Archives - Security Best Practice


Delete accounts you haven’t used in six months or longer

If you do not regularly use an account, it shouldn’t exist. If an account that you don’t check regularly gets hacked, you may not even notice until the hacker causes significant damage. You may think that your old social media accounts don’t contain much sensitive information, but you’d be surprised. They might contain your email, […]

Disable automatic Bluetooth connectivity on your iPhone

Similar to automatic Wi-Fi connectivity, your iPhone searches for nearby available Bluetooth connections. Assailants can use a Bluetooth connection as a potential entry point to hack into your device and steal your personal information. To turn off automatic Bluetooth activity on iOS: Go to “Settings.” Go to “Bluetooth.” Turn Bluetooth off. A safer way to […]

Set your PC or Mac to automatically log off

When you leave your computer, you don’t want somebody else getting unauthorized access to it. Setting an automatic logoff timer ensures that it’s not susceptible when you step away for an extended period. This can be easily done on both Windows and Mac operating systems.

Take notice of top-level domains on websites

You may not think much about top-level domains (TLDs), which include .com, .org and .net. Many new TLDs came online in the last few years, and a lot of them are connected with malicious activities like spam distribution. Be wary of .country, .stream and .download in particular, since they are almost exclusively suspicious.

Adopt a zero-trust security model

It’s far, far better to be too suspicious than too lax when it comes to your security, especially when using company devices on personal networks while working remotely. A combination of a zero-trust approach (which flags anything not explicitly known not to be a threat) with a robust IT support system (to swiftly give and […]

Grant granular access to shared files

Sharing files by email should be discontinued across the board. Instead, use a secure file sharing system with granular access control. This permits you to authorize different levels of access, such as viewing, commenting and editing. Never include files that contain ways to access your network.