice of distributing digital files with others. It can be done in a variety of ways, including: File sharing is a popular way to share music, movies, photos, and other types of files with friends and family. It can also be used to share work documents or educational materials with colleagues […]

Disable remote desktop access on your devices unless necessary for remote work

Given the increasing prevalence of remote work, balancing remote desktop convenience with security ensures its ongoing efficiency and risk mitigation. Prioritize strong authentication, encrypted connection and limiting access to trusted sources only. Furthermore, regularly update software, monitor logs and implement access controls to enhance the security of your remote desktop access.

Spot HTTPS indicators to protect your browsing

HTTPS is the secure version of HTTP, the protocol used to transfer data between web browsers and servers. How do you know if a site is protected by HTTPS? Look in the URL bar. It should start with “https://”. Depending on the browser and site, it might also show a padlock icon or a green […]

Implement a device password policy for your household and/or organization

Such policies and/or guidelines may include the following: You may also like to consider implementing an incident response plan, outlining what to do in the case of a security breach or device theft — working to reduce risk by ensuring that everyone is on the same page.

Log out of public computers to protect your privacy and security

When you log in to a public computer, such as one at a library, kiosk, or other public place, your activities could be monitored. This is because public computers are often shared by many people, and anyone with access to the computer could potentially view your browsing history, search queries, and login credentials. To protect […]

Use a hardware security key for two-factor authentication (2FA)

Leveraging a hardware security key for 2FA adds an additional layer of security, making it considerably more difficult for cybercriminals to gain access — even if they have your password. Specifically, such measures facilitate strong authentication, protection from phishing, offline protection and a streamlined authentication process, among other benefits.