Archives - Security Best Practice


Remove unused browser extensions to improve performance and security

Browser extensions can be useful, but they can also consume inordinate CPU resources and potentially expose sensitive data. Regularly review your extensions to see if you really need them and remove any that aren’t used or essential. Also pay attention to the permissions each one asks for when you install it.

Don’t put all of your important information on one device

If you have photos, documents and other data that you don’t want to lose, you should distribute it across multiple locations. Consider using local backup options like external HDDs with cloud-based services to diversify where your data lives and avoid creating a single point of failure.

How do you find out what software updates you need to install?

When software updates become available, vendors usually put them on their websites for users to download. Install updates as soon as possible to protect your computer, phone, or other digital device against attackers who would take advantage of system vulnerabilities. Attackers may target vulnerabilities for months or even years after updates are available. Some software […]

Choose internet connections you trust

Use your home service or Long-Term Evolution connection through your wireless carrier. Public networks are not very secure, which makes it easy for others to intercept your data. If you choose to connect to open networks, consider using antivirus and firewall software on your device.

Get backup codes for your Google Account

Google provides many options for securing your account with two-factor authentication. But what if you don’t have access to your phone or other device for confirming a login attempt? This is where backup codes come in handy. These numeric codes can be generated by your Google Account and will work for logging in if you […]

Secure your most important internet accounts with a hardware key

Hardware keys such as the popular YubiKey provide strong second factor authentication when signing into services such as Gmail, Facebook and Dropbox. They can either be plugged into a port on your device or be connected wirelessly through Near-Field Communication. Without this unique key, no one can access your accounts, even if they know the […]