No items in your cart
No items in your cart
Information about potential threats to your personal and financial security covering desktops, laptops, and mobile devices.
Each October is National Cybersecurity Awareness Month (NCSAM) in the U.S., an occasion to become more knowledgeable about security best practices. For NCSAM 2019, the themes are personal accountability and proactivity. Even a strong password is not necessarily enough to protect your accounts from unauthorized access. The National Initiative for Cybersecurity Careers and Studies (NICCS), […]
Imagine being locked out of your home. Now think about someone being inside and telling you that could regain access to it, without any of your belongings being harmed, if you simply paid a fine. It’s not a situation you would ever want to be in, but it’s one that many small and midsize businesses […]
Android is the most popular consumer computing platform in the world, used across billions of phones, tablets, smart TVs and other connected devices. However, its popularity and distinctive structure – under which carriers and manufacturers may heavily modify it – make it a magnet for cyberattacks. As an Android user, what can you do to […]
Passwords are a pain. Not only do they need to be sufficiently complex to thwart a potential attacker’s brute-force guessing, they must also be memorable enough that you don’t end up having to request a reset each time you forget your login. The most common DIY solution to this problem is to simply recycle the […]
“Going on a big #trip for two weeks! Hello #Cancun” might seem like something cool to post to your social media feeds, but in reality it opens you up to some real risks. Broadcasting the fact that you won’t be home for a specific amount of time could increase the chances of someone vandalizing your […]
Ransomware is not new – it dates back to the 1980s – but it has undergone a renaissance throughout the 2010s, to the extent that it looks almost nothing like it did in its early days. Perpetrators have enhanced various strains with strong encryption (CryptoLocker), designed them to exploit protocols such as Microsoft Windows SMB […]
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.