Archives - Security Best Practice


Have your devices go to sleep quicker

Password-protected PCs, Macs, tablets and smartphones all have limit points at which they lock their screens, requiring re-entry of the passcode or PIN. The time frame for relocking is changeable, but the safest option is to force anyone attempting to log in to re-enter the device password immediately. That way, you don’t have to worry […]

Worried about protecting your business? Try a cloud-based solution

Businesses collect large amounts of data. This makes them susceptible to cyberattack, especially from hackers aiming to hold a company ransom. The best way for an organization to protect its data is to automate security protocols with cloud technology. Artificial intelligence and machine learning can patrol your network end-to-end so that suspicious activity won’t go […]

Don’t bank or shop on unsecure public networks

When viewing your online bank balance or making a purchase, it’s best to avoid networks you don’t normally use, especially public Wi-Fi hotspots that might reveal your activity to unwanted cybercriminals. Handle important transactions on your password-protected home network or with the help of a virtual private network (VPN) service.

How to check your privacy is protected

Review the website privacy policy before submitting your name, email address, or other personal information on a website. This policy should state how the information will be used and whether or not the information will be distributed to other organizations. Businesses sometimes share information with partner vendors who offer related products or may offer options […]

How to disable in-app purchases

The advent of the modern smartphone came with a slew of marketing with the slogan “there’s an app for that.” And it’s all but true: there’s an app for nearly any and everything. A lot of these apps come for the low, low price of free, but of course, there’s a catch. Free apps can […]

Connect no more than 50 devices to a single home router

Consumer routers should hold no more than 50 connections. The more devices, the greater the security risk. If one device is compromised, all other devices on the network could be, too. A good rule of thumb is to connect your most used devices — those with the most personal data — to a second home […]