Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Security Tip of the Day

Daily tips to create awareness of cyber threats and empower Total Defense users to be safer and more secure online with our security tips and resources..


November 2025
11.06.25

The firewall card: why you need to dedicate one credit card to online shopping

We all shop online. It’s convenient, fast, and often cheaper than hitting the mall. But every time you type your credit card number into a new checkout form, you introduce a sliver of risk. That number is now stored on another server, potentially exposed if that company is ever hacked.

So, how do you keep shopping without leaving your entire financial life vulnerable? The answer is simple and effective: Dedicate one credit card for online purchases only.

This isn’t just a suggestion; it’s a proactive strategy that significantly decreases the potential damage if a criminal gains access to your credit card information. Think of it as creating a digital firewall between your everyday finances and the wild world of the internet.

Why The Dedicated Card Works

If you use your primary credit card (the one with the high limit, tied to automatic bill payments, and linked to your main bank) for every online transaction, you risk a complete financial meltdown if the number is stolen.

A dedicated online-only card gives you two massive security advantages:

1. Limiting the Blast Radius

If you are ever hit by a data breach (like when a retailer you shopped at is hacked), the only card number stolen is your dedicated online one. You haven’t exposed the card you use for rent, utilities, and daily essentials.

The moment you get an alert about fraudulent charges on the online card, you can immediately cancel it without worrying that canceling will interrupt your entire life—your Netflix subscription still runs, your phone bill still gets paid, and your primary card is safe and sound.

2. Controlling the Damage (Lower Limits)

This is the smartest part of the strategy. When you open that dedicated online account, you should maintain a minimum credit line on the account.

For example, if you typically spend a month online, ask the bank to keep the credit limit on that card at . If a potential attacker gains access to this card, the maximum amount of charges they can accumulate is limited to that low credit line. They cannot drain a card that has a limit and create a monumental mess for you to clean up.

This controlled limit acts as a crucial safety net. You’ve essentially set a maximum loss before your bank’s system stops the fraud cold.

How to Set Up Your Firewall Card

Getting started is easy:

  1. Open a New Account: If you don’t have a secondary credit card, open one specifically for online use. Look for one with good fraud protection features.
  2. Adjust the Limit: Call the credit card company and request a low limit. Explain that you intend to use it only for secure, online purchases.
  3. Use It Exclusively Online: Load this card into your digital wallets (like Apple Pay or Google Pay) and use it for all website purchases, subscriptions, and new online services.
  4. Monitor Closely: Since this card is your highest risk exposure, check the statement weekly. Because you know its only purpose is online shopping, any strange charges will be immediately obvious.

By creating this simple separation, you actively manage your risk, transforming a potential financial disaster into a minor, controllable inconvenience.

11.05.25

Why you need to dump those old, unsupported apps right now

We all have that old software we love. Maybe it’s a version of a favorite editing tool, an ancient chat program, or even that trusty old operating system (we’re looking at you, Windows XP fans!). It works, it’s familiar, and you don’t want to change.

Here’s the harsh truth: relying on old, unsupported software is one of the biggest risks you take in cybersecurity. When an application is no longer supported by its maker—meaning they’ve stopped sending out updates—it becomes a gaping hole in your digital defense, just waiting for a hacker to walk right through.

The Silent Killer: Unpatched Exploits

When a software developer creates a program, they spend years perfecting it. But even the biggest companies make mistakes. Over time, security researchers or even hackers discover vulnerabilities, or “bugs,” in the code.

For supported software, this isn’t a huge problem. The company immediately creates a patch (an update) to fix the vulnerability and rushes it out to users. This keeps you safe.

However, when software hits its End-of-Life (EOL) date, the company stops supporting it. This means:

  1. Known Flaws Stay Open: Any vulnerabilities discovered after the support date are never fixed. These are called unpatched exploits.
  2. Hackers Know About Them: When a company stops supporting a product, hackers know exactly what version of the software is running and can easily find documentation online about the security flaws they can exploit.
  3. It’s a One-Way Ticket In: Using unsupported software like old versions of QuickTime, ancient web browsers, or outdated operating systems is like leaving the back door of your digital house unlocked and posting the address on the internet.

Your security is only as strong as your weakest link, and that outdated software is usually the weakest link of all.

Taking Action: The Active Clean-Out

It’s time to be proactive and purge the unsupported junk from your system.

  • Audit Your Operating System: If you’re running an OS that’s several generations old (like Windows XP or even old versions of macOS), you need to upgrade immediately. Modern operating systems have built-in security features that older versions simply lack.
  • Check Media and Browsing Tools: Programs like old versions of QuickTime, Flash Player, and old Java plugins are notorious for containing dangerous, unpatched flaws. Delete them and rely on modern, automatically updated equivalents.
  • Find Automated Help: It can be hard to track every piece of software on your machine. This is where modern security programs step in. Many comprehensive security suites, like our Ultimate Internet Security, have features that automatically scan and update vulnerable applications on your computer. This takes the guesswork out of maintenance and ensures you’re always running the safest version available.

