Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

How-to Guides

Our how-to guides offer a helping hand for common computer security tasks and to help you do more with our software tools.


The importance of having a lock screen on your device

If someone gets hold of your phone, tablet or computer, and there’s no lock screen, the thief suddenly has access to everything on your device. While some of your apps will require passwords and multifactor authentication, many apps, like your photos and notes, typically do not. Also, if you don’t log out of your social […]

How to protect yourself from phishing scams related to COVID-19

The Federal Trade Commission (FTC) is warning consumers to be wary of phishing scams related to COVID-19. With the vaccine rollout well underway, scammers have taken the opportunity to contact people claiming to have vaccine information or even miracle cures in an attempt to obtain sensitive information from them. Others go a different route, pretending […]

How to add and use an authenticator app

A basic rule for keeping your accounts secure is to use a different password for all of them. This is so if someone gains access to one of your passwords, they won’t have the master key to all of your private information. However, remembering all of your passwords is nearly impossible, especially keeping in mind […]

Videoconference best practices: Protecting your privacy while maintaining professionalism

If you worked in an office before the pandemic, there’s a good chance that you’ve been working remotely at least part time since March 2020. Looking ahead, the end of the pandemic does not necessarily mean an end to remote work. In fact, 16% of employees will continue to work from home even after it […]

How to spot business email compromise and avoid the threat while working from home

In August 2020, the United States Department of Justice announced that a citizen from Ghana had been extradited to the U.S. in connection with a coordinated fraud scheme responsible for hundreds of thousands of dollars in losses. At the center of the allegations was a business email compromise (BEC) attack targeting a Memphis real estate […]

Tips for young professionals: Maintaining a strong online reputation

Many recruiters now consider personal data posted online when evaluating a candidate for a job. In fact, according to CareerBuilder, 70% of employers will inspect an applicant’s social media profiles before hiring them.  As information you share on the internet becomes increasingly accessible to others, what steps are you taking to manage your online brand? […]