SANS Tip of the Day

Subscribe to SANS Tip of the Day feed SANS Tip of the Day
Security Awareness Tip of The Day
Updated: 32 min 29 sec ago

Browse With Encryption

Tue, 01/26/2016 - 00:00
When browsing online, encrypting your online activities is one of the best ways to protect yourself. Make sure your online connection is encrypted by making sure HTTPS is in the website address and that there is a green lock next to it.

Lock Your Mobile Devices

Mon, 01/25/2016 - 00:00
The number one step for protecting your mobile device is making sure it has a strong passcode or password lock on it so only you can access it.

Two-Step Verification

Thu, 01/14/2016 - 00:00
Two-step verification is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. Examples of services that support two-step verification include Gmail, Dropbox and Twitter.

Cloud Security

Tue, 01/12/2016 - 00:00
One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very easy to accidently share your files with the entire Internet when you think you are only sharing them with specific individuals.

Securely Deleting Files

Tue, 01/05/2016 - 00:00
When you delete a file, that file is actually still on your computer. The only way you can truly and securely remove a file is by wiping it or using some type of secure deletion.

Shopping Online

Mon, 12/28/2015 - 00:00
When shopping online, always use your credit cards instead of a debit card. If any fraud happens, it is far easier to recover your money from a credit card transaction. Gift cards and one-time-use credit card numbers are even more secure.

Securely Disposing Mobile Devices

Wed, 12/23/2015 - 00:00
Do you plan on giving away or selling one of your older mobile devices? Make sure you wipe or reset your device before disposing of it. If you don't, the next person who owns it will have access to all of your accounts and personal information.

Don't Trust Links Sent in Email Messages

Fri, 12/18/2015 - 00:00
A common method cyber criminals use to hack into people's computers is to send them emails with malicious links. People are tricked into opening these links because they appear to come from someone or something they know and trust. If you click on a link, you may be taken to a site that attempts to harvest your information or tries to hack into your computer. Only click on links that you were expecting. Not sure about an email? Call the person to confirm they sent it.

Patch and Update

Thu, 12/17/2015 - 00:00
One of the most effective ways you can protect your computer at home is to make sure both the operating system and your applications are patched and updated. Enable automatic updating whenever possible.

If You Are a Victim of Identity Theft

Tue, 12/08/2015 - 00:00
Report any identity theft immediately by following these steps:

Social Media Privacy Settings

Fri, 12/04/2015 - 00:00
Privacy settings on social networks have limited value. They are confusing to configure and change often. Ultimately, if you do not want your parents or boss reading it, do not post it.

Kids and Mobile Devices

Thu, 12/03/2015 - 00:00
If you have kids with mobile devices, create a central home charging station in your bedroom. Before the kids go to bed at night, have them put their mobile devices there so they are not tempted to play with them when they should be sleeping.

Never Respond to Emails Asking for Personal Information

Wed, 12/02/2015 - 00:00
Companies you do business with should never ask for your account information, credit card numbers or password in an email. If you have any questions about an email you receive that supposedly came from your financial institution or service provider, find their number on their website and call them.

Trust Your Instincts

Thu, 11/26/2015 - 00:00
Ultimately, common sense is your best protection. If an email, phone call or online message seems odd, suspicious or too good to be true, it may be an attack.

Mobile Apps

Mon, 11/23/2015 - 00:00
Only install mobile apps from trusted places, and always double-check the privacy settings to ensure you are not giving away too much information.

Lock Your Mobile Devices

Thu, 11/19/2015 - 00:00
The number one step for protecting your mobile device is making sure it has a strong passcode or password lock on it so only you can access it.

Forwarding Emails

Wed, 11/18/2015 - 00:00
When you forward an email to others or copy new people to an email thread, review all the content in the entire email and make sure the information contained in it is suitable for everyone. It is very easy to forward emails to others, not realizing there is highly sensitive information in the bottom of the email that people should not have access to.

Unique Passwords

Fri, 11/13/2015 - 00:00
Make sure each of your accounts has a separate, unique password. Can't remember all of your passwords/passphrases? Consider using a password manager to securely store all of them for you.

When Away

Thu, 11/12/2015 - 00:00
Leaving your seat? Ctrl--Alt--Delete! Make sure you lock your workstation or laptop while you are away from it. On a Mac? Try Control--Shift--Eject/Power.

Back up Your Files

Tue, 11/03/2015 - 00:00
Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information (such as family photos) on a regular basis.