No items in your cart
No items in your cart
Daily tips to create awareness of cyber threats and empower Total Defense users to be safer and more secure online.
Hotel business centers, libraries, and cyber cafes provide computers that anyone can use. However, travelers cannot trust that these computers are secure. They may not be running the latest operating systems or have updated anti-virus software. Cyber criminals may have infected these machines with malicious viruses or install malicious software.
One of the side stories of a 2018 international summit in Singapore was the provision of USB-powered fans to members of the media. Such peripherals can be dangerous. They might carry malware that can hijack connected devices. Never plug in a peripheral that you don’t trust or that comes from an unknown vendor.
Smart TVs have built-in internet connectivity that allows you to stream video and purchase content like movies, TV shows and songs. Like an Echo, this functionality can be unknowingly misused by kids. Establishing a child lock – basically just a PIN that needs to be entered to unlock the device or make any purchases – provides peace of mind.
Smart home devices have begun to take off with the popularity of the Amazon Echo in particular. One of the defining features of the Echo is the ability to order specific items from Amazon Prime with just a voice command. However, you might want to turn off it to make sure your child doesn’t erroneously order anything.
When you browse the Internet, information about your computer may be collected and stored. This information might be general information about your computer (such as IP address, the domain you used to connect (e.g., .edu, .com, .net), and the type of browser you used). It might also be more specific information about your browsing habits (such as the last time you visited a particular web site or your personal preferences for viewing that site).
Individuals receive an on-screen pop-up message claiming a virus has been found on their computer. In order to receive assistance, the message requests the victim call a phone number associated with the fraudulent tech support company. Individuals who receive a pop-up or locked screen, should shut down the device immediately. Ignore any pop-ups instructing to not power off or restart the computer. Do not give unknown, unverified persons remote access to devices or accounts. Ensure all computer anti-virus, security, and malware protection is up to date.
When you do have Bluetooth enabled, make sure it is “hidden,” not “discoverable.” The hidden mode prevents other Bluetooth devices from recognizing your device. This does not prevent you from using your Bluetooth devices together. You can “pair” devices so that they can find each other even if they are in hidden mode. Although the devices (for example, a mobile phone and a headset) will need to be in discoverable mode to initially locate each other, once they are “paired” they will always recognize each other without needing to rediscover the connection.
August 11, 2003: Blaster Worm (also known as Lovsan, Lovesan or MSBlast) is a computer worm that spread on computers running operating systems Windows XP and Windows 2000, during August 2003. The worm was first noticed and started spreading on August 11, 2003. The rate that it spread increased until the number of infections peaked on August 13, 2003. Once a network (such as a company or university) was infected, it spread quicker within the network because firewalls typically did not prevent internal machines from using a certain port. Filtering by ISPs and widespread publicity about the worm curbed the spread of Blaster.
Because pop-up windows are often a product of spyware, clicking on the window may install spyware software on your computer. To close the pop-up window, click on the “X” icon in the titlebar instead of a “close” link within the window.
You might occasionally send sensitive emails containing words and/or attachments intended only for a specific person. To prevent these items from being copied or forwarded, you can take advantage of features in Gmail and Outlook that encrypt your messages and ensure they are of no use to anyone other than original intended recipient.
If you want to make sure your child doesn’t spend all day in front of a screen watching YouTube videos, you have the ability to limit their access. There are both hardware and software options that restrict the total time he or she can be online in addition to filtering specified content, freeing you from the need to actively police internet use.
It’s never a good idea to leave your Wi-Fi network open, since it can then be accessed by anyone in range. Make sure a password is required and that the network is encrypted by WPA2 – not by either the original WPA or WEP, both of which are outdated and have known exploits.
If you or your children are being harassed or threatened, report the activity. Many schools have instituted bullying programs, so school officials may have established policies for dealing with activity that involves students. If necessary, contact your local law enforcement. Law enforcement agencies have different policies, but your local police department or FBI branch are good starting points. Unfortunately, there is a distinction between free speech and punishable offenses, but the law enforcement officials and the prosecutors should decide the legal implications.
Not all internet-connected devices carry the same level of cybersecurity risk; Internet of Things (IoT) endpoints are often more exposed than PCs or smartphones. You can minimize your overall risk by isolating IoT traffic onto its own network segment. Check if your router allows you to set up the VLANs necessary for segmentation.
Be a responsible and considerate user. Some people consider email forwards a type of spam, so be selective with the messages you redistribute. Don’t forward every message to everyone in your address book, and if recipients ask that you not forward messages to them, respect their requests.
Today’s automatic filters are pretty good at keeping spam out of your inbox. However, they don’t catch everything, meaning the occasional oddball message will still slip through. Good news: You can protect your account with advanced filters configured for specific addresses and domains. Gmail, Yahoo and other major mail providers all include these features.
The Internet is a public resource – post only information you are comfortable with anyone seeing. This includes information and photos in your profile and in blogs and other forums. Also, once you post information online, you can’t retract it. Even if you remove the information from a site, saved or cached versions may still exist on other people’s machines. So please review it before posting.
Depending on the time of year, spam messages account for between 50 and 60 percent of all email traffic. In addition to containing potentially dangerous content, at that volume they can also easily eat up your entire inbox capacity. Instead of waiting the normal 30 days for automatic deletion, consider manually mass-deleting them each day to ensure you have sufficient space.
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.