Archives - Security Best Practice


Remove old search results about yourself

Someone looking up your name on a search engine like Google might find results related to your previous jobs and addresses, along with information about your relatives. This data could be used against you, for example in determining the answers to security questions. Luckily, Google offers a URL removal tool for requesting takedowns of specific […]

Make your devices go to sleep sooner

Password-protected PCs, Macs, tablets and smartphones all have cutoff points at which they lock their screens, requiring re-entry of the passcode or PIN. The time frame for relocking is adjustable, but the safest option is to force anyone attempting to log in to re-enter the device password immediately. That way, you don’t have to worry […]

Don’t bank or shop on untrustworthy networks

When checking your online bank balance or making a purchase, it’s best to avoid networks you don’t normally use, especially public Wi-Fi hotspots that might expose your activity to unwanted third parties. Conduct important transactions on your password-protected home network or with the help of a virtual private network (VPN) service.

Use alternatives to SMS for two-factor authentication

If you use two-factor authentication, it’s best to rely on codes sent to other devices or applications such as Duo or Google Authenticator instead of SMS texts. That’s because SIM hacking is on the rise. This practice entails a cyberattacker tricking a customer service representative into reassigning a phone number to a new SIM card.

Recognize ‘dark patterns’ when you see them

A dark pattern is an intentionally misleading user experience in an app or on a website. A classic example is having to click a bunch of buttons to try to close an account, only to find you actually have to call someone. Needing to deselect a huge list of options is also common. Be aware […]

Lie on your security questions

This might seem like strange advice, but hear us out: If someone finds key details about you online, that information could help answer the security questions for accessing an important account. Considering lying on purpose to mislead would-be attackers. Alternatively, select opinion-based questions like “What is your favorite color?”