Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Family Safety

Online safety resources to help teach parents and kids what they can do to protect themselves in today’s digital environment


Back to School- Basic Laptop Protection for Teens and Tweens

It’s that time again. The back-to-school season is more than just a busy transition period marked by new classes and purchases of notebooks and ink pens. It’s also one of the biggest tech upgrade cycles of the year, as students buy tablets and laptops for schoolwork and swap out their old phones for the latest […]

5 things you might not have known about web browser security

The web browser was the internet’s first breakthrough app. Although internet connectivity had existed in limited form since late 1960s…

Beyond Facebook – How targeted advertising works across the web

At some point when using a web browser, you’ve probably had the following experience: You look something up in a search engine and click a few links to product pages, review sites, etc. You then navigate to another website, like Facebook or someone’s blog, seemingly unrelated to that previous search. There, you notice specific advertisements […]

National Missing Children’s Day 2018

May 25th is National Missing Children’s Day in the USA, it’s dedicated to encouraging parents, guardians, caregivers, and others concerned with the well-being of children to make child safety a priority. It serves as a reminder to continue efforts to reunite missing children with their families. President Ronald Reagan proclaimed May 25, 1983, the first […]

4 Ways to make your social media passwords more secure

Social media passwords are not usually well-managed. How can you ensure that they’re as strong as possible?

Understanding app permissions and how they affect your data

You’ve probably seen it before, if only for a brief moment while installing an app or trying to use one of its video or photo features for the first time: a list of permissions the program wants from your device. Depending on the application, you may be asked to approve its access to your contacts, […]