Daily tips to create awareness of cyber threats and empower Total Defense users to be safer and more secure online with our security tips and resources..
Take a look at your inbox. How many emails did you get today from mailing lists, newsletters, and retailers? If you’re like most people, your answer is probably “too many.”
We accumulate these subscriptions easily—maybe you downloaded a free e-book, or you got a 10% discount for signing up. Some email newsletters can be useful if they’re relevant to your interests, providing regular, valuable updates. But many of them just eat up a lot of space in your inbox and, more importantly, put you at an unnecessary risk.
It’s time to realize that digital clutter isn’t just annoying; it’s a security vulnerability. We need to stop passively deleting and start actively unsubscribing.
Your massive inbox is a hacker’s best friend. Here is how keeping irrelevant newsletters actively puts your security at risk:
The number one way attackers trick you is by making a fake email look legitimate. If you receive thirty different emails every day from real retailers and services, you train your brain to quickly skim and trust the sender name.
When a sophisticated phishing attack lands in your inbox—claiming to be Netflix or Amazon and asking you to “verify your account”—it blends right in with the noise. The sheer volume of legitimate-looking, but ultimately irrelevant, emails you receive provides perfect cover for the malicious ones.
Every email contains links, and every link raises the possibility you’ll click through to a page that’s trying to capture information about you. If you’re stressed, rushing on your mobile phone, or deleting emails quickly, the chance of clicking the wrong link increases dramatically.
By eliminating the noise, you reduce the number of potential targets in your inbox, automatically lowering the odds of making that one devastating mistake.
Did you sign up for a newsletter from a small, local business five years ago and haven’t opened it since? That email address is sitting on their server. Small businesses often have weaker security than large corporations. If that irrelevant list gets hacked, your email address—and potentially your name—is compromised and sold on the dark web, making you a target for future, more serious attacks.
The rule is simple: If a newsletter isn’t useful to you, go through and unsubscribe from it.
Clean up your inbox today. You’ll gain peace of mind, reduce mental clutter, and most importantly, starve the phishing scams of the camouflage they need to succeed.
The internet is an incredible library, but let’s be honest: it’s also a minefield. As a parent, you want your kids to be able to research their homework or satisfy their curiosity about dinosaurs without stumbling onto content that is violent, explicit, or just plain scary.
You can’t hover over their shoulder every single second, but you can give them a safer tool to explore with. That tool is Kiddle.
If your children are starting to explore the web, tell them to use Kiddle instead of a standard search engine. It’s a simple, active switch that creates a much more secure environment for young digital explorers.
Kiddle isn’t just a “filtered” version of Google; it’s a search engine built specifically for a child’s brain and safety needs.
Technically, Kiddle is powered by Google’s Safe Search technology, but it adds crucial layers of human moderation on top of that. This means the powerful algorithms that filter out bad content are working overtime, ensuring that the results your child sees are clean.
One of the best features of Kiddle is how it organizes its search results. It doesn’t just show “safe” links; it prioritizes “readable” ones.
This structure ensures your child isn’t just safe, but they are actually finding information they can understand and use for their school projects.
Kiddle uses large thumbnails (pictures) next to search results and a large Arial font. This makes it easier for younger children to scan the page and find what they are looking for without getting overwhelmed by walls of tiny text.
Perhaps the most important security feature for parents is Kiddle’s privacy policy. Unlike major search engines that build detailed profiles on their users to sell ads, Kiddle does not collect any personally identifiable information.
Furthermore, they have a strict data retention policy: logs are automatically erased every 24 hours.
This means your child’s curiosity doesn’t become a data point for advertisers. They can search for “how to build a treehouse” or “funny cat videos” without that information following them around the internet for the next decade.
Make Kiddle the homepage on your family computer or tablet today. It’s the easiest way to give your kids the freedom to learn while giving yourself peace of mind.
We all love Venmo. It’s the digital wallet that makes splitting dinner bills, paying the dog sitter, or sending birthday cash incredibly fast and easy. But that speed works both ways. Just as quickly as you can send money to a friend, a cybercriminal who gains access to your account can drain your balance or link a stolen bank account.
