Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Security Tip of the Day

Daily tips to create awareness of cyber threats and empower Total Defense users to be safer and more secure online with our security tips and resources..


April 2024
04.19.24

Social media savvy–sharing safely in a digital world

Social media is a fantastic way to connect with friends and family, but it’s important to be mindful of what you share online. Just like leaving your house unlocked, oversharing personal information can leave you vulnerable. Here’s how to be a social media smartie and keep your information private:

  • Think Before You Share: Not everything needs to be posted publicly! Consider if the information you’re sharing is truly necessary and how it might be perceived in the future.
  • Privacy Settings to the Rescue: Most social media platforms allow you to adjust your privacy settings. Use them to control who sees your posts and limit access to your profile information.
  • Beware of Strangers: Be cautious about adding people you don’t know to your social media circles. They might not be who they seem.

What kind of information should you keep private?

  • Personal Details: This includes your full name, address, phone number, and birthday. These details can be used for identity theft.
  • Location Sharing: Geotagging your posts or sharing your location in real-time can be a safety risk.
  • Financial Information: Never share your bank account details, credit card numbers, or other financial information on social media.

Why is social media privacy important?

  • Safeguards Your Identity: Oversharing personal information makes you a target for identity theft.
  • Protects Your Safety: Sharing too much location information can be a safety hazard, especially if you’re letting people know you’re away from home.
  • Maintains Control: You deserve control over your online presence. Being mindful of what you share helps you project a professional and responsible image.

Sharing online is easy, but take a moment to think before you post. Keep your personal information private and enjoy the social side of the web safely!

04.18.24

Don’t let your router be a security hole–update your firmware

Your internet router silently works in the background, but keeping its software up-to-date is crucial for online safety. Here’s why you should update your router’s firmware regularly:

  • Outdated Firmware = Security Risk: Just like any device, routers have software called firmware. Outdated firmware can have security vulnerabilities that hackers can exploit.
  • Patching the Holes: Firmware updates often include security patches that fix these vulnerabilities, making it harder for hackers to break in.
  • Improved Performance: Sometimes, updates can even improve your router’s performance, giving you a faster and more stable internet connection.

Updating Your Router Firmware: Easier Than You Think

Updating your router might sound complicated, but it’s usually a simple process:

  1. Find Your Router’s IP Address: Look for a sticker on your router with its IP address, typically a number like 192.168.1.1.
  2. Open Your Web Browser: Type the IP address into your web browser’s address bar and press enter. This will log you in to your router’s settings page.
  3. Check for Updates: Look for a section on firmware or updates. If an update is available, follow the on-screen instructions to download and install it.

Updating your router’s firmware takes just a few minutes but can significantly improve your online security. Make it a habit to check for updates regularly!

04.17.24

Ransomware strikes–back up regularly and fight back

Ransomware is like a digital kidnapper, holding your files hostage until you pay a ransom. The worst part? Paying doesn’t guarantee getting your data back! Here’s how regular backups can be your weapon against ransomware:

  • Your Backup, Your Safety Net: Regularly backing up your data creates copies of your files. If ransomware strikes, you can restore your files from your backup, avoiding the whole ransom mess.
  • Local or Cloud, You Decide: Backups can be stored locally on an external hard drive or remotely in the cloud. Choose the option that best suits your needs.
  • Peace of Mind Power: Knowing your data is safe and recoverable gives you peace of mind. No more panicking if you fall victim to ransomware.

How Often Should You Back Up?

The frequency depends on how important your data is and how often it changes. For critical files, consider daily backups. For less important data, weekly backups might suffice.

Backups are your best defense against ransomware. Set up a backup system today and enjoy the security of knowing your data is always protected.

04.16.24

Sharing your computer–keep files safe with user accounts

Letting your child use your computer can be fun, but it’s also important to protect your files. Here’s how separate user accounts can be your digital security blanket:

  • Separate Accounts, Separate Worlds: Most operating systems allow creating different user accounts. This gives your child their own space without access to your files.
  • Limited Access, More Control: Each account can have different permission levels. This lets you limit what your child can do, like installing programs or changing settings.
  • Guarding Your Files: With separate accounts, your child can’t accidentally (or purposefully!) delete or modify your important files.

