Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Security & Privacy

Information about potential threats to your personal and financial security covering desktops, laptops, and mobile devices.


What to do in case of a data breach

Between 2013 and 2016, Yahoo was targeted by Russian cybercriminals to obtain private user information. This included names, email addresses, phone numbers, passwords and answers to security questions. Three billionusers were affected, making it the worst data breach in history. Data breaches are common, and nearly everyone has been affected by at least one (and […]

Disable Bluetooth when it’s not being used

Bluetooth can be an exceptionally useful wireless technology when connecting a range of devices including earbuds, microphones or personal vehicles. However, leaving Bluetooth on all the time, especially if you frequent public areas, can be a security risk. Turn it off when you’re not using it, and only turn it back on if you’re sure […]

Comparing the security of popular browsers: Which is best at protecting your privacy?

Privacy is a big selling point for many internet users. Many rightfully worry that they’re being identified and tracked online. In the age after the Cambridge Analytica scandal, it’s become obvious that many companies want as much of your personal data as they can get their hands on. In response, virtually every browser has extensive […]

Biometrics: Which popular phone has the best security?

Biometrics have come a very long way since the original smartphones. As a welcome alternative to constantly typing in your PIN or password every time you want to unlock the phone, biometrics are both convenient and secure. So how do the newest phones handle biometric security? Let’s compare a few to see how each stacks […]

Why you need cloud backup in addition to an external hard drive

During the 1990s, most PCs were notorious for making lots of noise whenever performing a CPU-intensive task like updating a spreadsheet, loading a video game or opening a busy webpage. Some of these sounds were related to the reading of media formats that have since become less important, such as floppy disks and CD-ROMs. Today’s […]

3 things to do when your passwords are compromised

You’ve probably heard about them on the news at some point or another. Something along the lines of, “Data breach at healthcare company! Thousands of users’ personal data possibly compromised!” Maybe you were even a client of that healthcare company, and you weren’t sure if you had been affected. Or perhaps you were just notified […]