Security

Tips and Tricks

Keep these helpful best practice tips in mind.

Enable Find My Device and Remote Wipe

Being able to find (and ideally) remote your device is a crucial part of ensuring information security when a device is lost or stolen. Securely wiping a device makes it much harder to access your data, no matter how much time or determination an attacker has.  Here’s how to enable find my device:

  • Windows: Enable in Settings > Update & Security & Find my device.
  • macOS: Setup iCloud on your device by going to Settings > Your Name > iCloud > Find My Mac.
  • Linux: Not built into the operating system and requires a third-party app.
  • Android: Set up a Google account on the device and it will be enabled by default.
  • iOS: Setup iCloud on your device by going to Settings > Your Name > iCloud > Find My iPhone/iPad.

Avoid using public networks:

When you connect to a public network, you must know that you are sharing the network with everyone that is also connected. Any information you send and / or retrieve on the network is vulnerable. STAY AWAY from public network. Use a VPN when you are connected to the public one.

Even the best recipes can benefit from occasional updates.

Remember to update your devices with software updates.

The famous secret family recipe remains secret for a reason…

Good security and protection practices. Take that same approach to protect your important information and privacy.

If you cook something for too long it burns ….

If you use the same password for too long you will be burned by cyber attackers!

Top notch recipes require ingredients from quality suppliers …

Make sure your company’s suppliers have quality cybersecurity programs!

A Cup of Sugar…

Reach out to your neighbor – with more eyes encouraged to keep a watchful eye, it’s easier to create real security among employees and in your neighborhood.

Hard Crust…

It’s more expensive to harden a site or a home afterwards, than to bake in security from the start.  Google “CPTED” for more tips or contact your Regional Security Manager for your free consult.

In cybersecurity, honey pots are created to attract malicious actors. 

However, you can attract your loved ones with your own honey pie!  Check out our Salted Honey Pie recipe!

While ransom is typically paid in cryptocurrency,  your family will repay you with love when you make the Silver Dollar pancakes!