But what if you don’t use separate accounts?

Here are some extra security tips:

  • Security Settings on Lock: Review your security settings and limit functionality within your account. This might involve restricting downloads or website access.
  • No Saved Passwords: Avoid letting your browser remember passwords or other personal information. This keeps sensitive data out of reach.
  • Virus Protection Up-to-Date: Always keep your antivirus software updated to protect your computer from malware, even if you share it.

A few minutes setting up separate accounts or adjusting security settings can save you a lot of headaches later. Keep your files safe and share your computer with confidence!

04.15.24

Double up your security with two-factor authentication (2FA)

Remember the scramble to enable 2FA on your gaming account to snag sweet rewards? Well, 2FA is actually a superhero for all your online accounts, not just video games! Here’s why you should seriously consider enabling it wherever possible:

Two-Factor Authentication: Your Extra Login Layer

Think of 2FA as a security guard for your accounts. Even if someone stumbles upon your password, they’ll still need an extra code to log in. This code can be sent to your phone via text message or generated by a special app, making it much harder for hackers to break in.

Why is 2FA so Powerful?

  • Blocks Hackers with Stolen Passwords: Data breaches happen, and hackers might try stolen passwords on other accounts. 2FA stops them even if they have your password.
  • Protects Your Data: From emails and social media to financial accounts, 2FA safeguards your valuable online information.
  • Gives You Peace of Mind: Knowing your accounts have an extra layer of security gives you peace of mind and lets you browse with confidence.

Where to Find 2FA?

Many online services, from email providers to social media platforms and banks, offer 2FA as an option. Look for settings related to “security” or “two-factor authentication” and follow the easy setup instructions.

Enabling 2FA might take a few extra seconds, but it’s a small price to pay for a significant security boost. Take control and protect your accounts today!

04.14.24

Free VPNs – are they worth the risk?

Virtual Private Networks (VPNs) are like online security suits of armor, encrypting your internet activity and keeping your data private. But here’s the thing: free VPNs might not be the shining knights you imagine.

The Shady Side of Free VPNs:

  • Logged Activity: Free VPNs might still track your online activity, keeping logs of what you do online. This data could then be sold to third parties, potentially compromising your privacy.
  • Limited Protection: Free VPNs often have limitations, like slower speeds or data caps. This can hinder your online experience.
  • Security Concerns: Some free VPNs might even inject ads into your browsing or expose you to malware. Yikes!

The Onavo Example:

Remember Onavo VPN? This free app, once owned by Facebook, was recently removed from the App Store for allegedly collecting excessive user data. This highlights the potential risks of free VPNs.

Why Choose a Paid VPN?

  • True Encryption: Reliable paid VPNs encrypt your data, making it unreadable even on public Wi-Fi.
  • Stronger Security: Paid VPNs offer better protection against malware, tracking, and data leaks.
  • Faster Speeds & More Data: Paid VPNs typically provide faster connection speeds and higher data allowances for worry-free browsing.

When it comes to online security, a little investment can go a long way. Consider a reputable paid VPN for robust protection and true peace of mind.

04.13.24

Free Wi-Fi: friend or foe–stay safe on public hotspots

Public Wi-Fi sounds great, but hold on – these connections can be like open windows – anyone might be peeking in on your online activity. Here’s how to be a Wi-Fi pro and protect yourself on public networks:

  • Public Wi-Fi = Limited Activity: Avoid logging in to important accounts like email or banking while on public Wi-Fi. These networks are unsecure, and your information could be vulnerable.
  • Think Before You Download: Downloading files on public Wi-Fi can be risky. Malicious files might hide amongst the seemingly harmless ones.
  • VPNs: Your Security Shield: Consider using a Virtual Private Network (VPN). A VPN encrypts your data, making it unreadable even on public Wi-Fi.
  • Mobile Hotspot Hero: If you have a data plan, creating a mobile hotspot with your phone can provide a more secure connection on the go.

