Archives - Security Best Practice


Lock it down: encrypt your devices for maximum security

Worried about prying eyes on your lost laptop or stolen phone? Fear not, security champions. Disk encryption comes to the rescue, turning your devices into digital vaults for your precious data. Imagine this: your trusty laptop takes a tumble in the airport. Panic sets in, not just for the lost device, but for the sensitive […]

Think twice before using third-party keyboards

Third-party keyboards offer various customization options, from swipe-based typing to new stickers and emoji, to enhance your mobile typing experience. However, this convenience comes with a potential risk: the keyboard can see everything you type. While some third-party keyboard providers may be trustworthy, there’s always a chance that your personal information could be compromised. If […]

Know your apps: enhance security and privacy

Before downloading an app, take a moment to review its details and understand its purpose. Be mindful of the permissions it requests, such as access to your location, contacts, or personal information. Decide whether you’re comfortable granting such permissions and if the app’s benefits outweigh the potential privacy concerns. Regularly review your installed apps and […]

Zero-day vulnerabilities: staying ahead of the curve

Zero-day vulnerabilities — undisclosed security flaws — pose significant threats to your organization. Hence, you have to stay vigilant by monitoring security advisories, threat intelligence sources, and vendor updates to promptly identify and address emerging threats. These undetected weaknesses can be exploited by cybercriminals to gain unauthorized access to systems, steal sensitive data, or disrupt operations. […]

Shield your credit card from skimmers

Credit card skimmers, once a common nuisance at ATMs and point-of-sale terminals, still pose a risk for those who swipe their cards. To stay ahead of these data thieves, opt for chip-and-pin or contactless payment methods whenever possible. Chip and PIN: enhanced security Chip-and-pin technology offers a more secure way to make payments. Instead of […]

Monitor user account activity

Vigilant user account activity oversight facilitates identifying and mitigating potential security threats. This is particularly important for accounts with elevated privileges with sensitive information access. Consider implementing user and entity behavior analytics (UEBA) tools that continuously monitor and analyze user actions and system behavior more generally. These tools work to detect anomalies indicative of security […]