Archives - Security Best Practice


Personal information is like money – Value it. Protect it.

Your devices make it easy to connect to the world around you, but they can also pack a lot of info about you and your friends and family, such as your contacts, photos, videos, location and health and financial data. Information about you, such as the games you like to play, what you search for […]

Never leave devices unattended

It is important to remember that laptops, phones and tablets should never be left unattended. Ensure your devices are with you at all times. If you are staying in a hotel, the best thing to do is lock them in a safe. If a safe is not available, lock them in your luggage. And, while […]

Switch off automatic syncing to your iCloud

Sensitive files from your Apple devices may be uploaded to your iCloud account without your knowledge. If your account gets hacked, that data can get stolen even if you deleted it off your device. Have more control over which items you store in the cloud and which ones you keep local by switching off Apples’ […]

Don’t use your work email for personal reasons

Remember, when a hacker gets access to one device, they can potentially infect all the other devices on that network. So, if you accidentally click on a bad link in an email during work, you could be putting your entire company at risk. To reduce the likelihood of hackers breaching your company’s network, never use […]

Never share your Medicare number with anyone except your doctor

When you receive your Medicare card in the mail, put it in a secure place where no one will find it. And if someone contacts you by phone or email asking for your Medicare number, don’t give it to them. Cybercriminals who pose as health care professionals can use this information to steal your identity.

Take advantage of ‘safe mode’

Most computer operating systems have a “safe mode,” which is used to evade viruses and other performance issues during a reboot. It works by only running the programs that are necessary to start up the system. This allows users to troubleshoot and identify programs that are preventing the system from working normally.