Why is Wi-Fi caution important?

  • Data Snatchers: Hackers can lurk on public Wi-Fi networks, stealing your login details or other sensitive information.
  • Malware Magnet: Downloading files on unsecured networks can expose your device to malware.
  • Account Takeover Risk: Logging into important accounts on public Wi-Fi puts your data at risk.

Public Wi-Fi can be convenient but prioritize security. Limit your activity, use a VPN when possible, or create a mobile hotspot if needed.

04.12.24

Don’t get clickbaited–stay safe with smart link checking

Ever come across a link that seems too good to be true? Clicking suspicious links online can lead you to dangerous websites filled with malware or scams. Here’s how to be a web-savvy surfer and avoid these hidden traps:

  • Hover Before You Click: Most browsers show the link’s destination URL when you hover your mouse over it. Take a moment to see where the link actually leads before you click.
  • Copy and Paste for Safety: On touchscreens, clicking and holding a link often brings up a menu. Choose “copy” to paste the link into a separate document. This lets you inspect the URL safely before visiting the site.
  • Beware of Shortened Links: Links shortened with services like bit.ly can hide the real website address. Avoid clicking on shortened links unless you trust the source.

Why is link caution important?

  • Dodging Malware: Malicious websites can infect your device with malware that steals information or damages your files. Checking links helps you avoid these dangers.
  • Avoiding Phishing Scams: Phishing emails or messages often contain links to fake websites designed to steal your login details. Being cautious with links protects your accounts.
  • Wasting Your Time: Many clickbait links lead to useless websites filled with ads. Checking links beforehand saves you time and frustration.

A few seconds spent checking a link can save you a lot of trouble down the road. Don’t let curiosity get the best of you – be smart and check before you click!

04.11.24

Think before you share: keeping your personal life private online

We’ve all gotten excited and wanted to share something online but hold on a sec! The internet is like a giant digital scrapbook, and once something’s out there, it can be hard to erase. Here’s how to be a smart sharer and keep your personal life, well, personal:

  • Be Wary of Oversharing: Ask yourself, “Does this post really need to be public?” Sharing your home address, birthday, or even your vacation plans in real-time can be risky.
  • Consider the Future: Think about how a post might look in a few years, especially for job applications or college admissions. Would you want it seen by potential employers or schools?
  • Identity Theft Threat: The more information you share online, the easier it is for someone to steal your identity. Keep personal details like your Social Security number or bank account info strictly offline.

Imagine the internet as your neighborhood:

You wouldn’t shout your address to everyone on the street, would you? The same goes for online!

Here’s why online privacy matters:

  • Protects Your Identity: Oversharing personal information makes you more vulnerable to identity theft.
  • Maintains Safety: Sharing too much location information can be a safety risk, especially if you’re letting people know you’re away from home.
  • Builds Trustworthiness: Being mindful of what you share online can help you project a professional and responsible image.

Remember: A little caution goes a long way in protecting your privacy online. Think twice before you hit post, and if you’re unsure, it’s always better to err on the side of caution.

04.10.24

Don’t be a password repeat offender

We all love the convenience of sticking with the same password for everything. Data breaches happen all the time, and if one site gets hacked, your password for other accounts could be at risk. Here’s how to be a password pro and keep your online life safe:

  • Strong Passwords are Your Best Defense: Ditch the birthdays and pet names! Use a password generator to create strong, unique passwords for each account. Think long, random combinations of letters, numbers, and symbols.
  • Don’t Be a Creature of Habit: Resist the urge to reuse passwords across different websites. If one site gets hacked, hackers might try your login info on other accounts too!
  • Rotate Regularly: Think of it as a password refresh! Update your passwords periodically, ideally every six months. This way, even if an old password gets exposed, your accounts are still secure.

