SANS Tip-of-the-Day

Subscribe to SANS Tip-of-the-Day feed SANS Tip-of-the-Day
Security Awareness Tip of The Day
Updated: 11 min 40 sec ago

Browse With Encryption

Mon, 08/31/2015 - 21:36
When browsing online, encrypting your online activities is one of the best ways to protect yourself. Make sure your online connection is encrypted by making sure HTTPS is in the website address and that there is a green lock next to it.

Securely Disposing Mobile Devices

Tue, 08/18/2015 - 19:31
Do you plan on giving away or selling one of your older mobile devices? Make sure you wipe or reset your device before disposing of it. If you don't, the next person who owns it will have access to all of your accounts and personal information.

Patch and Update

Tue, 08/11/2015 - 23:40
One of the most effective ways you can protect your computer at home is to make sure both the operating system and your applications are patched and updated. Enable automatic updating whenever possible.

Two-Step Verification

Thu, 08/06/2015 - 21:42
Two-step verification is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. Examples of services that support two-step verification include Gmail, Dropbox and Twitter.

Detecting Fraud

Tue, 08/04/2015 - 23:48
Review your bank, credit card and financial statements regularly to identify unauthorized activity. This is one of the most effective ways to quickly detect if your bank account, credit card or identity has been compromised.

Major News Events

Mon, 08/03/2015 - 21:43
When a major news event happens, cyber criminals will take advantage of the incident and send phishing emails with a subject line related to the event. These phishing emails often include a link to malicious websites, an infected attachment or are a scam designed to trick you out of your money.

Email Auto-Complete

Mon, 08/03/2015 - 02:06
Be careful with email auto-complete. This is an email feature that automatically completes a name for you when you begin typing it in the TO field. However, your email client can easily complete the wrong name for you. If you are emailing anything sensitive, always be sure to check the TO field a second time before hitting the send button.

Two Home Computers

Thu, 07/30/2015 - 22:44
If possible, have two computers at home -- one for parents and one for kids. If you are sharing a computer, make sure you have separate accounts for everyone and that kids do not have privileged access.

Trust Your Instincts

Wed, 07/29/2015 - 21:59
Ultimately, common sense is your best protection. If an email, phone call or online message seems odd, suspicious or too good to be true, it may be an attack.

Mobile Apps

Mon, 07/27/2015 - 22:11
Only install mobile apps from trusted places, and always double-check the privacy settings to ensure you are not giving away too much information.

Lock Your Mobile Devices

Sun, 07/26/2015 - 21:46
The number one step for protecting your mobile device is making sure it has a strong passcode or password lock on it so only you can access it.

Protecting Your Social Media Account

Fri, 07/24/2015 - 14:52
Bad guys are targeting your social media accounts. One of the most effective ways you can protect them is with a unique, strong password called a passphrase. Enabling two-step verification (if your social media site offers it) is even better.

Back up Your Files

Fri, 07/24/2015 - 14:52
Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information (such as family photos) on a regular basis.

Cloud Security

Fri, 07/24/2015 - 14:52
One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very easy to accidently share your files with the entire Internet when you think you are only sharing them with specific individuals.

Protecting Your Social Media Account

Tue, 07/21/2015 - 21:35
Bad guys are targeting your social media accounts. One of the most effective ways you can protect them is with a unique, strong password called a passphrase. Enabling two-step verification (if your social media site offers it) is even better.

Back up Your Files

Mon, 07/20/2015 - 22:44
Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information (such as family photos) on a regular basis.

Cloud Security

Sun, 07/19/2015 - 23:27
One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very easy to accidently share your files with the entire Internet when you think you are only sharing them with specific individuals.

Use Caution Opening Email Attachments

Wed, 07/15/2015 - 22:47
A common method cyber criminals use to hack into people�s computers is to send them emails with infected attachments. People are tricked into opening these attachments because they appear to come from someone or something they know and trust. Only open email attachments that you were expecting. Not sure about an email? Call the person to confirm they sent it.

Securely Deleting Files

Tue, 07/14/2015 - 22:01
When you delete a file, that file is actually still on your computer. The only way you can truly and securely remove a file is by wiping it or using some type of secure deletion.

Plugins

Sun, 07/12/2015 - 23:38
Every plugin or add-on you install in your browser can expose you to more danger. Only install the plugins you need and make sure they are always current. If you no longer need a plugin, disable or remove it from your browser via your browser's plugin preferences.

Pages