Don’t depend on yesterday’s technology to protect you from today’s threats. Update, remove, or automate the security of your apps.

11.04.25

Lock down your Amazon account – why it needs two-step verification today

Let’s be honest: your Amazon account is probably one of the most valuable digital targets you own. Think about it—it contains your entire shipping address history, your purchase history (which reveals a ton about you), and, most importantly, your stored credit card information. If a hacker gets into that account, they can start buying themselves new gadgets on your dime in seconds.

That’s why simply having a strong password is no longer enough. You need to activate a digital bodyguard, and on Amazon (and every other important account), that bodyguard is called Two-Step Verification (2SV), also known as Multi-Factor Authentication (MFA).


Why 2SV is Imperative for Amazon

Imagine your password gets stolen in a data breach. It happens all the time! A hacker now has your username and password. Without 2SV, they are moments away from logging in, changing your registered email, and going on a shopping spree with your stored credit card.

2SV adds an extra, critical layer of security by requiring two different forms of evidence to prove you are who you say you are. This turns a simple password breach from a disaster into a dead end for the hacker.

How it Works: The Trusted Device Lock

If you set your Amazon account up with 2SV, a hacker will need more than just your username and password to use your account.

  1. Something You Know: They enter your username and password (the first step).
  2. Something You Have: The system then automatically sends a unique, one-time code to your trusted device, usually your smartphone (the second step).

Because the hacker doesn’t physically possess your smartphone, they cannot receive that code. It becomes impossible for them to log in, even with your correct password. Your account, your finances, and your address book are safe.

Don’t Wait! Setting Up 2SV is Quick

Seriously, this takes about two minutes, and it is the single most effective thing you can do to protect your Amazon account right now.

Here’s the quick path to a more secure Amazon account:

  1. Navigate to Account: Log into Amazon and find the section for your personal settings.
  2. Click on “Login & Security”: This page holds all the core protection settings for your profile.
  3. Click on “Two-Step Verification (2SV) Settings”: You will then be prompted to choose your second security step.

Amazon gives you a couple of options for that second step:

  • Authenticator App: This is the most secure method. Apps like Google or Microsoft Authenticator generate a code right on your phone, making the process faster and more secure than texts.
  • Text Message (SMS): This is the easiest option, as Amazon just texts the code to your registered mobile number. While still a huge improvement over no 2SV, it’s slightly less secure than an app.

Don’t leave the keys to your financial life lying around! Take the two minutes right now to activate 2SV. You’ll breathe easier knowing your Amazon account is locked down tight.

11.03.25

Stop giving away your credit card number: the magic of Apple Pay (and tokenization!)

Let’s face it, whipping out your plastic credit card every time you shop online or tap at a register is getting old. Not only is it inconvenient, but every time you hand that card over or type those 16 digits into a website, you are exposing your financial life to potential risk.

But there’s a much smarter, safer way to pay that you probably already have access to: Apple Pay (or any other reputable digital wallet). Using your iPhone or Apple Watch to pay isn’t just about speed; it’s about adding a powerful, invisible layer of security to every transaction.


The Security Secret: Tokenization

The reason digital wallets like Apple Pay are safer than your physical card is all thanks to a genius security process called tokenization.

When you first set up your credit card in your Apple Wallet, the system doesn’t just save your real credit card number. Instead, your credit card number is instantly replaced with a unique, encrypted code called a token (also known as a Device Account Number).

Here’s the security magic in action:

  1. Your Real Number Stays Secret: Your actual 16-digit credit card number is stored only within a secure chip on your device. It never leaves your phone.
  2. The Token Goes to the Merchant: When you tap your iPhone at a store or select Apple Pay online, the merchant’s system receives that unique, one-time-use token, not your real card number.
  3. The Token is Useless to Thieves: If a criminal somehow manages to steal that token from the retailer’s database, the token is essentially worthless. It’s tied to your specific phone and the specific transaction. They can’t use it to clone your physical card or start shopping online.

This ensures that no one—not the cashier, not the website, and not a data thief—ever gets your actual credit card information. Your sensitive data stays locked down, and only you have the key.

More Layers of Defense

Apple Pay doesn’t stop with tokenization. It adds two other critical security features:

1. Biometric Security

To authorize any payment, you must authenticate the transaction using something only you possess—your fingerprint (Touch ID) or your face scan (Face ID). This means that if you lose your phone, a thief can’t easily start making purchases. Even if they somehow bypass your phone’s lock screen, they still can’t use your payment methods without your unique biometric signature.

2. Reduced Data Exposure

When you shop online, using Apple Pay eliminates the need to manually type your credit card details into a checkout form. This is a massive win, as manually entering details opens you up to keylogging malware (which records your keystrokes) or phishing sites designed to steal your information. With Apple Pay, you just authenticate the transaction, and the token does the rest.

