Archives - Security Best Practice


Be careful with URL typos

URL typos aren’t always harmless – the slightly misspelled website might actually be a registered domain that could put your device in harm’s way. The risk has grown as the number of top-level domains has increased; instead of just .com or .org, now there’s also .xyz, .capital and many more. Double-check any URL you type […]

Pay attention to how you charge your devices

Just because a connector fits your device doesn’t mean you should use it for charging. Unlicensed third-party cables might damage your phone or PC. There’s also the more subtle risk of quicker-than-normal battery degradation through fast-charging. All batteries lose their ability to hold a charge over time, but high-voltage charging accelerates this process.

Install your big software updates overnight

While many updates to operating systems and applications are minor and take just a few minutes to complete, others are huge and make require hours. To minimize delays and hassle, it’s a good idea to schedule updates overnight, when you’re not using the device and when update servers aren’t as busy. This will also help […]

Block pop-up advertisements

Pop-up blockers disable windows that could potentially contain malicious code. Most modern browsers have a feature that you can enable to block pop-up advertisements, check in the browser settings.

What is Shoulder Surfing?

In public areas malicious actors can simply glance over your shoulder as you type. By simply watching you, they can steal sensitive or personal information. Screen protectors which prevent shoulder-surfers from seeing your device screen can be purchased for little money. For smaller devices, such as phones, be cognizant of your surroundings while viewing sensitive […]

Avoid oversharing on the Internet

There is such a thing as too much information. Oversharing is more than simply annoying. When a criminal decides to target someone for an identity theft scheme, they sometimes begin their attack by simply researching the person’s social media accounts. If the intended victim doesn’t have privacy settings set up, or if they do but […]