Archives - Security Best Practice


Parental controls aren’t just for kids

Parental controls are generally used to protect children from certain things on the internet, allowing them to browse freely without the risk of coming across harmful content. But they can be used by adults to protect themselves from potential security risks too. Delve into the specifics of parental control settings — such as blocking gambling […]

Don’t mix work and pleasure

If you work from home, request that your employer give you a dedicated work laptop or computer. Keeping work and personal data separate will reduce the risk of cross contamination or incidental slips that could lead to serious data breaches. Where possible, do the same with mobile devices; ask for a work phone or tablet […]

Turn off Bluetooth

Bluetooth connections are so commonly used now that it isn’t always something you may think of turning off when you’re not using a peripheral device. While Bluetooth security is excellent, it’s still vulnerable to infiltration. Leaving Bluetooth active while not connected to a device may present an opportunity for bad actors in your immediate vicinity. […]

Manually update your OS

Devices can often have small patch updates you don’t receive push notifications for. Go into the settings menu and look for software updates. The device will check that everything is up to date and let you know if there are any patches you can download. Make a habit of doing this regularly; you’ll usually find […]

How to spot an online scam

As you spend more time online, engaging in a greater variety of activities and digitizing previously analogue aspects of your life, you entrust your personal information to online processes. This opens up avenues that scammers may attempt to take advantage of. Keeping yourself protected from fraudulent activity is increasingly important, since so much of day-to-day […]

Make passwords longer, not more complicated

Studies have shown that overly complicated passwords — i.e., complex combinations of upper- and lower-case letters, numbers and special characters — are forgotten and require changing frequently. Instead, combine familiar words to create a longer password. Hacking software usually works by systematically figuring out each character of a password one-by-one, so the more characters you […]