In the world of digital finance, speed is your best defense. The faster you know about a transaction, the faster you can stop fraud in its tracks. That is why you need to take an active step right now: Enable push notifications on your Venmo account.
Imagine this scenario: A hacker guesses your password or phishes your login credentials. They log in quietly at 3:00 AM. They send your entire Venmo balance to a fake account. If you rely solely on email notifications—which often get buried in spam folders or ignored for hours—you might not realize the money is gone until you wake up the next morning or check your balance days later. By then, the money is often unrecoverable.
If you enable push notifications, that story changes completely. You will be notified whenever there is a transaction, instantly. Your phone buzzes the second money moves. If you are sitting on your couch watching a movie and your phone lights up with “You paid $500 to [Stranger’s Name],” you know immediately that something is wrong.
Having these alerts in place is like having a security guard watching your wallet 24/7. You will be alerted immediately when there is fraudulent activity on your account—even if Venmo’s internal automated systems don’t immediately recognize it as fraud.
This real-time awareness allows you to:
Don’t assume these are on by default. You need to verify your settings manually to ensure you are getting the alerts that matter.
To enable push notifications on Venmo:
Take two minutes to do this today. It is a simple, active setting that transforms your phone into a real-time security monitor for your money.
We get it—there is a lot to love about Firefox. For many of us, it’s the rebel of the browser world. People flock to it because it feels faster, it offers incredible customization options, and it champions the use of open-source web technologies. Unlike some of the tech giants that seem designed primarily to harvest your data, Firefox feels like it’s actually on your side.
However, just because Firefox respects your privacy more than others doesn’t mean you can set it and forget it. If you prefer to use Firefox as your daily driver, you still need to take extra precautions to ensure your digital footprint remains small.
The browser still stores a record of where you’ve been, what you’ve searched for, and the images you’ve viewed. This “history” is convenient when you want to find that recipe from last Tuesday, but it’s a liability if your computer is lost, stolen, or shared with others.
It is time to take an active role in your browser hygiene. Make sure that your privacy is protected by routinely deleting your search history.
It’s not just about hiding your holiday gift shopping from a snooping spouse. Your browser history is a map of your life. It contains:
By regularly clearing this data, you are essentially shredding your digital paper trail.
Fortunately, Firefox makes this process incredibly straightforward. You don’t need to be a coder to wipe the slate clean.
To manually clear your history, follow these simple steps:
If you know you aren’t going to remember to do this every week, let Firefox do it for you. In that same Privacy & Security section, under History, change the setting from “Remember history” to “Use custom settings for history.”
Check the box that says “Clear history when Firefox closes.” Now, every time you quit the browser, Firefox will automatically shred your history, cookies, and cache. It’s the ultimate peace of mind for the privacy-conscious user.
Enjoy the speed and freedom of Firefox, but keep it clean!
We all deal with email attachments every day. Whether it’s an invoice from a contractor, photos from a family member, or a project file from a colleague, clicking “download” is second nature. But among the harmless documents and images, there’s a file type that security experts urge you to handle with extreme caution: the .zip file.
A .zip file is like a digital suitcase—it packs multiple files into one smaller, convenient package. But just like a real suitcase, you can’t see what’s inside until you open it. This “blind spot” makes it a favorite tool for cybercriminals.
Hackers know that most email services scan attachments for viruses. However, malicious code hidden inside a .zip file (especially if the zip file is password-protected) is much harder for automated scanners to detect. This allows malware, ransomware, and spyware to sneak past your email’s defenses and land right in your inbox.
Once you double-click that zip file to see what’s inside, you might inadvertently run a script that infects your computer.
While some attachments are unavoidable, you can significantly reduce your risk by following a few active rules:
If you absolutely must open a zip file, ensure your antivirus software is active and up to date. Right-click the file and select “Scan for viruses” before you try to open it.
It only takes one bad click to compromise your personal data. Treat every .zip file with a healthy dose of suspicion, and when in doubt, ask for a cloud link!