But creating and remembering tons of passwords is a hassle, right?

Not anymore! Many password managers can help you generate and store strong, unique passwords for all your accounts. These tools can even remember them for you, so you don’t have to.

Here’s why password hygiene matters:

  • Reduces Hacking Risk: Strong, unique passwords make it much harder for hackers to break into your accounts.
  • Protects Your Data: From emails to financial information, your online accounts hold valuable data. Strong passwords keep it safe.
  • Gives You Peace of Mind: Knowing your accounts are secure gives you peace of mind and lets you browse the web with confidence.

Taking a few minutes to create strong passwords and rotate them regularly can significantly boost your online security. So, ditch the password recycling and become a password pro today!

04.09.24

Spot the safe sites–understanding website certificates

Ever notice a little padlock next to a website address? Or maybe a URL that starts with “https” instead of “http”? These are clues that a website takes security seriously and protects your information.

Here’s the deal: secure websites use encryption, a fancy way of scrambling your data so only the website can read it. This is especially important when you submit personal information like passwords or credit card details.

So, how do you know a website is secure? Look for these two signs:

  • The Padlock Symbol: Most browsers display a closed padlock icon next to the address bar for secure websites. The exact location might vary, but it’s usually near the URL.
  • The HTTPS URL: Secure websites use a web address that starts with “https” instead of just “http.” The “S” stands for “secure” and means your information is encrypted.

Why are these signs important?

  • Stops Phishing Attacks: Fake websites designed to steal your information often lack proper certificates. Spotting the padlock or HTTPS helps you avoid these traps.
  • Protects Your Data: Encryption keeps your information safe when you enter it on a secure website. No prying eyes can intercept it!

Before entering personal information online, check for the padlock and HTTPS. These simple signs can make a big difference in protecting your data and keeping you safe online.

04.08.24

Protecting yourself from man-in-the-middle attacks

Ever used public Wi-Fi? It’s convenient, but it can also be a target for “man-in-the-middle attacks.” Imagine a sneaky eavesdropper lurking between you and the website you’re trying to access. They could steal your information without you even realizing it!

Here’s how these attacks work:

  • Public Wi-Fi Danger Zone: Free Wi-Fi at coffee shops or airports can be risky. Hackers can exploit these unsecure connections to intercept your data.
  • Fake Websites: The attacker might redirect you to a website that looks real but is actually a trap. Once you enter your login details, they’ve got them!

So, how can you stay safe?

  • Look for HTTPS: When entering personal information on a website, check the address bar. It should display “HTTPS” instead of just “HTTP.” The “S” means the connection is encrypted, making it harder for eavesdroppers to steal your data.
  • Use a VPN: Think of a VPN as a secure tunnel for your internet traffic. It encrypts your data, making it unreadable even on public Wi-Fi.
  • Be Wary of Public Downloads: Avoid downloading files from untrusted sources, especially on public Wi-Fi. These downloads might contain malware that steals your information.

By being cautious and using the right tools, you can protect yourself from man-in-the-middle attacks and keep your data safe online.

04.07.24

Your phone’s PIN–don’t make it easy to crack

We all know locking our phones is important, but a weak PIN is like leaving your front door wide open. Those simple PINs like “123456” or repeating numbers are easy to guess, especially for someone who knows you. So, how do you create a strong PIN that keeps your phone secure?

Think Strong, Not Simple:

  • Mix it Up: Combine numbers, letters, and even symbols to create a PIN that’s harder to crack. Imagine a PIN like “Th1s1sStr0ng!” – much stronger than just numbers, right?
  • Avoid Personal Info: Don’t use your birthday, anniversary, or pet’s name. Hackers can sometimes find this info online.
  • Make it Long Enough: Most phones allow longer PINs now. Use the maximum number of digits allowed for extra security.

