Daily tips to create awareness of cyber threats and empower Total Defense users to be safer and more secure online.
This might seem obvious, but you may be surprised at how many people stick their login credentials to their monitors at work. This can potentially give access to anyone if you so much as step away from your workstation for a few minutes. If the bad actor doesn’t sit down at your desk directly, they might set it up so they have remote access to your workstation later.
Be wary of app permissions that don’t seem appropriate. If an app wants access to the information in your email accounts, for example, it may be trying to steal personal data. It can be tricky to know for sure if an app permission request is legitimate or not, so err on the side of caution if you’re not sure.
Lots of the latest smart TVs include automatic content recognition (ACR), which studies everything you view on the device – whether it’s streamed over the internet, cable, or via broadcast television – and uploads this information to a server for use in a recommendation engine. To guard your privacy, turn off this setting; its name varies by model, so simply search for ACR (TV brand) for instructions to deactivate it.
Apple and Google try to keep their app stores clean of malware, but that doesn’t mean it isn’t there. Don’t download any apps that seem suspicious, and check the user reviews to make sure everyone’s experience with the app has been safe. Getting rid of bad apps on your smartphone can be exceedingly difficult once they’re in, as they’ll take root in your phone quickly, potentially causing your data to be stolen or damaged.
Free trials are great ways to learn about an antivirus suite’s features before purchasing it. However, you shouldn’t count on a trial version to keep you safe – it’s meant to be a purchase aide, not a comprehensive defense against malware. Be sure you upgrade to a full version to stay safeguarded.
Due to their small size and potential to fall out of your pocket, flash drives are common objects of theft. Encryption and a password can help to keep the data within the drive safe.
It’s long been thought that the more complicated a password, the harder it is for hackers. This once maybe once was true — but not any longer. As decryption and other hacker techniques become more advanced, it’s also becoming easier to guess shorter passwords. By adding additional characters, you’re adding millions of additional possibilities for hackers to have to sort through. So add an extra phrase to the end of your passwords.
There’s a common practice of sending direct mail disguised as courts summons or other official documentation, to make a reply more likely. Many phishing emails can take basically the same approach, only in digital form. That is, they might use all-caps subject lines (e.g., “URGENT:”) to make it seem like action is required. It isn’t. Institutions like banks or government agencies often use conventional mail for some communications, or structure their emails carefully to avoid scare tactics, often with a level of personalization that’s missing from mass phishing emails. If in doubt, do not engage.
There’s always a chance someone’s trying to catch the financial information you send out. While it’s bad if they get your credit card number, it’s potentially even worse if they have your debit card information. If money is withdrawn from your debit account by a bad actor, there’s probably no getting it back, so avoid using debit cards online altogether.
Virtual private networks (VPNs) are helpful security tools that encrypt your internet connection, hiding it from prying eyes. This strong protection is beneficial if you ever need to use public Wi-Fi. Think of your connection as a car and the VPN as a secure parking garage. Continuing the metaphor, the latter protects you from having to park on a busy street where the vehicle could be dinged or even stolen.
Hard drives can fail without many, if any, warning signs. To prevent losing important data, frequently back up your data to a cloud service and/or another storage drive. Backing up your data is important, but only if it’s being backed up correctly. If the backups fail, you won’t be able to retrieve your documents. Test that your backups are working every so often by retrieving and opening a file. This way, if you get attacked by malware or ransomware, you will know that your files are stored safely.
Phishers often drive would-be victims to domains they misleadingly claim are legitimate sites, such as a bank’s web app or an identity verification landing page, requiring you act quickly. You can preempt this line of attack by keeping all your most important sites saved as bookmarks in your web browsers. These bookmarks can provide a safe fallback in the unlikely situation that you really do need to do something for your bank or to verify an address.
Cybercriminals can potentially access the feeds from your webcam and microphone without your permission. Turn both of these off when you’re not using them, or even better, disconnect them entirely.
Also, if you work from home and need to join conference video calls for work, think about keeping your private home protected by using background blur or wallpaper features. An iteration of these are included in most video call programs and apps, but if you come across one that doesn’t have an option to obscure your surroundings, position yourself strategically to have as blank a background as possible. Face your camera away from walls with family photos or a view of the interior of your home.
Antivirus software is not enough by itself, Windows’ built-in antivirus is just competent, paid security suites offer much more than antivirus protection. They can also:
These are just some of the common features in advanced internet security suites.
Restricting the number of people who have access to contact information or details about interests, habits, or employment lessens exposure to bullies that you or your child do not know. This may limit the risk of becoming a target and may make it easier to identify the bully if you or your children are harassed.
We can also begin to take steps to improve our own behavior and experiences online by:
Although antivirus software cannot prevent cyberbullying, Total Defense offers parental controls that can help your family protect against online bullying. Check out our Security blog or contact us to speak with our support team.
It’s a good idea to use PayPal for online transactions to prevent the seller from seeing your financial information. Another reason to use PayPal is that their team will help protect you if the transaction goes bad. If you receive the wrong item, a defective item, or there’s a billing issue and the other party won’t cooperate with you, PayPal has an internal team that can help you resolve disputes with sellers.