We love our smart speakers. They play our favorite playlists, tell us the weather, and settle dinner table debates with a quick fact-check. But have you ever looked over at your Echo device and noticed that tell-tale blue ring spinning silently, even though nobody said the “A-word”?
It’s a little spooky, right?
Your Alexa device is designed to be helpful, but it isn’t perfect. It is constantly listening for its “wake word” (usually “Alexa,” “Echo,” or “Computer”). The problem is that human speech is messy. If you accidentally say a word that sounds similar to the wake word—like “election,” “a letter,” or “unacceptable”—your device might wake up and start recording.
When this happens, the consequences can range from mildly annoying to genuinely invasive.
When your device wakes up accidentally, it doesn’t just sit there; it acts.
Usually, Alexa is polite enough to respond when spoken to. It might ask for clarification (“I didn’t quite get that”) or make a chime sound. However, if you keep your device volume turned down low, you lose your primary security alert.
If you are in another room, watching a loud movie, or deep in conversation with friends, you might not hear the quiet mumble of a low-volume Alexa responding to a false wake word. The device is active, listening, and potentially acting, and you are completely oblivious.
The fix is surprisingly analog: Turn up the volume on your Alexa device.
Think of the volume not just as a way to hear music, but as an auditory security notification system. You want that volume set high enough that if the device activates across the room—or even in the next room—you will hear it respond.
If you hear Alexa start talking out of nowhere, you can immediately shout, “Alexa, stop!” preventing it from recording further, sending a message, or buying that accidental item.
For even more security, go into your Alexa app settings and enable “Start of Request” sounds.
This forces the device to make a distinct “bing” sound the moment it hears the wake word, giving you an instant heads-up that it is listening, even before it speaks a response.
Don’t let your smart home keep secrets from you. Turn up the volume and keep your ears open!
Let’s be honest, most popular web browsers aren’t built to protect your privacy; they’re built to collect your data. When you use a standard browser, you are constantly being tracked, profiled, and bombarded with targeted ads. Incognito mode is a nice start, but it doesn’t hide your activity from your internet provider, employer, or the websites you visit.
If you want real, always-on protection while searching and browsing the web, it’s time to switch to a tool designed with privacy as its primary goal: the Epic Privacy Browser.
Epic isn’t just another browser with a few privacy settings tacked on. It’s built from the ground up on the Chromium platform (the same engine that powers Google Chrome), but with all Google’s tracking code and data-collection features ripped out.
When you open Epic, you are entering a secure digital environment where privacy is the default, not an option you have to dig through menus to find.
The best part? This level of security is completely free and easy to use. You don’t need to be a tech expert to set it up.
Epic Privacy Browser is available for all your major devices: Apple (macOS and iOS), Windows, and Android.
epicbrowser.com.Take control of your online life. Stop letting companies profit from your private data and start browsing with a tool that actually works for you.
Let’s be real: looking at your bank statement isn’t exactly everyone’s idea of a fun Friday night. It’s usually a reminder of how much we spent on takeout or that subscription we promised to cancel three months ago. But in a world where online shopping, mobile payments, and digital banking are the new normal, ignoring that list of transactions is a dangerous game.
Recent events have shifted how we spend money. We are swiping, tapping, and clicking “Buy Now” more than ever before. While this convenience is amazing, it creates a chaotic stream of data that makes it incredibly easy for fraudsters to hide in plain sight.
It is more important than ever to keep a hawk-eye on your financial accounts. You need to become the active guardian of your own wallet.
You might assume that if a hacker got your credit card info, they would immediately go buy a sports car or a first-class ticket to Paris. But modern cybercriminals are smarter than that. They know that a $5,000 charge triggers immediate alarm bells at the bank.
Instead, they often start small. They run “test charges”—sometimes for as little as $0.99 or $2.00—to see if the card is active and if you are paying attention. If you ignore that tiny charge because you assume it’s just a vending machine snack or a forgotten app fee, you give them the green light. Once they know you aren’t watching, they hit you with the big charges later, or sell your “verified” card details on the dark web.
