Archives - Security Best Practice


What does a properly secured smartphone look like?

Protecting your smartphone is absolutely essential these days. 

How to clean an infected PC

Is your computer compromise? Don’t lose hope!

5 password mistakes many people make

Proper password creation and protection are by far the most important parts of personal cyber security. A hacker with access to your login credentials can pretty much steal your online identity. In fact, the Verizon 2016 Data Breach Investigations Report found that 63 percent of observed hacks originated from poor password control. So, what kinds […]