Archives - Security Best Practice


Back up the data on your device before traveling

Many applications allow you to set up regular automated backups of your data, which is great for day-to-day data preservation. But when you’re traveling — particularly abroad — this could be costly or ineffective due to connectivity or restrictions on your plan. To ensure you have a reliable account of your data before you go […]

Do your online shopping homework

Scam artists are always on the prowl setting up new schemes for fake e-commerce sites. Before you make a purchase, take the time to read reviews and hear what others say about the merchant. Also, try to find a physical location and any customer service information you can gather. It’s also a good idea to […]

Don’t forget about old devices

When you upgrade your phone or computer, be sure to complete a thorough data cleanse of your old ones. Performing a factory reset isn’t sufficient to wipe all information from a device. Instead, invest in a dedicated program or app that will truly clear your personal data and account information from a device. This is […]

Make NFC payments on your phone secure

Being able to use your phone to complete contactless transactions is great, seeing as we almost always have our phones handy. But be sure to explore what settings you can use to make sure it is protected should your phone be lost or stolen. Incorporate biometric security with NFC so it requires your fingerprint to […]

Secure your printers

A printer is an easily overlooked member of your IoT family, but consider how advanced modern printers are. Many are Wi-Fi and Bluetooth enabled, and they’re connected to your network, both at home and in the office. Without suitable precautions in place, your printer could be the backdoor a hacker needs to access your network. […]

Create a dedicated administrator account on your computer

If you log in as admin on your computer for day-to-day use, you leave your whole system vulnerable to  infiltration. Should a hacker gain access to your admin account, they’ll be able to track, install and change pretty much anything they want. Instead, create a separate, dedicated administrator login that you only use when you […]