Archives - Security Best Practice


Take advantage of quality of service (QoS) features on your network devices

Quality of service is a common feature of routers and other networking hardware that prioritizes some types of network traffic over others. This can be very useful if you have limited data speeds: Without QoS, data comes on a first-come, first-serve basis. Configuring QoS can sometimes be difficult, but many devices have presets you can […]

How to chat with chatbots

Chatbots are widely used to facilitate customer engagement, but they can be awkward and even risky to interact with. If you happen to receive an unexpected call asking, “can you hear me”, a voicemail message claiming that your warranty has expired (even if you don’t have one) or a chat message that suggests you enter […]

Disable Bluetooth when it’s not being used

Bluetooth can be an exceptionally useful wireless technology when connecting a range of devices including earbuds, microphones or personal vehicles. However, leaving Bluetooth on all the time, especially if you frequent public areas, can be a security risk. Turn it off when you’re not using it, and only turn it back on if you’re sure […]

Be careful of granting sensitive permissions to new apps

Many apps — even well-known ones — ask for a long list of permissions when they’re installed. This can include location data, camera access, your email information, and other potentially sensitive permissions. Be wary of what you grant access: An image-editing app probably doesn’t need access to your emails to function. Note that location data […]

What’s multi-factor authentication (MFA)?

Multi-factor authentication is a type of authentication that requires multiple pieces of evidence to validate a user’s identity. It typically involves up to three factors – something the user knows (like a password or PIN), something the user has (such as a security token or cellphone), and something the user is (a biometric characteristic, like […]

Take advantage of cloud storage — but don’t neglect physical backups

Cloud storage can be an invaluable way to access your important documents and data remotely and keep it safe in case your local storage fails. However, cloud storage is typically kept behind a password, meaning an unauthorized user can potentially access it if they have your credentials. In addition, cloud storage isn’t 100% safe from […]