If you are waiting for a physical envelope to arrive in the mail once a month to check your spending, you are reacting too slowly. By the time you spot a fraudulent charge on a paper statement, the damage could already be done, and the window to easily dispute the transaction might be closing.
You need to get digital to fight digital crime.
If you spot something wrong, don’t hesitate. Call your bank or credit card issuer immediately using the number on the back of your card. The faster you act, the easier it is to freeze the card, reverse the charge, and secure your money.
Make checking your statements a regular habit—think of it as a quick weekly “date” with your finances. It protects your bank balance and gives you peace of mind!
Your Alexa device is a modern convenience—you can check the weather, play your favorite songs, and yes, even order household items just by speaking a command. That last part, however, gives anyone in your home, including guests, children, or roommates, the power to easily buy something with your stored credit card.
Imagine your kid blurts out, “Alexa, order one hundred pounds of bananas!” Or a houseguest jokes, “Alexa, buy a yacht!” Without a protective measure in place, you could find a very surprising, and expensive, package waiting for you at the door.
If you have voice purchasing enabled, you must take an active security step right now: set up a PIN that you also have to say along with your purchase request.
When voice purchasing is enabled without a security layer, any voice—no matter who speaks it—can authorize a transaction using your Amazon account and linked payment method. This creates a massive hole in your financial security.
A Voice Purchasing PIN (or Voice Code) adds a critical second step to the process. Instead of simply saying, “Alexa, buy paper towels,” you would have to say something like, “Alexa, buy paper towels, using PIN one-two-three-four.”
The benefits are immediate:
Setting up the Voice Purchasing PIN is an option within your Amazon account settings, accessible through the Alexa mobile app.
While the PIN is an excellent security measure, it’s not foolproof. Because you are required to say the code aloud, anyone who happens to be nearby could overhear it. Therefore, it’s also best to ensure that no one is within earshot when you say your PIN to your device. If privacy is paramount, consider disabling voice purchasing altogether for items you don’t frequently reorder.
Take control of your smart speaker’s spending power. Set up your Voice Purchasing PIN today and secure your credit card against rogue commands!
We’ve talked before about how Google tracks your search history to build a detailed personal profile. While that personalization can be convenient, many people are rightly uncomfortable with the thought of a giant tech company monitoring every question they ask the internet.
If you’re ready to ditch the data-harvesting model and embrace truly private searching, you have great alternatives. But there’s one search engine that not only protects your privacy but also actively uses your searches to benefit the planet: Ecosia.
It’s time to take an active step toward securing your searches and making your clicks count for a cause.
Like most other private search engines, Ecosia is built on a simple promise: your search data belongs to you. This is a massive shift from the ad-driven model of the major players.
Here is Ecosia’s core privacy guarantee:
By switching to Ecosia, you immediately stop feeding your most private questions and concerns into a massive corporate data machine. This one simple change dramatically shrinks your digital footprint and enhances your overall privacy.
Ecosia doesn’t just offer security; it offers sustainability. The unique, added benefit of using Ecosia is that they operate with a powerful “green computing” angle. Ecosia is a certified B Corporation, meaning they balance purpose and profit, and they are committed to climate action.
You are not sacrificing anything to gain this benefit. Ecosia provides high-quality search results, often pulled from reputable sources, while providing peace of mind and contributing to global reforestation efforts.
Switching your default search engine is easy. Take a minute today to install Ecosia and start browsing securely and sustainably.
Imagine this nightmare: Your laptop crashes, your hard drive fails, or worse—it’s stolen. Now think about the precious data you just lost: years of irreplaceable family photos, critical tax documents, videos of milestone events, and essential work files. If all of that important data was stored solely on that one local system without a backup, it’s gone forever.
Relying on a single storage location is one of the biggest security mistakes you can make. It’s an open invitation to disaster. The best practice in data security is the Redundancy Rule: Maintain multiple copies of your important files across different, isolated locations.
A single local system—whether it’s your computer’s hard drive or even a single external drive—is always vulnerable to failure or disaster.
When all of your critical photos, videos, documents, and apps are in one place, a single point of failure means total, catastrophic data loss. You are putting all your digital eggs in one, very fragile basket.
