Archives - Security Settings


Take the Google Security Checkup

The Security Checkup offered by Google is a step-by-step guide for making sure your account is secure and recoverable in case it’s attacked. Open your account page, then select the Security tab. At the top, you’ll see a message that says “We keep your account protected.” Click “Get started” and follow the on-screen instructions. If […]

Check security settings on your web browser

Your web browser is your primary connection to the rest of the internet, and multiple applications may rely on your browser, or elements within your browser, to function. This makes the security settings within your browser even more important. Many web applications try to enhance your browsing experience by enabling different types of functionality, but […]

Manage third-party app permissions in Instagram

Have you connected any services to your Instagram account, for example for photo printing or sharing? You can check on these permissions and revoke them as needed from Settings -> Security -> Apps and Websites from within the Instagram app.

Make sure USB Accessories are disabled on iOS

Apple iOS can restrict the access of certain hardware and software to a device while it’s locked. It’s important to prevent USB devices in particular from being able to connect to a locked iPhone or iPad. Open Settings -> FaceID & Passcode (or TouchID & Passcode) and scroll down to make sure USB devices aren’t […]

Take advantage of muting on Twitter

If you use Twitter, it’s a good idea to block any accounts that harass you or urge you to take action by visiting a risky site via link. Another layer of protection is available through muting, which lets you prevent certain accounts or even specific words and phrases from ever appearing in your timeline. You […]

Check security settings for your web browsers

Ideally, you would set your security for the highest level possible. However, restricting certain features may limit some web pages from loading or functioning properly. The best approach is to adopt the highest level of security and only enable features when you require their functionality. If you determine that a site is trustworthy, you can […]