Archives - Security Best Practice


Don’t save credit card info on websites

Websites will often offer to save your card details for next time. This is convenient, but not without risk. If the site were ever breached, your card number might be stolen and used for fraudulent purchases. The alternative is to enter the number manually each time or pay with a more secure service such as […]

Use a variety of strong passwords

Use different passwords for different accounts and devices. Do not choose options that allow your device to remember your passwords. Although it’s convenient to store the password, that potentially allows cybercriminals into your accounts if your device is lost or stolen.

Take a pass on that online quiz

Companies like BuzzFeed have turned online quizzes into a cultural phenomenon. Which “Game of Thrones” character are you? Do you remember these 90s TV shows? Before you answer either of those questions via a quiz, consider doing almost anything else – these quizzes are designed in part to harvest your data and sell it to […]

Why is computer security important?

Because computers play such critical roles in our lives, and because we input and view so much personally identifiable information on them, it’s imperative to implement and maintain computer security. Computers are an essential part of our everyday lives. It’s important to properly configure your home computer before connecting it to the internet to keep […]

Watch out for fake antivirus

A lot of security software isn’t reputable. Some programs will actually increase your risk despite branding themselves as “cleaners” or “shields” for your activities. Stick with a well-established vendor such as Total Defense and be wary of insistent warnings and aggressive installation prompts.

Watch out for unsubscribe buttons in sketchy emails

Say you receive an email that has typos and asks you to do something risky like visit a strange site. You click “unsubscribe,” thinking you’ll be spared any such communications in the future. In reality, you might become more vulnerable by doing so. The safest route is to simply delete the message, or blacklist its […]