Security tips

Subscribe to Security tips feed
The most recent SANS Institute Security Awareness Tips
Updated: 13 min 58 sec ago

Patch and Update

Fri, 03/16/2018 - 08:00
One of the most effective ways you can protect your computer at home is to make sure both the operating system and your applications are patched and updated. Enable automatic updating whenever possible.

Mobile Apps

Tue, 03/13/2018 - 08:00
Only install mobile apps from trusted places, and always double-check the privacy settings to ensure you are not giving away too much information.

Shopping Online

Thu, 03/08/2018 - 08:00
When shopping online, always use your credit cards instead of a debit card. If any fraud happens, it is far easier to recover your money from a credit card transaction. Gift cards and one-time-use credit card numbers are even more secure.

Unique Passwords

Wed, 03/07/2018 - 08:00
Make sure each of your accounts has a separate, unique password. Can't remember all of your passwords/passphrases? Consider using a password manager to securely store all of them for you.

Two-Step Verification

Tue, 03/06/2018 - 08:00
Two-step verification is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. Examples of services that support two-step verification include Gmail, Dropbox and Twitter.

Email Auto-Complete

Fri, 03/02/2018 - 08:00
Be careful with email auto-complete. This is an email feature that automatically completes a name for you when you begin typing it in the TO field. However, your email client can easily complete the wrong name for you. If you are emailing anything sensitive, always be sure to check the TO field a second time before hitting the send button.

Back up Your Files

Thu, 03/01/2018 - 08:00
Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information (such as family photos) on a regular basis.


Fri, 02/23/2018 - 08:00
Every plugin or add-on you install in your browser can expose you to more danger. Only install the plugins you need and make sure they are always current. If you no longer need a plugin, disable or remove it from your browser via your browser's plugin preferences.

Cloud Security

Thu, 02/22/2018 - 08:00
One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very easy to accidently share your files with the entire Internet when you think you are only sharing them with specific individuals.

Don't Lose That Device

Wed, 02/21/2018 - 08:00
Did you know that according to the Verizon DBIR report, you are 100 times more likely to lose a laptop or mobile devices than have it stolen? When you are traveling, always double-check to make sure you have your mobile device with you, such as when leaving airport security, exiting your taxi or check out of your hotel.

Lock Your Mobile Devices

Wed, 02/14/2018 - 08:00
The number one step for protecting your mobile device is making sure it has a strong passcode or password lock on it so only you can access it.

CEO Fraud

Tue, 02/13/2018 - 08:00
CEO Fraud is a type of targeted attack. It commonly involves a cyber criminally pretending to be your boss, then tricking or fooling you into sending the criminal highly sensitive information or initiating a wire transfer. Be highly suspicious of any emails demanding immediate action and/or asking you to bypass any security procedures.

Major News Events

Thu, 02/08/2018 - 08:00
When a major news event happens, cyber criminals will take advantage of the incident and send phishing emails with a subject line related to the event. These phishing emails often include a link to malicious websites, an infected attachment or are a scam designed to trick you out of your money.

Kids and Family Members

Wed, 02/07/2018 - 08:00
If you have children visiting or staying with family members (such as grandparents), make sure the family members know your rules concerning technology that your kids must follow. Just because your kids leave the house does not mean the rules about what they can do online change.

Social Media Postings

Thu, 02/01/2018 - 08:00
Be careful: the more information you post online about yourself, the easier it is for a cyber attacker to target you and create custom attacks against you or your organization.

Browse With Encryption

Wed, 01/31/2018 - 08:00
When browsing online, encrypting your online activities is one of the best ways to protect yourself. Make sure your online connection is encrypted by making sure HTTPS is in the website address and that there is a green lock next to it.

Secure Your Home Wi-Fi Router

Tue, 01/30/2018 - 08:00
The most effective steps you can take to secure your wireless network at home is to change the default admin password, enable WPA2 encryption and use a strong password for your wireless network.

Securely Disposing Mobile Devices

Thu, 01/25/2018 - 08:00
Do you plan on giving away or selling one of your older mobile devices? Make sure you wipe or reset your device before disposing of it. If you don't, the next person who owns it will have access to all of your accounts and personal information.

Reporting an Incident

Wed, 01/24/2018 - 08:00
Eventually, we all get hacked. The bad guys are very persistent and we can all make a mistake. If a phone call from the "Help Desk" doesn't sound quite right, if an email seems suspicious or if a program you installed starts acting funny, ask for help! Your security team is there to help you. The sooner you report an incident, the sooner we can help resolve the problem.

What is Malware

Tue, 01/23/2018 - 08:00
Malware is software--a computer program--used to perform malicious actions. In fact, the term malware is a combination of the words malicious and software. Cyber criminals install malware on your computers or devices to gain control over them or gain access to what they contain. Once installed, these attackers can use malware to spy on your online activities, steal your passwords and files, or use your system to attack others.