Archives - Security Best Practice


Hover over links before clicking them

Links can’t always be trusted to go where they say they do. To avoid falling into a trap, hover your mouse over a link you’re not sure of to see where it actually leads. If you’re on a mobile device, you can usually do a light tap and hold on a link to preview where […]

Create multiple accounts on your Mac or PC

It’s usually a good idea to create at least two local accounts on your Mac or PC – one that has administrator privileges, and another that doesn’t. You’ll want to use the latter most of the time, except when performing admin-only tasks like installing apps or making updates. This setup can help protect you by […]

Power-off smart speakers when you’re not using them

Some smart speakers are set to always listen for certain keywords. That makes them highly responsive, but it can also create privacy concerns. If you’re not using them, or are conducting a sensitive conversation, consider unplugging them or powering them off to stay safe.

Consider turning off lock screen notifications

Lockscreen alerts are useful for conveying at-a-glance information. They’re also possibly risky if your device falls into the wrong hands, as they might give away sensitive details. You can either turn them off and stick to badges and the pull-down alert menu (available on both iOS and Android) or use a phone with facial recognition, […]

Shop for peripherals and cables carefully

When you buy anything from a USB thumbstick to a phone charging cable, don’t settle for any old option or buy exclusively based on price. Check the vendor and the outlet you’re buying from, since some products are technically faulty (e.g., cables that aren’t certified for the right voltages) and/or might put your data at […]

Is your internet router leaving you vulnerable to malware?

You probably don’t spend a lot of time thinking about your internet router, unless it struggles to deliver reliable Wi-Fi or Ethernet. If it’s working properly, it’s virtually invisible. However, with the rapid rise of the Internet of Things (IoT), these same routers have become the new front lines in network security, emerging as some of the biggest […]