Archives - Security Best Practice


How to shut down your computer properly: Important to-do’s before closing your computer

There are many benefits to shutting down your computer properly. If you simply close your laptop after each use, your computer could experience degraded performance over time. Also, if you don’t use features that lock access to your device, simply closing the notebook means that anybody nearby could quickly have access to your open documents […]

Pay attention to Google cross-app account alerts

Beginning in 2020, Google began to provide alerts about potential Google Account security issues to users regardless of which Google app (Gmail, YouTube, Drive, etc.) they were using. Look for a small icon, with an exclamation mark next to your profile image, in the upper right corner of most apps. Tapping/clicking through will display the […]

Take the Google Security Checkup

The Security Checkup offered by Google is a step-by-step guide for making sure your account is secure and recoverable in case it’s attacked. Open your account page, then select the Security tab. At the top, you’ll see a message that says “We keep your account protected.” Click “Get started” and follow the on-screen instructions. If […]

Fib the answers to your security questions

If you’re tired of trying to remember who you said your favorite actor was or whether you should use the abbreviation or spell out “Street” for the address of your first home, here’s some good news: It’s better to make up the information for your security questions anyway. This will make it easier to remember […]

Add a second email address for Google account recovery

For many people, their Gmail account is the only personal email address they use. However, if your lose access to your Google account or it becomes compromised, selecting a secondary email address can help you recover the account. From your Google account page, open the Security tab. Then, scroll down to the section that says […]

Be cautious with signing into apps with social network accounts

Some apps are integrated with social network sites—in these cases, the app can collect information from your social network account and vice versa. Ensure you are comfortable with this type of information sharing before you sign into an app via your social network account. Alternatively, use your email address and a unique password to sign […]