Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Featured


How to add and use an authenticator app

A basic rule for keeping your accounts secure is to use a different password for all of them. This is so if someone gains access to one of your passwords, they won’t have the master key to all of your private information. However, remembering all of your passwords is nearly impossible, especially keeping in mind […]

Videoconference best practices: Protecting your privacy while maintaining professionalism

If you worked in an office before the pandemic, there’s a good chance that you’ve been working remotely at least part time since March 2020. Looking ahead, the end of the pandemic does not necessarily mean an end to remote work. In fact, 16% of employees will continue to work from home even after it […]

Top cyber threats facing consumers: Personal cybersecurity tips

In July 2020, insurance company HSB released findings from a survey about consumer cyber threats. According to the results, 34% of respondents said they had experienced a cyber attack, with the most common incident cited being a malware or virus infection. While the threat landscape is broad, encouraging results from the survey indicated that consumers […]

How to spot business email compromise and avoid the threat while working from home

In August 2020, the United States Department of Justice announced that a citizen from Ghana had been extradited to the U.S. in connection with a coordinated fraud scheme responsible for hundreds of thousands of dollars in losses. At the center of the allegations was a business email compromise (BEC) attack targeting a Memphis real estate […]

Best practices for Office 365 security

As businesses shifted to accommodate the needs of their newly remote workforces following the COVID-19 pandemic, scammers took note. In order to exploit the uncertainty surrounding the rapid deployment of new software and security solutions, they engaged in deceptive phishing attacks. Targeting Office 365 credentials TechRadar reported on one such attack that encouraged recipients to […]