Archives - Security Best Practice


Turn off Bluetooth

Bluetooth connections are so commonly used now that it isn’t always something you may think of turning off when you’re not using a peripheral device. While Bluetooth security is excellent, it’s still vulnerable to infiltration. Leaving Bluetooth active while not connected to a device may present an opportunity for bad actors in your immediate vicinity. […]

Manually update your OS

Devices can often have small patch updates you don’t receive push notifications for. Go into the settings menu and look for software updates. The device will check that everything is up to date and let you know if there are any patches you can download. Make a habit of doing this regularly; you’ll usually find […]

How to spot an online scam

As you spend more time online, engaging in a greater variety of activities and digitizing previously analogue aspects of your life, you entrust your personal information to online processes. This opens up avenues that scammers may attempt to take advantage of. Keeping yourself protected from fraudulent activity is increasingly important, since so much of day-to-day […]

Make passwords longer, not more complicated

Studies have shown that overly complicated passwords — i.e., complex combinations of upper- and lower-case letters, numbers and special characters — are forgotten and require changing frequently. Instead, combine familiar words to create a longer password. Hacking software usually works by systematically figuring out each character of a password one-by-one, so the more characters you […]

Use MFA

Multi Factor Authentication (MFA) — also known as Two Factor Authentication (2FA) or verification — provides an additional layer of protection for accounts that require a login. How it usually works is that when you attempt to log into an account online, you’ll receive a prompt on your synced device to confirm the login attempt. […]

When possible, use cloud sharing instead of email attachments

Email attachments are pervasive, but risky – you never know what they could include. It’s usually more secure to share content with links to cloud services, since you’re not actually downloading anything onto your system.