Archives - Security Best Practice


Don’t click on links within pop-up windows

Because pop-up windows are often a product of spyware, clicking on the window may install spyware software on your computer. To close the pop-up window, click on the “X” icon in the titlebar instead of a “close” link within the window.

Close any PC/Mac programs you’re not currently using

Desktop apps can consume a lot of power even when you’re not using them. Plus, they might be collecting considerable information and transmitting it to servers, or worse. To save electricity and reduce your exposure to harm, consider closing any program from your web browser to your conferencing app if you’re not currently using them.

Use HTTPS wherever available

HTTPS is fundamentally more secure than HTTP. Look for a padlock and/or green-colored certificate holder name in your web browser to ensure that your connection to the site is encrypted.

Use the latest versions of Microsoft Office and other popular applications

Microsoft Office and productivity software in general are both magnets for cyberattacks, since they’re so widely used, meaning any successful attempt will have huge ripple effects. Accordingly, you should, if possible, use the latest versions of these applications, as they’re much more secure than their predecessors and are patched against many known vulnerabilities.

Do not supply sensitive information in response to unsolicited calls or emails

Chances are, you wouldn’t give someone your Social Security number or address to a stranger who asked for it on the street. Likewise, you shouldn’t hand it over to someone who calls purporting to be a tech support specialist (a common scam) or in an email saying you’ve won a prize and need to fill in […]

What is a digital signature?

A digital signature—a type of electronic signature—is a mathematical algorithm routinely used to validate the authenticity and integrity of a message (e.g., an email, a credit card transaction, or a digital document). Digital signatures create a virtual fingerprint that is unique to a person or entity and are used to identify users and protect information […]