Daily tips to create awareness of cyber threats and empower Total Defense users to be safer and more secure online.
When starting payments on your student loans, your payments will be handled by a provider. Identify what company is handling your student loans and follow instructions on how to set up your account. Student loan sites require sensitive information, like your Social Security number, address and your parents’ information. It’s important to make sure the website that you’re entering your information into is not only legitimate, but secure.
Laptops nowadays come standard with a webcam built in, which is certainly convenient but could pose a security risk since you never know if it’s completely turned off. Consider using an external webcam on your laptop, that way you can unplug it to make sure it’s off. As a bonus, external webcams tend to have a higher picture quality.
It’s very convenient to stay logged in to a website or app, but it creates some security risks. Attackers may be able to impersonate your session ID and hijack your account. When you’re finished, log out and use a password manager so it’s easy to log back in.
It’s become common for websites to allow you to sign in with your Google account instead of making a new account on the website itself. Not only does it save you time, but it can be a more secure option that doesn’t require you to re-enter your personal information. The fewer sites with your personal information on file, the less likely it is to be leaked.
Facebook harbors a trove of personal information about you and everyone else on the platform. If left unattended, your Facebook account could become a security risk. Between hackers and data breaches, you’re better off deleting your profile if it’s no longer in use. You also have the option to back up any photos or videos before doing so.
Unsubscribe buttons are useful for removing your email address from high-volume mailing lists, like those from political campaigns or big box stores. However, they can also be used against you by spammers. Clicking these buttons confirms your account is in active use and in some cases may redirect to you a malicious webpage. Tagging the message as spam might be safer.
Signing in with your Google or Facebook account can greatly speed up the sign in process for a lot of websites, or if you’re visiting for the first time, skip the sign up process entirely. It’s incredibly convenient to be able to sign in everywhere with these accounts, but also poses a security risk. Be sure to enable two factor authentication so that Google and Facebook know to double check your identity by sending a code to your email or phone.
Google now has a feature where it will ask if you’d like to generate a unique password when signing up on a website. If you opt to do so, Google will create a strong password for that site and remember it for you. Google essentially acts as a password manager. This feature should be enabled by default but in case it’s not, here’s how to enable it:
Strong passwords are among the best defenses against account hacking. Regularly changing them provides additional protection. If you receive a notification about a data breach affecting one of your accounts, that’s a good occasion to update all your passwords. It may be a good to also implement two-factor authentication on accounts if possible.
Being on a public WiFi network can pose all sorts of security risks, as you never know who else is connected. If you must use public WiFi, avoid using apps that contain any personal or financial information to mitigate the chance of it being stolen. If you need to access these apps while in public, think about setting up a VPN for safe browsing first.
Google will notify you both in Chrome via pop-up and through email when any of your saved passwords are compromised. Change them as quickly as possible to prevent personal information from being leaked. It’s worth noting that you have to change passwords on each individual site where they were compromised. Passwords are most easily compromised when the same one is used across multiple sites. Take the time to create unique passwords for each account you create and let Google save them for you so you don’t have to worry about remembering.
Playing games online with friends can be a great time, but not everyone likes to follow the rules. Be sure to report harassment, whether via messages or voice chat, and mark any spam messages as well to mitigate security risks for yourself and the rest of the online community. Developers should take swift action to ban these accounts after being reported.
With automatic Wi-Fi connectivity enabled, your mobile device will connect to any known network or SSID that doesn’t require a password. You might be at risk if these Wi-Fi connections are monitored by untrusted third-parties. Set your your mobile devices to forget networks you no longer need, or just turn off Wi-Fi entirely.
Many articles, posts and other communications contain abundant links, some of which may lead to pages that no longer exist or, worse, are compromised. On a Mac/PC you can hover the mouse cursor over a link to see its destination. On mobile, you can hold to copy it and then paste it into a note.
More people are working from home, meaning they’re getting work done on their personal computers. This means that you could be switching between work and personal accounts several times a day. Make sure you are logged into your work account before uploading sensitive work-related documents to online storage, as they could accidentally be uploaded to a public or shared folder.
Putting a privacy screen filter on your laptop or mobile device can prevent others from seeing your screen outside of a narrow viewing angle, preventing “visual hacking.” There are several privacy screen filters on the market, but you want to make sure the one you purchase has a narrow enough viewing angle that will be effective while you’re working in public. Try to choose one with a viewing angle of 60 degrees or narrower.
In many instances, deleting a file doesn’t mean it’s gone forever. It might still be recoverable by someone with the right tools. When recycling a device or giving it to someone else, use an overwrite program to ensure full deletion of personal information from the drive.
Microsoft recently released the latest version of its quintessential operating system. The best part? Upgrading from Windows 10 is free. Just make sure you’re installing the update from the official Microsoft website to circumvent any possible security risks, like malware or viruses that could come from third party sites.
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.