You need to take an active role in creating a robust, multi-layered backup system. Experts recommend the 3-2-1 Backup Strategy:
Don’t wait for your hard drive to start clicking. Be proactive, create multiple copies of your essential data, and ensure your memories and documents are safe, no matter what happens to your device.
We all love getting the maximum lifespan out of our smartphones, tablets, and laptops. It saves money, and it’s better for the planet. But there is a point in every device’s life where clinging to it becomes a significant security risk: when the manufacturer stops sending updates.
Countless electronic devices are eventually abandoned by their makers, at least when it comes to regular security and operating system patches. When your trusted phone or laptop stops receiving those critical patches and upgrades, it is essentially frozen in time, leaving it vulnerable to new threats that hackers discover every single day.
If this happens to a device you rely on for banking, email, or work, it’s time to seriously consider upgrading to a newer version or an alternative that is still actively supported.
Think of a software update as a digital shield. Every time a major operating system (like iOS, Android, Windows, or macOS) releases a new patch, they are closing security holes that hackers have found or are actively exploiting.
When your device stops getting those updates:
Before you let your device become a security liability, take a moment to research its support status.
Don’t wait until a breach forces your hand. Be proactive, check your update status, and take control of your digital security by ensuring your hardware is running fully protected software.
LinkedIn is your professional showcase—it’s where you highlight your achievements, network with colleagues, and attract potential employers. The goal is visibility, but visibility comes with security risks. If your profile is too open, you could be giving away sensitive personal data that scammers, identity thieves, or stalkers can exploit.
While you want recruiters to find your experience, you definitely don’t want strangers finding your home address or private phone number. It’s time to actively edit your public LinkedIn profile to hide unnecessary personal data, like your ZIP code or contact information, ensuring your professional presence doesn’t compromise your personal safety.
LinkedIn lets you control what the public—meaning people you aren’t connected with and anyone who searches your name on Google—can see. The information you leave public can be easily harvested by cybercriminals:
Remember, your resume contains enough information for a job interview; your public LinkedIn profile should not contain enough information for someone to steal your identity.
Take control of your profile’s public visibility. LinkedIn makes it easy to decide exactly what information is visible to people outside your network.
Here is how you actively limit that personal information on your public profile:
Make any edits necessary and save. Regularly review this public profile view to ensure you are only sharing what is essential for your career and nothing more. Your professional networking shouldn’t come at the expense of your personal security.
That Google Nest speaker in your kitchen is an awesome assistant—it plays music, answers trivia questions, and sets timers perfectly. But for all its convenience, it is, first and foremost, a microphone constantly waiting for its wake word (“Hey Google” or “OK Google”).
While Google assures us that it only retains “relevant information” after a wake word is heard, we all know how easily those devices can be fooled. Words that sound close enough to the wake words can accidentally enable the device to start recording your conversations. These accidental triggers can capture sensitive snippets of private discussion, medical talk, or financial planning you never intended to share.
If you are serious about protecting your privacy, you need to take an active step: mute your Google Nest device when you are not expecting to use it.
Unlike complicated settings hidden in an app, Google built in a simple, physical defense against unwanted recording: the microphone button.
When you use the microphone button to mute the device, you aren’t just sending a software command—you are physically disconnecting the microphone circuitry. This provides a level of certainty that no software setting can match. When that orange or red light is on, you know with absolute confidence that the device cannot hear you.
Make muting your Nest speaker a part of your daily security routine. A few prime times to hit that button:
The process couldn’t be simpler:
Don’t leave your private conversations exposed to the risk of accidental recording. Take control of your home privacy and make that physical mute button your best friend!
Think about everything you’ve ever typed into the Google search bar over the years. We’re talking about everything: embarrassing symptoms, financial questions, personal research, and late-night curiosity. Every single one of those requests is recorded, indexed, and tied to your Google account.
Google saves this activity to personalize your experience—to give you faster results and better recommendations. But every single search you’ve run is a piece of data that contributes to your highly detailed digital profile. To preserve greater privacy and limit how much of your personal life is permanently stored online, you need to take an active step and remove your Google search history.
