Archives - Security Best Practice


Use the highest-level settings on your web browsers

Web browsers are your principal connection to the rest of the Internet, and multiple applications rely on your browser to work. Numerous web applications try to enhance your browsing experience by enabling different types of functionality, but this could be unnecessary and may leave you vulnerable attack. A good approach is to set the highest […]

Use “hidden” mode for Bluetooth on your mobile device

When Bluetooth is enabled, make sure it is “hidden,” not “discoverable.” The hidden mode blocks other Bluetooth devices from recognizing your device. This does not prevent you from using your Bluetooth devices together. You can “pair” devices so that they can find each other even if they are in hidden mode. Though the devices will […]

Prune revealing content from your social media accounts

It’s prudent to review your social media accounts every now and then to see if you’ve left any photos, videos, or textual updates on them that might reveal sensitive details about your identity or location. Delete such posts or at least hide them from public viewing to minimize exposure.

Enable and configure your firewall

A firewall is a device that controls the flow of information between your computer and the internet. Most modern operating systems (OSs) include a software firewall. The majority of home routers also have a built-in firewall. Refer to your router’s user guide for instructions on how to enable your firewall and configure the security settings. […]

Learn to spot fake technical support accounts

Having a technical issue with an application or device? Consider going to the vendor’s official site or a reputable forum to get help. Don’t call support numbers that show up in browser ads or interact with unverified social media accounts claiming to offer technical support, as these channels can put your data at risk. See […]

Remove unused browser extensions to improve performance and security

Browser extensions can be useful, but they can also consume inordinate CPU resources and potentially expose sensitive data. Regularly review your extensions to see if you really need them and remove any that aren’t used or essential. Also pay attention to the permissions each one asks for when you install it.