Archives - Security Best Practice


Set up a Guest account on macOS

If you have a Mac and need to share it with someone, you should set up a Guest account before doing so. This can be done from System Preferences -> Users and Groups. A Guest account provides minimal features, so that the user cannot do any damage to the operating system or your data.

Upgrade from Windows 7

Mainstream support for Windows 7 is ending in 2020. That means continuing to run it will come with major security liabilities. If it’s on your main PC, consider upgrading to Windows 10. Replacing Windows 7 with a free Linux-based operating system, like Debian or Ubuntu, is another option.

Modify unnecessary default features

Like removing unnecessary software, modifying or deleting unnecessary default features reduces attackers’ opportunities. Review the features that are enabled by default on your computer, and disable or customize those you don’t need or don’t plan on using. As with removing unnecessary software, be sure to research features before modifying or disabling them.

Remove unnecessary software

Intruders can attack your computer by exploiting software vulnerabilities, so the fewer software programs you have installed, the fewer avenues there are for potential attack. Review the software installed on your computer. If you don’t know what a software program does, research the program to determine whether or not the program is necessary. Remove any […]

Secure your router

When you connect a computer to the internet, it’s also connected to millions of other computers—a connection that could allow attackers access to your computer. Although cable modems, digital subscriber lines (DSLs), and internet service providers (ISPs) have some level of security monitoring, it’s crucial to secure your router—the first securable device that receives information […]

Use a unique password for each site

Recycling passwords is easy, but dangerous. Make sure that every site you create an account for has a unique and strong password. You can use your own methodology to create such passwords, for example by turning a long and memorable phrase into acronym. Alternatively, you can use a password generator.