Archives - Security Best Practice


Check your task manager frequently

Open your task manager on Windows frequently and take a look at your open programs and programs running in the background. You can access the task manager by hitting the Ctrl+Alt+Deletekeys at the same time. Check for any programs that are running that you don’t recognize. There’s a chance they could be harmful to your […]

Log out of websites and apps when you’re finished

It’s very convenient to stay logged in to a website or app, but it creates some security risks. Attackers may be able to impersonate your session ID and hijack your account. When you’re finished, log out and use a password manager so it’s easy to log back in.

Sign-in using your Google account when possible

It’s become common for websites to allow you to sign in with your Google account instead of making a new account on the website itself. Not only does it save you time, but it can be a more secure option that doesn’t require you to re-enter your personal information. The fewer sites with your personal […]

If you no longer use Facebook, consider deleting your account

Facebook harbors a trove of personal information about you and everyone else on the platform. If left unattended, your Facebook account could become a security risk. Between hackers and data breaches, you’re better off deleting your profile if it’s no longer in use. You also have the option to back up any photos or videos […]

Hover over a link to find out where it leads

Many articles, posts and other communications contain abundant links, some of which may lead to pages that no longer exist or, worse, are compromised. On a Mac/PC you can hover the mouse cursor over a link to see its destination. On mobile, you can hold to copy it and then paste it into a note.

Overwrite data if you’re giving away your device

Lots of times deleting a file doesn’t mean it’s gone forever. It may still be recoverable by people with the correct tools. When recycling a device or giving it to another person, use an overwrite program to ensure full deletion of personal information from the drive.