Archives - Security Best Practice


Donate online directly to the charity

It’s better not to contribute via a third-party website if you can give directly through a charity’s own site. If the charity that you want to support does not offer online giving, you may be able to give through JustGive or Network for Good. Be aware that these third-party websites may charge you a transaction […]

Take advantage of security features on the Google Pixel 6

In updates to its Pixel line of smartphones, Google is upgrading the device’s security features. With a new dashboard, users can see if their device is up to date with the latest security updates, or if there’s an app on their phone that could be harmful. Users will also be able to tell if their […]

Proactively delete text messages

It’s easy for text messages, like emails, to pile up. Long after you’ve read them, texts can still lay dormant on your phone. If you have old text threads, it’s a good idea to delete them as soon as possible. They may contain private information that could compromise your safety if they fell into the […]

Set user-specific restrictions on your business network

Not every employee needs access to every file. You can keep sensitive information safe by setting specific access permissions so that only authorized users can read certain documents. This reduces the risk that private information will be leaked, whether it be by someone on the inside or outside of the organization.

Get in the habit of pressing “Deny” rather than “Accept”

The benefits of accepting permissions or cookies are relatively few for the average consumer. Yes, your ad experience may be more relevant and your mobile experience may be more efficient, but your private information may also be at risk. When you land on a site you don’t often visit — or have no plans of […]

The fewer devices and accounts you have, the more protected you are

The best way to stay protected online is to reduce the surface area for bad actors to attack. For every account, there’s a doorway into your private data. For every device, there may be a dozen different accounts. Risk, as a result, increases exponentially as this process goes on. Rather than spread yourself thin across […]