Archives - Security Best Practice


Check your web browser software is up to date

Install software updates so that attackers cannot take advantage of known problems or vulnerabilities. Many browsers like Firefox, Google Chrome and Microsoft Edge offer automatic updates. If this option is available, you should permit it. Your web browser is your principal connection to the Internet, and multiple applications may rely on your browser, or parts […]

Use gift cards to protect your credit card information

While you can pay for things directly using a credit card or other payment method, these transactions require inputting financial information, whereas gift cards only require single-use codes. As an added bonus, digital gift cards for things like the PlayStation Store or Nintendo eShop commonly go on sale at online retailers for less than their […]

Don’t just get rid of old hard drives – erase them

When you want to scrap an old computer, think about the data that remains in the hardware: your files, media and personal information could be compromised if someone gets the machine up and running again. For businesses, this is much more crucial. Explore free erasure tools to clean your harddrives thoroughly for peace of mind.

Look for two-factor authentication, rather than multi-factor

They’re often spoken about in the same breath, but they’re not necessarily the same thing. Multi-factor authentication relies on at least two ways to confirm who you are e.g. a QR code sent by SMS after you’ve entered your username and password. Multi-factor can be more complex and includes anything from SMS, and security questions […]

Keeping Kids Safe on Social Sites

Kids are especially vulnerable to the threats that social networking sites present. Although many of these sites have age restrictions, children may misrepresent their ages so that they can join. By teaching children about Internet safety, being aware of their online habits, and guiding them to appropriate sites, parents can make sure that the children […]

Use Twitter to check for bad URLs

Malicious links can catch you unaware, but Twitter can root them out. Its “t.co” service shortens URLs and cross-references the original, longer URL to make sure it’s from a legitimate source. If you copy and paste any URL onto t.co, you might receive a warning that “this link may be unsafe.” Twitter has a huge […]