Archives - Security Best Practice


Only buy from security-minded providers

Your security is only as strong as the weakest link. Ensure that every company you work with — ISP, SaaS, Bluetooth-enabled consumer electronics, etc. — has the same strict security requirements as your home and work environment demand. Advanced security across the board can help protect you from provider-side vulnerabilities.

Implement automated policy enforcement

You can increase security exponentially by applying rules based on traffic type, location and application. By automating the enforcement of certain security rules, you can reduce the risk of security breaches.

Operate with the principle of least privilege

In many examples of malware infection, the malware may only function using the privileges of the logged-in user. To lessen the effect of malware infections, think about using a standard or restricted user account (i.e., a non-administrator account) for day-to-day activities. Only log in with an administrator account—which has full operating privileges on the system—when […]

Use a URL expander on Twitter

Truncated links, created by services like Buffer and dlvr.it are common on Twitter, since they’re clean-looking and short. But they make it impossible to know what exactly is on the other end of the link. Consider using a URL expander, plenty of which are available for major browsers, to see what each link really leads […]

Before you connect a new computer to the internet

Install and use antivirus software. Installing an antivirus software program and keeping it up-to-date is a critical step in protecting your computer. Many types of antivirus software can detect the presence of malware by searching for patterns in your computer’s files or memory. Antivirus software uses signatures provided by software vendors to identify malware. Vendors […]

Check and remove unnecessary software

Cyberattackers can assault your computer by utilizing software vulnerabilities, so the less software programs you have installed, the fewer paths there are for possible attack. Evaluate the software installed on your computer. If you don’t know what a software program does, research the program to determine whether or not the program is necessary. Remove any […]