Archives - Security Best Practice


Keep an eye on your credit score

If your information is compromised, a hacker may be making charges on your credit card. If you’re unaware of those charges, your credit score could take a sizable hit. Keeping a watchful eye on your credit report is a good idea. Hackers often target financial information when ecommerce reaches peak volume. Monitoring your report will […]

Understand ‘dark patterns’ when you see them

A dark pattern refers to deliberate design choices, typically in apps and websites, that try to steer your behavior in a certain direction. A common instance is having to click a bunch of buttons to try to close an account, only to find you actually have to call someone. Needing to deselect a huge list […]

Hover over a link before you click on it

You can never really be sure you’re clicking on a malicious link until you do. Bad actors often attempt to fool their victims with seemingly real links to web pages that emulate legitimate sites. Below the surface, however, those pages are riddled with malware and other threats. To avoid these scams, you should always hover […]

Keep your passwords under lock and key

In addition to password management tools, USB security keys are also effective at protecting your passwords. Google’s Titan Security Key, for example, creates a multi-factor authentication login for every site you visit. These can prevent phishing scams and other security risks by squeezing in another layer of safety between you and malicious actors.

Don’t be truthful on your security questions

This might seem like unexpected advice but think about it: If someone finds key details about you online, that information may help answer the security questions for accessing an important account. Consider not being completely truthful on purpose to deceive would-be attackers. Another option is to select opinion-based questions like “What is your favorite color?”

Protect your organization with dark web monitoring

If your company’s sensitive information is compromised, it could wind up somewhere on the dark web. This part of the internet is made up of websites that aren’t indexed by search engines, but are frequented by malicious parties. By continuously running scans, you can monitor the dark web to see if your data has appeared […]