Archives - Cybersecurity Tips


How to defend against cryptojacking

Employ Cybersecurity best practices to help you protect your internet-connected systems and devices against cryptojacking. Be sure to use and maintain antivirus software – it recognizes and protects a computer against malware – allowing you to detect and remove a possibly unwanted program before it can do any harm. It’s best to make sure your […]

Biometrics: Which popular phone has the best security?

Biometrics have come a very long way since the original smartphones. As a welcome alternative to constantly typing in your PIN or password every time you want to unlock the phone, biometrics are both convenient and secure. So how do the newest phones handle biometric security? Let’s compare a few to see how each stacks […]

Use biometrics or a PIN

Biometrics includes data such as your fingerprint or face, which can be used to unlock your phone or log into apps. These tend to be much faster than typing in a password, and they’re generally secure. On the other hand, biometrics aren’t 100% secure and a stranger may still be able to unlock your phone. […]

Factory reset your phone before getting rid of it

Whether you’re trading it in, donating it or handing it off for any reason, you’ll want to wipe all the data from your phone before doing so. While the process for this varies by phone, you can easily find out how by searching your settings for something that says “Factory reset” or “Return to factory […]

Don’t allow unknown users into your online meeting

If there’s the potential for mischief on the internet, it’s almost certain someone’s going to take advantage of it. Such is the case with online meetings. There have been quite a few cases of bad actors trying to find their way into these meetings to disrupt them, often by displaying inappropriate or obscene content. This […]

Use publicly accessible computers with caution

Cybercriminals may have infected these computers with viruses or install malicious software. An example is keylogger malware which, when installed, captures the keystrokes of the computer’s users and sending this information to criminals via email. Through this malware, criminals can receive your personal information, such as name, credit card numbers, birthdates, and passwords.