Archives - Security Best Practice


Don’t open that .zip attachment

Email attachments are to some degree unavoidable in normal personal and business communications. However, it’s a good idea to minimize your exposure. Don’t open any attachments from people not in your contacts list, and ask senders if they can share the document via a cloud link instead (much safer).

Automate password management

It’s fully possible to create your own strong passwords, i.e. ones based on phrases, but it’s often more trouble than it’s worth. Many password managers, including ones built into OSes like Apple iOS, can take care of password generation, storage, organization and retrieval for you.

Avoid using the devices of strangers

Try to stick to your own devices when possible, if only for the security benefits. When you use someone else’s laptop or tablet, you have no assurance that it isn’t infected with malware or running a keylogger.

Delete any non-critical app you haven’t used for 6 months or more

It’s common to have tons of apps on your devices, many of which you might not have opened in months or even years. Unless they contain vital information or functionality, it’s usually advisable to delete them. Not only will you free up space, you’ll save yourself any trouble that might stem from their use of […]

Don’t believe everything you read online

Be skeptical – people may post false or misleading information about various topics, including their own identities on social networking websites. This is not necessarily done with malicious intent; it could be unintentional, an exaggeration, or a joke. Take appropriate precautions, though, and try to verify the authenticity of any information before taking any action.

Don’t put all of your critical information in one location

If you have a lot of photos, videos, documents and apps that you would never want to lose track of, it’s a bad idea to keep them all on one local system, like a PC or phone that hasn’t been backed up. Try to maintain multiple copies across different locations, using cloud backup solutions and/or […]