Archives - Security Best Practice


Preventing Online Auction Fraud

Find out, as much as possible about, how the internet auction works, what are your responsibilities as a buyer, and what the are seller’s obligations before you bid. Learn as much as possible about the seller, especially if the only information you have is an e-mail address. If it’s a business, check the Better Business […]

Watch out for cyber risks when using social media

It’s best not to share personal information on social media. Take care with sensitive information especially anything that may help a person steal your identity or find you, such as your full name, Social Security number, address, birthdate, phone number, or where you were born.

Take a zero-trust approach to network access

Zero-Trust Network Access (ZTNA) uses the principle of least privilege that automatically defaults to the lowest level of access. In other words, when someone tries to access the business network, ZTNA will first verify their identity and apply permissions based on predefined rules created by the organization. In simple terms, users only have access to […]

What is a website security certificate?

A website security certificate is also known as an SSL, an HTTPS certificate, and an SSL server certificate. It allows websites to display that padlock in the web address bar. There are two elements that signify that a site uses: one is a closed padlock, which, depending on your browser, may be positioned in the […]

Keep your router’s firmware up-to-date

It’s a major security risk to have outdated internet router firmware. Sadly, lots of people aren’t aware of this issue because they don’t do much with their routers unless they have issues with their internet connection. Take a look at your router to find its IP address, which you can enter into your web browser. […]

Customize applications you have access to when your iPhone is locked

The release of iOS 15.4 introduced a suite of new features for iPhone users. One new ability – the ability to customize which apps you can access from the lock screen – could pose a risk to your cybersecurity. When trying this new addition, be careful which apps you enable. Messages and the Wallet app, […]