You might think, “So what if Google knows I searched for ‘best pasta recipes’?” But the full picture of your search history—especially when combined with your location data and YouTube history—can reveal deeply sensitive information:
If your Google account is ever compromised by a hacker, or if someone gains access to your logged-in computer, that massive archive of your personal thoughts is instantly exposed. Deleting this history acts as a data clean-up, eliminating unnecessary risk.
Fortunately, Google gives you the power to manage or delete this data through your My Activity dashboard. This page is the central hub for everything Google has recorded about you, not just searches.
myactivity.google.com. You will likely need to log in.If manually deleting your history feels like a chore, Google offers an Auto-Delete setting. You can choose to have your activity automatically and continuously deleted after a set time frame, such as 3, 18, or 36 months. This is a great way to set it and forget it, ensuring your digital footprint never grows too large.
Don’t let years of private searches sit unguarded in the cloud. Take an active step today to review, manage, and delete your Google search history to maintain your privacy.
You open your inbox and see a message that looks official: “Urgent Account Update Required,” “Verify Your Login Credentials,” or “Your Bank Account Has Been Frozen.” It looks like it came from your bank, your university, or even your workplace. The message demands that you click a link and “update your personal information immediately.”
Stop right there! This is one of the oldest, most effective scams in the book, known as phishing.
Here is the golden rule you must commit to memory: Most legitimate organizations—banks, universities, and reputable companies—will not request your personal, sensitive information over email. If an email asks you to click a link to update your Social Security number, credit card details, or password, it is almost certainly a malicious attempt to steal your identity.
Hackers use these urgent-sounding emails to trick you into disclosing personally identifiable information (PII). This data is the currency of cybercrime, and they are hunting for:
Once they collect this PII, they can commit financial crimes, open new lines of credit in your name, and completely compromise your identity.
When you receive a suspicious email, do not let panic or urgency force you into a mistake. Use this three-step defense:
Do not open attachments, do not click on links, and do not respond to email messages from unknown senders or companies that ask for your personal information. Even replying to say “Stop sending me emails” confirms your email address is active, making you a bigger target.
If you receive an email from “Bank of America” asking you to update your account, the correct procedure is not clicking the link in the email. Instead:
Even if the display name says “Amazon,” look closely at the sender’s actual email address. Phishing attempts often use highly suspicious or generic addresses (e.g., [email protected] or [email protected]). A real company will use a clean domain.
Take control of your inbox. Be skeptical of any digital request for your PII, and verify everything through official, separate channels.
Cyber Week is here! The deals are fantastic, the discounts are deep, and the urge to click Buy Now is powerful. But with this incredible rush comes a massive spike in scams, fake websites, and phishing attacks. Hackers are actively leveraging the chaos and urgency of the holiday shopping season.
You need to shift into defensive mode. Don’t let the stress of finding the perfect gift compromise your security. By following a few active steps, you can grab all the bargains without handing over your sensitive data to cyber-Grinches.
Before you ever enter your payment information, you must verify the site you’re on. Scammers are experts at creating “look-alike” websites that mimic major brands down to the logo and color scheme.
This is your single best defense. Before clicking anything, look closely at the URL in your browser’s address bar.
Always confirm that the website address begins with https:// and displays a closed padlock icon in the address bar. The ‘S’ means the connection is encrypted, protecting your payment data from interception. If you don’t see the padlock, close the tab immediately.
If you see the latest, hard-to-find gadget being sold for 70% off its normal price, trust your gut. Extreme, unrealistic bargains are bait used to lure you onto fraudulent sites that simply steal your payment information and disappear.
Once you’ve verified the website, you need to protect your financial credentials.
Enjoy the deals, but remember to shop smart. Make cyber safety your number one priority this Cyber Week!
Privacy /
Legal
Cookie Policy
Do Not Sell My Information
Copyright ©2025 Total Defense LLC. All Rights Reserved.
At Total Defense we take your privacy seriously. We recently made updates to our privacy policy to comply with the European Union’s General Data Privacy Regulation. This policy explains:
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.opentext.com/about/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.