Simple best practices with REDARC

Aus3C's Premium Member, REDARC, has shared some simple how-to's that are great best practices to put in place:

Lock Your Computer

A simple yet effective practice is to lock your computer when you step away from it. This guards your data and device from prying eyes or potential threats. Whether you're at home or in a public place, making this a habit is a smart move.

  • Quickly lock your computer by pressing Win + L.

  • Configure your computer to lock automatically when you move away from it. You can achieve this by pairing your smartphone with your computer via Bluetooth. Then, enable the setting "Allow Windows to automatically lock your device when you're away" under Start > Settings > Accounts > Sign-in options > Dynamic Lock. When you move out of Bluetooth range with your phone, your computer will lock automatically after a minute or so.

Embrace Biometrics

Passwords and passphrases can become cumbersome, especially when they're complex. Windows Hello offers a convenient alternative by enabling biometrics.

  • Enable Biometrics by going to Start > Settings > Accounts > Sign-in options, and select Windows Hello Fingerprint/Face.

Use Windows Sandbox

Sometimes, you may come across a program or attachment that raises doubts about its safety. In such cases, you can create a secure environment by using "Windows Sandbox" to run it. Once you're done, everything within the sandbox is wiped clean, leaving no traces.

  • To install the Windows Sandbox feature, click on the Start button and search for "Turn Windows Features on or off" to access the Windows Optional Features tool. Select Windows Sandbox and confirm with OK. If prompted, restart your computer. After the reboot, you can access Windows Sandbox from the Start Menu.

Please keep in mind that while everything inside the sandbox is deleted upon exit, the sandbox environment does have network access. This means it can potentially leave artifacts outside the sandbox that aren't erased. Therefore, it's important to understand the limitations before using this feature and take precautions like disabling the network in the sandbox when necessary.

Previous
Previous

3 Simple Actions

Next
Next

8 Steps to Smartphone Cyber Safety