Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Security Tip of the Day

Daily tips to create awareness of cyber threats and empower Total Defense users to be safer and more secure online with our security tips and resources..


September 2025
09.05.25

What’s a people search site and why is my info on it?

Have you ever Googled your name and found a result from a “people search” site like Whitepages, Spokeo, or Intelius? These sites seem to know everything about you: your age, past addresses, phone numbers, family members, and maybe even your political affiliations. It can be a little creepy, right? You didn’t give them this information, so how do they have it, and more importantly, what can you do about it?

The Business of Data

People search sites are a type of “data broker.” These companies specialize in collecting, storing, and selling personal information on millions of people. They don’t just get this data from one place; they pull it from a huge variety of sources, including:

  • Public Records: This is a goldmine for them. They scrape data from things like voter registrations, property deeds, court records, marriage licenses, and criminal histories.
  • Social Media: If your social media profiles are public, they can easily grab your name, photos, location, and even who you’re connected to.
  • Other Data Brokers: These companies often buy and sell information to each other, creating a vast network of personal data that’s hard to track.
  • Online Activity: They can also collect information from your online shopping habits, surveys, and other online interactions.

The result is a detailed profile of you that they can sell to anyone willing to pay for it. While some people use these sites for legitimate reasons, like finding an old friend, they can also be used by scammers, stalkers, and identity thieves to target you.

Taking Control: The Opt-Out Process

The good news is that you can fight back! You have the right to ask these companies to remove your information. It’s called “opting out.” The bad news is that it can be a tedious process, as you have to go to each site individually.

Here’s a general game plan:

  1. Find Yourself: Search for your own name, phone number, and address on a few popular people search sites. Make a list of every site that has your information.
  2. Find the Opt-Out Page: On each site, look for a link at the bottom of the page that says something like “Do Not Sell My Info,” “Privacy Policy,” or “Opt-Out.”
  3. Follow the Instructions: Each site has its own process. You might have to fill out a form, provide your email, or even verify your identity. Be careful not to give them more information than they already have!
  4. Confirm and Repeat: After you submit your request, you may need to confirm it by clicking a link in an email they send you. The work isn’t over, though! Since these sites constantly pull from public records, your information might reappear in the future. You’ll need to repeat this process every few months to keep your data off the sites.

If you don’t have the time to do this yourself, there are services that can do the work for you for a fee. Just make sure you choose a reputable company.

The Bigger Picture

Removing your information from these sites is an important step in protecting your privacy, but it’s only one piece of the puzzle. You should also:

  • Review Your Social Media: Check your privacy settings and make sure you’re not sharing more than you’re comfortable with.
  • Be Mindful of Online Habits: Be cautious about filling out online forms or taking quizzes that ask for a lot of personal information.

By taking these proactive steps, you can significantly reduce your digital footprint and make it much harder for these sites to profit from your personal information.

09.04.25

Trading in your tech–don’t leave digital ghosts behind

So, you’re getting a shiny new computer! Awesome! But before you box up that old clunker and send it off to its next adventure (or the recycling plant), you need to do one very important thing: wipe it clean of your personal information. Think of it like decluttering your house before you move – you wouldn’t want to leave your bank statements and family photos for the new owners, right? Your computer is the same, but with a lot more sensitive digital baggage. If you don’t take the right steps, your old data could end up in the wrong hands, leading to potential identity theft. Let’s walk through how to make sure your digital past stays private.

Step 1: Back It Up First!

Before you start deleting anything, make sure you’ve backed up all the important files, photos, videos, and documents you want to keep. You can use an external hard drive, a USB flash drive, or a cloud storage service. Double-check that everything you need is safely stored somewhere else. This is your safety net!

Step 2: The “Delete” Button Isn’t Enough

Resist the urge to simply drag files to the Recycle Bin (or Trash on a Mac) and empty it. That doesn’t actually erase the data; it just removes the shortcuts. The files are still on your hard drive and can be recovered with readily available software. For true data removal, you need to go a step further.

Step 3: For Windows Users: The Factory Reset Route

For most Windows users, the easiest way to securely remove your personal information is to perform a factory reset. This process essentially restores your computer to the state it was in when it first came from the manufacturer.

