Archives - Security Best Practice


Be careful with links and when entering website addresses

Use caution when clicking directly on links in emails, even if the sender appears to be someone you know. Attempt to independently verify website addresses (e.g., contact your organization’s helpdesk, search the internet for the sender organization’s website or the topic mentioned in the email). Pay attention to the website addresses you click on, as […]

Back up the data on your device before traveling

Many applications allow you to set up regular automated backups of your data, which is great for day-to-day data preservation. But when you’re traveling — particularly abroad — this could be costly or ineffective due to connectivity or restrictions on your plan. To ensure you have a reliable account of your data before you go […]

Do your online shopping homework

Scam artists are always on the prowl setting up new schemes for fake e-commerce sites. Before you make a purchase, take the time to read reviews and hear what others say about the merchant. Also, try to find a physical location and any customer service information you can gather. It’s also a good idea to […]

Don’t forget about old devices

When you upgrade your phone or computer, be sure to complete a thorough data cleanse of your old ones. Performing a factory reset isn’t sufficient to wipe all information from a device. Instead, invest in a dedicated program or app that will truly clear your personal data and account information from a device. This is […]

Make NFC payments on your phone secure

Being able to use your phone to complete contactless transactions is great, seeing as we almost always have our phones handy. But be sure to explore what settings you can use to make sure it is protected should your phone be lost or stolen. Incorporate biometric security with NFC so it requires your fingerprint to […]

Secure your printers

A printer is an easily overlooked member of your IoT family, but consider how advanced modern printers are. Many are Wi-Fi and Bluetooth enabled, and they’re connected to your network, both at home and in the office. Without suitable precautions in place, your printer could be the backdoor a hacker needs to access your network. […]