No items in your cart
No items in your cart
Daily tips to create awareness of cyber threats and empower Total Defense users to be safer and more secure online.
It’s a good idea to have a separate email account just for mailing lists. That way, you lower the risk of getting offers in your inbox that are actually attempts at phishing. Keep one account just for emailing trusted friends, family members and contacts, and another for everything else.
AirDrop is a convenient way to transfer files between iOS and/or macOS devices that are close to one another. It doesn’t even require an internet connection or any cables. However, it can also leave your devices open to spam. Limit sharing permissions to Contacts Only or Receiving Off to remove this risk.
By default, purchases of new website domains publish your name and mailing address in a publicly searchable database. This can lead to unwanted spam. Fortunately, you can usually pay a small annual fee to keep your registration information private.
Sometimes when you visit specific sites, you’ll see a warning from your web browser that the site isn’t safe or that its security certificate has expired. Google will sometimes include a textual warning on risky search results, too. These notices should be heeded. Stay away from potentially compromised sites to keep your data safe.
Packages that incorporate both antivirus and anti-spyware capabilities together are now available like our Total Defense Premium product. If you decide to choose separate programs, you only need one antivirus program and one anti-spyware program. Installing more programs increases your risk for problems.
Disabling AutoRun and AutoPlay features prevents external media infected with malicious code from automatically running on your computer.
You don’t want a system crash to destroy all of your important documents and photos. Maintain redundant backups of your data across different media types. Use cloud-based backup as well as external HDDs or even DVDs and thumb drives.
When you buy software digitally, there’s always a license agreement that you have to accept to complete the purchase. You don’t really have a choice if you want to use the software, but it’s worth looking at key details; for example, search for the word “sold” to determine if the product is merely being licensed and not sold to you, meaning it could be taken away at any time.
Do not post information that would make you vulnerable, such as your address or information about your schedule or routine. If your connections post information about you, make sure the combined information is not more than you would be comfortable with strangers knowing. Also be considerate when posting information, including photos, about your connections.
There are a lot of options for browsing the web. A good rule of thumb is to stick with major web browsers that are regularly updated with critical security patches and other features. Mozilla Firefox, Apple Safari, Google Chrome, Microsoft Edge and Opera are all good options in this respect.
Chances are you use at least one device that runs either iOS or Android. To protect your data and identity, set up two-factor authentication so that every login attempt requires an additional credential on top of your username and password. This might be a text message code or an approval from another trusted device.
Default options on certain websites may be chosen for convenience, not for security. For example, avoid allowing a website to remember your password. If your password is stored, your profile and any account information you have provided on that site is readily available if an attacker gains access to your computer. Also, evaluate your settings on websites used for social networking. The nature of those sites is to share information, but you can restrict access to limit who can see what.
When you delete something on your computer hard drive, it’s not really gone, just inaccessible through the normal user interface. To really get rid of it, you’ll need specialized software that overwrites the deleted data multiple times. Alternatively, keeping your old drives in storage instead of throwing or giving them away will also lower your risk of identity theft.
Most kids don’t bully, and there’s no reason for anyone to put up with it. If your child sees cyberbullying happening to someone else, encourage him or her to try to stop it by telling the bully to stop and by not engaging or forwarding anything. Researchers say that bullying usually stops pretty quickly when peers intervene on behalf of the victim. One way to help stop bullying online is to report it to the site or network where you see it.
Some websites and applications allow or even require special characters – like < and ! – in passwords. If you have the option to include them, do so, since their presence makes the password more difficult to guess than if it only contained alphanumerics.
Set up individual accounts that allow only the access and permissions needed by each user. When you need to grant daily use accounts administrative permissions, do so only temporarily. This precaution reduces the impact of poor choices, such as clicking on phishing emails or visiting malicious websites.
Not to be confused with the closing salutation at the end of an email, an electronic (or digital) signature proves that a message hasn’t been tampered with. It’s the digital equivalent of a wax seal on an envelope. Some email providers like Outlook have built-in signature capabilities, and there are also third-party tools like Chrome extensions that serve the same purpose.
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.