Archives - Security Best Practice


Remember, there is no ‘Delete’ button on the Internet

With every social media account you sign up for, every picture you post, and status you update, you are sharing information about yourself with the world. Share with care, because even if you delete a post or picture from your profile seconds after posting it, chances are someone still saw it.

Inspect URLs before clicking them

Not every link leads to where it says it does. Before clicking it, look to see if it seems weird. For example, if it contains a domain associated with another country or is unusually long and complex. You might also want to run it through an online link expander if it’s been shortened to something […]

Use the highest-level settings on your web browsers

Web browsers are your principal connection to the rest of the Internet, and multiple applications rely on your browser to work. Numerous web applications try to enhance your browsing experience by enabling different types of functionality, but this could be unnecessary and may leave you vulnerable attack. A good approach is to set the highest […]

Use “hidden” mode for Bluetooth on your mobile device

When Bluetooth is enabled, make sure it is “hidden,” not “discoverable.” The hidden mode blocks other Bluetooth devices from recognizing your device. This does not prevent you from using your Bluetooth devices together. You can “pair” devices so that they can find each other even if they are in hidden mode. Though the devices will […]

Prune revealing content from your social media accounts

It’s prudent to review your social media accounts every now and then to see if you’ve left any photos, videos, or textual updates on them that might reveal sensitive details about your identity or location. Delete such posts or at least hide them from public viewing to minimize exposure.

Enable and configure your firewall

A firewall is a device that controls the flow of information between your computer and the internet. Most modern operating systems (OSs) include a software firewall. The majority of home routers also have a built-in firewall. Refer to your router’s user guide for instructions on how to enable your firewall and configure the security settings. […]