No company will ever, under any circumstances, ask you for your password via email. Any email asking you to provide your password is a phishing scam. If you ever need to enter your password, always type the URL of the company’s site directly into the hyperlink bar to be sure the site is genuine.
Also disregard emails or messages that create a sense of urgency and command you to respond to a crisis, such as a problem with your taxes or bank account. These Imposter Scams happen when you receive an email apparently from a government official, family member, or friend urgently requesting that you wire them money to pay taxes or fees, or to help someone you care about. Cybercriminals use legitimate-looking emails that encourage people to send them money or personal information.
Install software updates so that attackers cannot take advantage of known problems or vulnerabilities. Many browsers like Firefox, Google Chrome and Microsoft Edge offer automatic updates. If this option is available, you should permit it.
Your web browser is your principal connection to the Internet, and multiple applications may rely on your browser, or parts within your browser, to function. Web applications try to improve your browsing, but this might be needless and may leave you vulnerable to being attacked. The best approach is to adopt the highest level of security and only enable features when needed. If you decide that a site is trustworthy, you can choose to enable the feature temporarily and then disable it once you are done visiting the site.
While you can opt for the convenience of having no security checks before logging into Windows, this leaves you vulnerable to anyone else walking up to the machine and looking at your data. This can be especially problematic if you live with other people who don’t need to see what’s on your computer. Adding a PIN to your Windows account is a simple way to add a layer of security without being too much of an inconvenience. Right-click the Start menu and navigate to Settings > Accounts > Sign-In Options to configure a PIN.
The best practice when making accounts online is to have different passwords that change frequently for separate accounts. How can you be expected to remember them all? You aren’t if you use a password manager. These apps let you use one master password to access all of your login information in one place. This lets you make strong passwords for individual accounts that you aren’t expected to remember. Just make sure your master password is extra secure.
While you can pay for things directly using a credit card or other payment method, these transactions require inputting financial information, whereas gift cards only require single-use codes. As an added bonus, digital gift cards for things like the PlayStation Store or Nintendo eShop commonly go on sale at online retailers for less than their actual value.
Social media is a blessing and a curse. It assists you in stay on touch with others but can also leak a lot of data and increase your vulnerability to breaches. Accordingly, remove any old accounts you don’t need to reduce risk.
Also try not to post information on social networks that might make you vulnerable, such as your address or information about your schedule or routine. If your social connections post information about you, make sure the combined information is not more than you would be comfortable with strangers knowing. Also be considerate when posting information, including photos, about your own social contacts.
If you live in an area with a dense population, you’ll want to be sure there aren’t any bad actors sapping the speed of your Wi-Fi. Virtually all routers can tell you what connections are being used at any given time. Check your router’s configuration page to make sure that only approved users are using your Wi-Fi. If you see a suspicious connection and can’t verify it, you might want to change your Wi-Fi’s security settings.
Over time, your PC will make a whole lot of junk files that can take up quite a bit of space. Every now and then you’ll want to clean out your storage drive to not only free that space up, but also get rid of certain types of files, such as trackers, that you may not want on your PC for privacy or security reasons. Windows has a limited cleanup feature built in that you can use; Total Defense PC Tune-up has advanced features for optimizing your PC. You should stay clear of free apps you can download off the web, you never know if what you’re downloading is reputable and not a malicious app itself.
To stop outsiders from simply accessing your network, avoid broadcasting your SSID. All Wi-Fi routers allow users to shield their device’s SSID, which makes it more difficult for attackers to locate a network. At the very least, alter your SSID to something unique. Leaving it as the manufacturer’s default could allow a possible attacker to identify the type of router and possibly exploit any known vulnerabilities.
Many people are probably familiar with the Block function on Twitter and other social media services, which will prevent another user from seeing or commenting on anything you post. But what if you just don’t want to see the other person’s posts and don’t mind them seeing or commenting on yours? This is what the Mute function is for, which will hide everything the other user posts, including comments, though they’ll still be able to see anything you write. You’ll find it right next to the Block feature.
Ostensibly, user account control (UAC) is a feature automatically enabled in Windows that is designed to protect your system from any unwanted changes by notifying you every time an application or service wants to alter your system. In theory, this might sound helpful, but in practice, it’s not very useful due to the sheer number of notifications you’ll get while making legitimate changes. You’ll quickly become desensitized to the notifications and automatically click to proceed, defeating the purpose of the checks. You can disable or change the frequency of UAC notifications by using the Windows search feature and typing in “user account control.” Change the slider to fit your preference of when you want it to notify you so you only get an alert when it really matters.
Wi-Fi connections are inherently unstable and vulnerable to bad actors. Wired connections avoid these issues. Powerline adapters, which are extremely simple to set up, turn a long-range Wi-Fi connection into a wired one by using your home’s electrical network. This makes it much more stable and less vulnerable but with the same if not better range and strength. You don’t need to broadcast your network’s name or even use a Wi-Fi signal at all if you’re using these.
An uninterruptible power supply (UPS) is like a surge protector with a battery backup. If you experience a power interruption, devices connected to the UPS will stay powered on as long as the battery lasts. This gives you a chance to save your work and shut your devices down properly to prevent data loss. They are invaluable if you ever work from home, as they can prevent you from losing potentially large amounts of work because of a power interruption.
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.