Here’s why a strong PIN matters:

  • Blocks Hackers: A complex PIN makes it much harder for someone to guess their way into your phone, even with automated hacking tools.
  • Protects Your Data: Your phone likely holds personal information, photos, and financial details. A strong PIN keeps them safe.
  • Prevents Identity Theft: Hackers can use your phone to access other accounts if they get in. A strong PIN is your first line of defense.

A few extra seconds creating a strong PIN is worth it for the peace of mind knowing your phone and your data are secure.

04.06.24

Skip the sideload–stay safe with official App Stores on Android

Android offers a world of apps, but sometimes, you might stumble upon an app that isn’t available in the Google Play Store. It might be a game a friend recommends or a productivity tool you saw on a website. Here’s the thing: installing these apps, also known as “sideloading,” can be risky for your device.

Why is sideloading risky?

Unlike apps in the Play Store, sideloaded apps don’t go through Google’s security checks. This means they could be hiding malware, viruses, or other nasty surprises. These hidden threats can steal your data, damage your phone, or even take control of it!

Here’s how sideloading exposes you to danger:

  • Hidden Malware: Imagine a sideloaded app is like a mystery box. You never know what lurks inside. It could be malware that steals your passwords or bombards you with ads.
  • Security Flaws: Without official vetting, sideloaded apps might have security holes that hackers can exploit. These holes can allow them to access your personal information or wreak havoc on your device.
  • No Automatic Updates: Official app stores deliver important updates that fix security vulnerabilities. Sideloaded apps miss out on these updates, leaving your phone exposed to known threats.

So, how do you stay safe?

Simple, stick to downloading apps from the Google Play Store. Google scans these apps for security issues and keeps them updated, offering a safer experience.

While sideloaded apps might seem tempting, the risks are high. Play it safe and stick to the official app store for your Android device.

04.05.24

Reused passwords–your iPhone can help you spot the risk

We all know the importance of strong, unique passwords. But let’s be honest, remembering them all can be a struggle. Luckily, iPhones with iOS come with a built-in password manager to help you out.

This handy tool not only stores your logins but also helps you identify potential security risks. Here’s what to watch out for:

  1. Open “Settings” on your iPhone.
  2. Tap on “Passwords & Accounts”.
  3. Here, you’ll see a list of all your saved logins. Keep an eye out for entries with an exclamation mark (!) next to them.

Uh oh, exclamation mark! What does it mean?

That exclamation mark is a warning sign. It means the password you’re using for this website or app is also being used for another login stored on your iPhone. This is a big security risk!

Why are reused passwords bad?

Imagine a hacker stumbles upon your password for one website. If you’ve reused that same password elsewhere, they can easily try it on other accounts, increasing your chances of getting hacked.

So, what should you do if you see an exclamation mark?

Here’s your action plan:

  1. Change your password! Tap on the login with the exclamation mark and select “Change Password” to create a strong, unique password for that specific account.
  2. Consider a password manager: If managing multiple passwords feels overwhelming, explore free or paid password manager apps that can generate and store unique passwords for all your accounts.

By avoiding reused passwords and using strong, unique ones, you significantly strengthen your online security.

04.04.24

Silence the spam: filter unknown iMessages on iPhone

Feeling overwhelmed by random texts on your iPhone? iMessages can be a great way to connect, but they can also be a gateway for unwanted messages. Luckily, iPhones with iMessage have a built-in feature to silence the spam: filtering unknown senders.

This handy tool helps keep your inbox clutter-free and protects you from potential scams and harassment. Here’s how to activate it:

  1. Grab your iPhone and open “Settings”.
  2. Scroll down and tap on “Messages”.
  3. Look for the “Messages Filtering” section.
  4. Toggle on “Filter Unknown Senders”.

Now, iMessages from people not in your Contacts will be automatically filtered into a separate message list. You can still access and review these messages if needed, but they won’t clutter your main inbox.

Here’s why this is a great security tip:

  • Reduces Phishing Risk: Phishing messages often come from unknown numbers, trying to trick you into clicking malicious links or revealing personal information. Filtering helps keep them out of sight.
  • Cuts Down on Harassment: Spam texts and unwanted messages can be annoying and even scary. Filtering unknown senders helps minimize these disruptions.
  • Keeps Your Inbox Organized: No more scrolling through endless messages from unknown numbers! Your inbox stays clean and focused on your important conversations.

