Archives - Security Best Practice


Be sure to safely discard old devices and drives!

They say that deleting something from a computer or hard drive doesn’t really get rid of it, and unfortunately, it’s true. If you get rid of a hard drive or give away an old PC, you should be careful – people could recover your past activities and files. Using a deep deletion utility first, or […]

Replace your phone when the security update period runs out

All smartphones have a limited period of time until they’ll stop releasing security updates for the device. Look up how long those periods are for your model. Most devices have three-year cycles, but some have up to five years. Once your security patches run out, you’ll be vulnerable to new threats.

Use parental controls to prevent your children from spending

Microtransactions are a consistent feature in many video games on all platforms, whether they’re on a smartphone, a Nintendo Switch, a PC or any other gaming device. To prevent your children from spending large amounts of money in video games, use the platform’s built-in parental controls. With these, you can disable the ability to spend […]

Double-check two-factor authentication before switching your phone number

If you switch your phone number, make sure to update any two-factor authentication (2FA) services you use. As many 2FA processes are based on the phone number, you won’t be able to access your accounts after the number is changed. It’s recommended to use an authenticator app or a trusted device for your 2FA needs, […]

Take advantage of quality of service (QoS) features on your network devices

Quality of service is a common feature of routers and other networking hardware that prioritizes some types of network traffic over others. This can be very useful if you have limited data speeds: Without QoS, data comes on a first-come, first-serve basis. Configuring QoS can sometimes be difficult, but many devices have presets you can […]

How to chat with chatbots

Chatbots are widely used to facilitate customer engagement, but they can be awkward and even risky to interact with. If you happen to receive an unexpected call asking, “can you hear me”, a voicemail message claiming that your warranty has expired (even if you don’t have one) or a chat message that suggests you enter […]