Our how-to guides offer a helping hand for common computer security tasks and to help you do more with our software tools.
If someone gets hold of your phone, tablet or computer, and there’s no lock screen, the thief suddenly has access to everything on your device. While some of your apps will require passwords and multifactor authentication, many apps, like your photos and notes, typically do not. Also, if you don’t log out of your social […]
The Federal Trade Commission (FTC) is warning consumers to be wary of phishing scams related to COVID-19. With the vaccine rollout well underway, scammers have taken the opportunity to contact people claiming to have vaccine information or even miracle cures in an attempt to obtain sensitive information from them. Others go a different route, pretending […]
A basic rule for keeping your accounts secure is to use a different password for all of them. This is so if someone gains access to one of your passwords, they won’t have the master key to all of your private information. However, remembering all of your passwords is nearly impossible, especially keeping in mind […]
If you worked in an office before the pandemic, there’s a good chance that you’ve been working remotely at least part time since March 2020. Looking ahead, the end of the pandemic does not necessarily mean an end to remote work. In fact, 16% of employees will continue to work from home even after it […]
In August 2020, the United States Department of Justice announced that a citizen from Ghana had been extradited to the U.S. in connection with a coordinated fraud scheme responsible for hundreds of thousands of dollars in losses. At the center of the allegations was a business email compromise (BEC) attack targeting a Memphis real estate […]
Many recruiters now consider personal data posted online when evaluating a candidate for a job. In fact, according to CareerBuilder, 70% of employers will inspect an applicant’s social media profiles before hiring them. As information you share on the internet becomes increasingly accessible to others, what steps are you taking to manage your online brand? […]
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.