Our how-to guides offer a helping hand for common computer security tasks and to help you do more with our software tools.
With the COVID-19 pandemic apparently nearing its end in the U.S., more people are returning to in-person work. That means more people are applying for jobs, submitting applications left and right, looking for the right fit. In most cases, job applications require a plethora of personal information when being filled out, including addresses, work history, […]
If someone gets hold of your phone, tablet or computer, and there’s no lock screen, the thief suddenly has access to everything on your device. While some of your apps will require passwords and multifactor authentication, many apps, like your photos and notes, typically do not. Also, if you don’t log out of your social […]
The Federal Trade Commission (FTC) is warning consumers to be wary of phishing scams related to COVID-19. With the vaccine rollout well underway, scammers have taken the opportunity to contact people claiming to have vaccine information or even miracle cures in an attempt to obtain sensitive information from them. Others go a different route, pretending […]
A basic rule for keeping your accounts secure is to use a different password for all of them. This is so if someone gains access to one of your passwords, they won’t have the master key to all of your private information. However, remembering all of your passwords is nearly impossible, especially keeping in mind […]
If you worked in an office before the pandemic, there’s a good chance that you’ve been working remotely at least part time since March 2020. Looking ahead, the end of the pandemic does not necessarily mean an end to remote work. In fact, 16% of employees will continue to work from home even after it […]
In August 2020, the United States Department of Justice announced that a citizen from Ghana had been extradited to the U.S. in connection with a coordinated fraud scheme responsible for hundreds of thousands of dollars in losses. At the center of the allegations was a business email compromise (BEC) attack targeting a Memphis real estate […]
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.