Filtering unknown senders is a great first step, but it’s not foolproof. Always be cautious with any message, even from known contacts, and never click on suspicious links or share personal information without verifying the sender.

04.03.24

Double up your defense: activate two-factor authentication for Instagram

Love sharing your life on Instagram? Awesome! But with great online fun comes great online responsibility. Adding an extra layer of security to your account is key, and that’s where two-factor authentication (2FA) comes in.

Think of 2FA as a security guard for your Instagram account. It requires an additional code on top of your password when you log in. This extra step makes it much harder for anyone to hack into your account, even if they steal your password.

Here’s how to activate your Instagram security guard:

  1. Open the Instagram app and tap your profile picture in the bottom right corner.
  2. Go to “Settings”.
  3. Tap on “Security”.
  4. Look for “Two-Factor Authentication”.
  5. There, you can choose how you want to receive the extra code:
    • Text Message (SMS): This sends the code to your phone number. Easy, but not the most secure option.
    • Authentication App: This is the more secure choice. Download a free app like Google Authenticator or Authy, and it will generate unique codes for your Instagram logins.

Once you choose your method, follow the on-screen instructions to complete the setup.

04.02.24

iPhone backups – don’t forget the password lock

Backing up your iPhone is crucial. But what if someone gets their hands on that backup? Luckily, iPhones with iTunes or Finder backups offer a hidden gem: encryption!

Think of encryption as a fancy password lock for your backup. It scrambles your data, making it unreadable without the password. This means even if someone finds your backup, they can’t access your photos, messages, or other personal info.

Here’s how to activate this secret weapon:

  1. Connect your iPhone to your Mac.
  2. Open Finder (or iTunes on older Macs).
  3. Locate your iPhone on the left sidebar.
  4. Click on the “General” tab.
  5. Look for the “Backups” section.
  6. There should be an option to “Encrypt iPhone backup.” Check that box!
  7. Set a strong password. This is your key to unlocking the backup later. Don’t forget it!

Encryption takes extra time, but the security boost is worth it. Plus, you only need to set it up once.

04.01.24

Download with caution: guarding against spyware ️

We’ve all been there. You stumble upon a website offering a free program that seems like a dream come true. Maybe it’s a fancy photo editor with tons of filters, or a spellchecker that promises to write error-free emails. These tempting downloads can sometimes be hiding a nasty surprise: spyware.

Spyware is sneaky software that installs itself on your computer without your knowledge. Once it’s in, it can steal all sorts of personal information, like your browsing history, login credentials, and even financial details. But don’t panic, there are ways to protect yourself. Here are some key tips:

  • Be Source Savvy: Don’t download software from websites you wouldn’t trust with your grandma’s secret cookie recipe. Stick to official sites from reputable companies you recognize.
  • Read the Permission Slip: Before clicking “download,” take a close look at what the program wants access to. Does it need things that seem suspicious? For example, if a simple music player wants access to your camera, that’s a red flag.
  • Think Before You “Free”: Remember, if something seems too good to be true, it probably is. Free software might come with a hidden cost: your privacy! If the offer sounds fishy, skip it.

Here are some bonus spyware tips:

  • Update Regularly: Just like your phone, your computer software needs updates to stay secure. These updates often patch vulnerabilities that spyware could exploit.
  • Befriend Firewalls: Your computer’s firewall acts like a security guard, monitoring incoming and outgoing traffic. Make sure it’s turned on and set to block suspicious activity.
  • Consider Security Software with Anti-Spyware: Think of security software as a bodyguard for your computer. It can help detect and block spyware before it has a chance to steal your information.

By following these cybersecurity tips, you can download with confidence and keep your computer safe from sneaky spyware. Remember, a little caution goes a long way in protecting your privacy online!