Stop giving away your sensitive data every time you check out. Make the switch to Apple Pay today and let tokenization be the bodyguard for your wallet!

11.02.25

Why you shouldn’t use your admin account every day

You love convenience, right? It’s easy to just log into your computer with the one account that lets you do everything: install new programs, change system settings, update drivers—the works. That one account is your Administrator account (or “Admin” account).

While having this power feels great, using your Admin account for daily tasks—like browsing the web, checking email, or just scrolling social media—is actually a huge security risk. It’s like carrying the keys to your entire digital kingdom in your pocket every single day. If you lose those keys, the damage is catastrophic.


The Danger of Having Too Much Power

Admin accounts are powerful because they extend special permissions that regular accounts don’t have. They can modify core system files, manage security settings, and make sweeping changes to your device.

The bad news is that if your device is lost, stolen, or, most commonly, hacked, these administrator capabilities could be implemented by the attacker to cause serious harm.

1. Malware Goes Straight to the Core

When you browse the internet or open an attachment while logged in as an Admin, any malicious software (malware) that manages to infect your system automatically inherits those same high-level permissions.

  • A virus or ransomware can then easily install itself deep into the operating system.
  • It can disable your antivirus program.
  • It can access and encrypt all files on all user profiles.
  • It can install permanent “backdoors” that allow hackers to return later.

If you were logged in with a standard, non-admin account, the malware would hit a roadblock. It would lack the necessary permission to make system-wide changes, effectively sandboxing the damage.

2. The Phishing Catastrophe

Let’s say you fall for a sneaky phishing scam and click a malicious link. If you are an Admin, that malicious website or file can instantly run a damaging script with full system privileges.

If you are using a standard account, the system will often prompt you for an administrator password before allowing a major change. This provides a crucial moment for you to stop and think—”Wait, why is my web browser asking for my admin password?” This pause can save your entire system.

Your Active Solution: Set Up a Second Account

Protecting yourself is simple: set up a second account for daily use, one without Admin privileges.

  • Create a Standard User Account: Use this account for all your routine, everyday tasks: checking email, watching videos, reading news, social media, and word processing.
  • Reserve the Admin Account: Keep your Admin account strictly locked down. Only log into it when you absolutely must perform a system-level task, such as installing new software or running major updates.

By making this small change, you practice the principle of “Least Privilege.” You give yourself (and any potential threats) only the level of access needed to perform a task. If disaster strikes, your Admin keys stay safe, and the damage remains minor and isolated to a limited profile.

Take a few minutes today to check your user accounts and set up a standard profile. It’s the simplest way to give your computer an essential layer of digital armor.

11.01.25

Shopping alert! Stop clicking email links and start typing

The holidays roll around, your birthday hits, or maybe you just need a new gadget—online shopping is a major part of life! And with all that shopping comes a flood of emails: sale alerts, coupon codes, and special offers from your favorite stores.

Here’s a simple, active rule that can save you from a nasty financial headache: If you want to shop online, open a new tab and find the store through your browser. Do not click on a link in an email to start shopping.

Why are we so firm on this? Because every single day, cybercriminals send out thousands of fake emails pretending to be reputable retailers. These are called phishing scams, and their goal is to gain your personal information, especially your credit card number, by tricking you into visiting a fraudulent website.

The Danger of the Quick Click

Scammers know you’re busy and that you trust big names like Amazon, Target, or your favorite local boutique. They use that trust against you.

1. The Fake Email is Too Convincing

Criminals have gotten incredibly good at mimicking official email templates. The logo looks perfect, the colors match, and the language sounds urgent—”Your order has a problem,” or “Hurry, 50% off for 24 hours only!” These emails look so real that your brain skips the crucial step of verification.

2. The Link is the Trap

When you click the link in a scam email, you are directed to a phishing site. As we talked about before, these fake sites are often pixel-perfect clones of the real online store. You log in (giving the scammer your password) and then you proceed to checkout, where you happily type in your credit card number, thinking you’re getting a great deal.

In reality, you’ve just handed your sensitive details directly to a criminal. The scammer now has your card number, expiration date, and security code, ready to go on a spending spree in your name.

Your Active Solution: The “Open Tab” Rule

You don’t have to miss out on sales or coupons. You just have to change how you get there. Make this your new habit every time you want to shop:

  1. See an Email You Like? Read it, note the sale, but close the email immediately.
  2. Open a New Tab: Open your web browser (Chrome, Safari, Firefox, etc.) and open a brand new tab.
  3. Type the Address: Manually type the store’s official, correct website address into the address bar (e.g., amazon.com or bestbuy.com).
  4. Shop Safely: Once you are on the real, verified website, you can confidently search for the sale items mentioned in the email. You have bypassed the malicious link and protected yourself from the phishing trap.

This simple action—taking the time to open a new tab and type the correct URL—is your best defense against having your credit card stolen during online shopping. It ensures that you are interacting with the legitimate company, not a criminal clone. Make the switch today and shop with confidence!