Archives - Security Settings


Know what parts of your browser you should commonly clear

There’s a lot of information stored in your browser that will probably stay there permanently if you don’t do anything about it. All of it can also potentially be seen by unwanted parties. If it doesn’t matter to you either way, you can safely clean out *everything* when clearing your browser history, whether in the […]

Max out your web browser security settings

It’s best practice to set your web browser security settings to the highest possible level. This may mean a few websites can’t load or work properly. A smart approach is to stick to the highest level of online security and only enable extra features if they’re absolutely necessary. If you’re confident a site is trustworthy, […]

Require a PIN when your computer turns on or wakes from sleep

PINs are a useful layer of security that ensures only authorized users can use your computer. You can customize when a PIN is needed — you may only want a PIN to appear at startup, for example — but it’s a good idea to at least require one both at startup and when your computer […]

Use fake answers for security questions

Many account recovery features include answering security questions such as your father’s middle name or the city you grew up in. But you don’t necessarily have to use real answers, which would make someone trying to break into your account unable to even if they knew such information. If you want to say your father’s […]

Be careful what permissions you do give to apps because many are optional

Most of the time, an app doesn’t really need to know your location. It’s usually just for the sake of convenience so you don’t have to plug in your address manually. Still, it’s more secure to only give location access to apps that need it, so only give permissions to apps that you’re comfortable with […]

Be careful of the permissions you give to apps

Be wary of app permissions that don’t seem appropriate. If an app wants access to the information in your email accounts, for example, it may be trying to steal personal data. It can be tricky to know for sure if an app permission request is legitimate or not, so err on the side of caution […]