Our how-to guides offer a helping hand for common computer security tasks and to help you do more with our software tools.
Given the prevalence of remote work and the fact that it’s likely here to stay, extend security measures to employees’ home environments and ensure that such measures are clearly understood. Specifically, provide guidelines on securing home networks, using virtual private networks (VPNs), and implementing physical security measures for remote work setups. A security-conscious remote work […]
Mobile devices have gradually surpassed PCs as the primary computing platforms for many consumers. The gap between the two didn’t even start to narrow until 2010, a few years after the first major smartphone – the original iPhone – hit the market. This growing reliance on phones and tablets means that malware has increasingly targeted […]
Artificial intelligence (AI) is certainly nothing new. Computers’ ability to mimic human thought and learn from experience is a science that’s been around practically since the dawn of computing. Of course, AI has come a long way since its inception. Whether you embrace, resist or even fear it, AI is a natural part of everyone’s […]
Have you ever been emailed by a crown prince? Received a text message from someone claiming to be your friend? Won a contest you never entered? If so, chances are you came up close and personal with an online scam called phishing. Communications like these sound too good to be true — and most of […]
From banking to messages, your mobile device contains a plethora of important — oftentimes sensitive — information, making it a target for cybercriminals. These criminals will leverage gaps in mobile security to gain unauthorized access, resulting in both professional and personal consequences. Fortunately, there are steps you can take to fortify your mobile devices, such […]
These days, you can’t throw a stone without hitting a device that’s connected to the web. The internet of things (IoT) is a global network of technologies that uses internet connections to transmit and receive data. It’s fundamentally changed the way we work and live. We employ this technology in all places, from the office […]
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.opentext.com/about/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.