Archives - Cybersecurity Tips


Log out of public computers to protect your privacy and security

When you log in to a public computer, such as one at a library, kiosk, or other public place, your activities could be monitored. This is because public computers are often shared by many people, and anyone with access to the computer could potentially view your browsing history, search queries, and login credentials. To protect […]

Use a hardware security key for two-factor authentication (2FA)

Leveraging a hardware security key for 2FA adds an additional layer of security, making it considerably more difficult for cybercriminals to gain access — even if they have your password. Specifically, such measures facilitate strong authentication, protection from phishing, offline protection and a streamlined authentication process, among other benefits.

Create a separate email address for online shopping and promotional subscriptions

A separate commerce email address may serve you in the following ways:

Practice digital detox, and in turn, reduce your digital footprint

Beyond benefiting your mental well-being, digital detoxes also help to decrease your digital footprint, and in turn, reduce your susceptibility to cyberthreats. While cybersecurity goes beyond logging off, a detox can serve as a simple, easily-implementable first step toward fortifying your online security.

Big “Download” buttons: A red flag for online scams

You’ve probably seen them before: large, colorful buttons on websites that say “Download” or something similar. But beware! These buttons are often ads (or worse) in disguise. Legitimate software vendors will not make you download their software this way. If you need to download software, always go to the official website of the vendor or […]

What’s a browser plug-in?

Browser plug-ins are extensions that add new features to your web browser. For example, a plug-in might allow you to watch videos on websites that use Flash technology, or to play games that require Java. Plug-ins can be useful, but they can also be a security risk. That’s because attackers can exploit vulnerabilities in plug-ins […]