Archives - Security Best Practice


Take a zero-trust approach to network access

Zero-Trust Network Access (ZTNA) uses the principle of least privilege that automatically defaults to the lowest level of access. In other words, when someone tries to access the business network, ZTNA will first verify their identity and apply permissions based on predefined rules created by the organization. In simple terms, users only have access to […]

What is a website security certificate?

A website security certificate is also known as an SSL, an HTTPS certificate, and an SSL server certificate. It allows websites to display that padlock in the web address bar. There are two elements that signify that a site uses: one is a closed padlock, which, depending on your browser, may be positioned in the […]

Keep your router’s firmware up-to-date

It’s a major security risk to have outdated internet router firmware. Sadly, lots of people aren’t aware of this issue because they don’t do much with their routers unless they have issues with their internet connection. Take a look at your router to find its IP address, which you can enter into your web browser. […]

Customize applications you have access to when your iPhone is locked

The release of iOS 15.4 introduced a suite of new features for iPhone users. One new ability – the ability to customize which apps you can access from the lock screen – could pose a risk to your cybersecurity. When trying this new addition, be careful which apps you enable. Messages and the Wallet app, […]

Use an encrypted email service

Secure email services can encrypt your messages to ensure they’re only accessible to authorized parties – not even the email provider will be able to access them. Some services go one step further and allow you to create aliases that protect your private correspondence and keep your primary address anonymous.

Be careful when using public PCs

When staying in a hotel or studying in a library, be mindful of how you use publicly accessible computers. There’s no telling who accessed these PCs or how safe they may be. Don’t log in to any personal accounts or input any sensitive information – public computers may be infected with keylogging malware designed to […]