Archives - Security Best Practice


Classify your corporate data by sensitivity

Data classification is a staple part of data security. It helps your organization determine where they should focus their efforts and which types of data are better left unattended. Classifying data by sensitivity – that is, how damaging the information could be if it were destroyed or exposed – is a great way to prioritize […]

Don’t hurry to click links

Links online may be tricky. If incorporated in text, you can’t directly see where they go to, meaning a simple click could take you somewhere you did not want to go, like a webpage infested with adware. Try hovering over them with a mouse, or copying them with a press and hold contextual menu on […]

Allow common sense to guide your online posting

It’s a good idea, before you post something online, that you think about what value it provides and consider the consequences of having the information available to the public. Identity theft is an increasing problem, and the more information an attacker can gather about you, the easier it is to pretend to be you. Act […]

Beware of sharing personally identifiable information

Whether you’re a business or a consumer, it’s important to keep personally identifiable information (PII) secure. PII is any type of data that could be used to identify, locate or contact an individual, such as name, date of birth or place of residence. PII is often targeted by hackers because it can be sold for […]

Use a zero-trust approach to network security

If you manage an enterprise-grade network, you’re likely responsible for keeping sensitive corporate data under lock and key. When employees and outsiders access your corporate network, they could also potentially access unprotected data. Zero-Trust Network Access verifies the identity of a user before allowing them entry into the network – thus preventing unauthorized users from […]

Backup your files and data to an offline copy

Data is a lucrative target for cybercriminals. If your accounts become compromised, they could access your sensitive data and personal information. Backup programs mitigate the risk that bad actors delete or hold data ransom. Automated programs can even schedule routine backups at an interval to ensure your most recent data is protected. Storing this backup […]