Security and Privacy

  1. Overview
  2. Security and Privacy

What Should I Do If I See a Security Warning?

For Both Windows and Mac Users Read the Warning Carefully: Check what the warning says (e.g., about a potential threat, unsafe website, or suspicious download). If I ...

Using Authentication Apps Versus SMS Codes

Authentication Apps (Preferred): Apps like Google Authenticator or Microsoft Authenticator generate time-based codes that are more secure than SMS. These codes do not rely ...

The Importance of Locking Your Screen When Stepping Away

Why It’s Important Prevents unauthorized access to your files and accounts if you leave your device unattended. Essential in public spaces or shared work environments. ...

How Do I Turn On or Off the Firewall?

For Windows Users Open Firewall Settings: Click the Start Menu, type Firewall, and select Windows Defender Firewall. Check Firewall Status: In the left-hand menu, ...

Recognizing and Responding to Social Engineering Attacks

1. Identifying Social Engineering Attacks What is Social Engineering? Social engineering is a tactic used by attackers to manipulate people into giving away sensitive informati ...

The Risks of Downloading Files or Clicking Unknown Links

Beware of Unsolicited Links: Links in unexpected emails or messages could lead to malicious websites. Avoid Free or Unverified Downloads: Download software and fil ...

How Do I Encrypt My Device or Specific Files?

For Windows Users (Device Encryption) Check if Device Encryption is Enabled: Go to Settings > Update & Security > Device Encryption. If it says On, encryption is ...

How to Set Up MFA for Your Accounts

For Windows Users Enable MFA for Microsoft Accounts: Go to Microsoft Account Security. Click Advanced Security Options. Under Two-Step Verification, click Turn On and fol ...

Common Signs of Phishing Emails and Messages

Generic Greetings: Messages addressed to “Dear Customer” or “User” instead of your name. Urgent Requests: Phrases like “Your account ...

Awareness of Ransomware Threats

1. What Ransomware Is and How It Spreads What is Ransomware? Ransomware is a type of malicious software (malware) that locks or encrypts your files, making them inaccessible. ...

What MFA Is and Why It’s Essential

What is MFA? Multi-Factor Authentication (MFA) adds an extra layer of security by requiring two or more verification methods to access your account. Factors include: Somethi ...

How to Verify Links and Sender Authenticity

Hover Over Links: Place your mouse over the link (without clicking) to see the actual URL in the bottom-left corner of your browser. Visit the Website Directly: In ...

How to Recognize Secure Websites (e.g., HTTPS and Padlock Icon)

Look for the Padlock Icon: In your browser’s address bar, check for a padlock icon. Clicking the padlock shows security certificate details. Check the URL: ...

How to Create Strong, Secure Passwords

For Both Windows and Mac Users Use a Long Password: Aim for at least 12–16 characters. The longer the password, the harder it is to guess. Include a Mix of Ch ...

Using Private/Incognito Mode for Sensitive Browsing

What is Private/Incognito Mode? A browser mode that doesn’t save your browsing history, cookies, or login information after you close the session. For Windows Users (Ch ...

Why You Should Use a Password Manager

or Both Windows and Mac Users Understand Password Managers: A password manager stores all your passwords securely in one place, so you only need to remember one master pass ...

Avoiding Password Reuse Across Accounts

For Both Windows and Mac Users Understand the Risks of Password Reuse: If one account is compromised, attackers can use the same password to access other accounts. Example ...

What to Do If You Receive a Suspicious Email

Do Not Click Links or Open Attachments: Avoid interacting with the email until you verify its authenticity. Verify the Sender: Check the sender’s email addre ...