Archives - Security Best Practice

Beware of Online Vehicle Sales Scams

When it comes to making online purchases, be cautious of items being advertised well below their market value. Remember, if the deal appears too good to be true, it probably is. Use the Internet to research the advertised item and the seller’s name, email addresses, telephone numbers, and other unique identifiers. Avoid sellers who refuse […]

Pay attention to top-level domains on websites

You might not think much about top-level domains (TLDs), which include .com, .org and .net. Many new TLDs were introduced in the last few years, and a lot of them are associated with risky activities like spam distribution. Be wary of .country, .stream and .download in particular, since they are almost exclusively shady.

Why are security settings for web browsers important?

Your web browser is your primary connection to the rest of the internet, and multiple applications may rely on your browser, or elements within your browser, to function. This makes the security settings within your browser even more important. Many web applications try to enhance your browsing experience by enabling different types of functionality, but […]

Use private browsing, but don’t rely on it exclusively to keep you safe

Private browsing is a good way to keep browsing history secret and avoid cluttering your machine with cookies and temporary files. However, it’s not a security measure per se – you can still be spied on and hit with malware infections while nominally incognito. Combine private browsing with antivirus software and other protective measures.

Enable automatic updates for your security and data management apps

Outdated software is one of the biggest risks to data security. Countless attacks have targeted known exploits in older versions of popular applications and operating systems. To stay safe, use solutions like Total Defense Internet Security that automatically implement new updates as they become available.

Beware of publicly accessible computers.

Hotel business centers, libraries, and cyber cafes provide computers that anyone can use. However, travelers cannot trust that these computers are secure. They may not be running the latest operating systems or have updated anti-virus software. Cyber criminals may have infected these machines with malicious viruses or install malicious software.