Archives - Security Best Practice


Use a few personal email accounts

It’s a good idea to have a distinct email account just for mailing lists. That way, you lower the risk of getting offers in your inbox that are actually attempts at phishing. Keep one account just for emailing trusted friends, family members and contacts, and another for everything else.

How to Shut Down, Sleep and Hibernate Your Windows 11 PC

In the decades since Microsoft introduced its game-changing operating system, there have been numerous iterations of the desktop OS. Windows 11 currently holds the mantle of flagship product, with the company naturally keen to push the latest version to its user base. Microsoft dominates the OS marketplace, with around 77% of all desktop devices worldwide […]

Implement a “clean desk, clear screen” policy for employees

A clean desk policy involves removing any sensitive business information from your desk everyday. This can include USB sticks, notebooks, business cards and printed documents. Inadvertently leaving them out is an invitation to data theft, which could result in a serious breach of your business’ network. Add a ‘clear screen’ policy, so employees are required […]

Regularly clear your browser history and cookies

Almost everything you do on the internet is recorded by your browser. Every site you visit, all the information you enter in online forms and cookies (small files downloaded onto your computer when you visit a website) all begin to build up. This could potentially provide someone with all the data they need to access […]

Buy privacy protection when you register a website domain

Normally by default, purchases of new website domains publish your name and mailing address in a publicly searchable database. This may lead to unwanted spam. Luckily, you can typically pay a small annual fee to keep your registration information private.

Use fake answers to security prompts

If you regularly post on social media or disseminate details like addresses and names online, a criminal might attempt to break past your security questions because they have enough information to guess the answers. So why not make them up? Come up with the false name of a childhood best friend, your first street, favorite […]