Archives - Security Best Practice


Turn off auto-fill

While auto-fill is a very useful feature for reducing the laboriousness of entering your personal information every time you order or book online, it also opens up your personal information for exploitation if your account is compromised, or if your device is stolen. While it might be a little more tedious to have to input […]

Parental controls aren’t just for kids

Parental controls are generally used to protect children from certain things on the internet, allowing them to browse freely without the risk of coming across harmful content. But they can be used by adults to protect themselves from potential security risks too. Delve into the specifics of parental control settings — such as blocking gambling […]

Don’t mix work and pleasure

If you work from home, request that your employer give you a dedicated work laptop or computer. Keeping work and personal data separate will reduce the risk of cross contamination or incidental slips that could lead to serious data breaches. Where possible, do the same with mobile devices; ask for a work phone or tablet […]

Turn off Bluetooth

Bluetooth connections are so commonly used now that it isn’t always something you may think of turning off when you’re not using a peripheral device. While Bluetooth security is excellent, it’s still vulnerable to infiltration. Leaving Bluetooth active while not connected to a device may present an opportunity for bad actors in your immediate vicinity. […]

Manually update your OS

Devices can often have small patch updates you don’t receive push notifications for. Go into the settings menu and look for software updates. The device will check that everything is up to date and let you know if there are any patches you can download. Make a habit of doing this regularly; you’ll usually find […]

How to spot an online scam

As you spend more time online, engaging in a greater variety of activities and digitizing previously analogue aspects of your life, you entrust your personal information to online processes. This opens up avenues that scammers may attempt to take advantage of. Keeping yourself protected from fraudulent activity is increasingly important, since so much of day-to-day […]