  • Windows 10 & 11: Go to Settings > Update & Security > Recovery. Under “Reset this PC,” click Get started. You’ll be given two options: “Keep my files” and “Remove everything.” Choose “Remove everything.” Then, select “Remove files and clean the drive.” This option takes longer but does a more thorough job of overwriting your data.

Follow the on-screen instructions to complete the reset. Be patient, as this process can take some time.

Step 4: For Mac Users: Reinstall macOS

For Mac users, the process involves using the built-in Disk Utility to securely erase your hard drive and then reinstalling macOS.

  1. Restart your Mac and hold down Command () + R until you see the Apple logo or another startup screen. This will boot your Mac into Recovery Mode.
  2. In macOS Utilities, select Disk Utility and click Continue.
  3. Select your startup disk in the sidebar.
  4. Click Erase in the toolbar.
  5. Enter a name for your disk, choose APFS or Mac OS Extended (Journaled) as the format, and for the Scheme, select GUID Partition Map.
  6. Click Erase. For more secure erasing options, click Security Options (if available) and choose a more thorough erasure method (this will take longer).
  7. Once the erase is complete, quit Disk Utility.
  8. In the macOS Utilities window, select Reinstall macOS and follow the on-screen instructions.

Step 5: Physical Destruction (Optional, But Highly Secure)

For ultimate peace of mind, especially if you’ve had highly sensitive information on your computer, you can consider physically destroying the hard drive. This involves removing the hard drive and either drilling holes through the platters or completely smashing it. This method makes data recovery virtually impossible.

By following these steps, you can ensure that your personal information doesn’t fall into the wrong hands when you say goodbye to your old computer. It might take a little extra time, but the peace of mind knowing your digital life remains private is well worth the effort.

09.03.25

Hacked? Don’t panic—how to take back your account

That sinking feeling is the worst. You try to log into your email or social media, but your password doesn’t work. A quick message to a friend reveals that someone has been sending weird messages from your account. You’ve been hacked. It’s a scary moment, but you’re not helpless. The most important thing is to act fast. Here’s a step-by-step guide on how to recover your hacked account and secure your digital life.

Step 1: Disconnect and Change Everything

First, get the hacker out. If you’re still logged in on any device, log out immediately. The quicker you cut off their access, the less damage they can do.

Next, you need to change your password. Go directly to the “Forgot Password” or “Reset Password” link on the login page. Do not click on any links in an email you might have received from the hacker—these are often traps.

When you create a new password, make it strong and unique. Don’t reuse an old password, and make sure it’s not a word you can find in a dictionary. Use a mix of uppercase and lowercase letters, numbers, and symbols. A good password manager can help you create and store strong passwords for all your accounts.

Step 2: Check for Forwarding Rules and Hidden Backdoors

Hackers are clever. Even after you’ve changed your password, they might have set up a secret way to regain access. Log in to your account and go straight to the settings page. Look for anything suspicious.

  • Email: Check your email forwarding rules. Hackers often set up a rule to forward your emails to their own address, so they can keep tabs on you. Delete any forwarding rules you didn’t create.
  • Social Media: Look for connected apps or authorized devices you don’t recognize. Remove any that you didn’t personally approve. This is especially important for social media, where a malicious app could be posting on your behalf or collecting your data.

Step 3: Tell Your Contacts and Warn Everyone

Once you’ve secured your account, it’s time to let your network know what happened. Send an email or a quick social media post (if you have control of your account) to your friends and followers. Tell them your account was hacked and to ignore any strange messages or requests they might have received from you. This simple step can prevent the hacker from scamming your friends or spreading malware to others.

Step 4: Add Extra Internet Security

Now that you’ve recovered, it’s time to prevent this from happening again. Two-factor authentication (2FA) is your best friend here. It adds a second layer of security to your account, so even if a hacker gets your password, they can’t get in without a code from your phone or another device.

By acting quickly, being thorough, and taking a few proactive security steps, you can recover from a hack and make your online life much safer.

09.02.25

Your phone’s a goldmine for hackers: protect it!

Think about everything you do on your phone: banking, shopping, social media, work. It holds some of your most sensitive information, from your passwords to your contacts and even your location. For hackers, your phone is a digital goldmine, and they’re always looking for new ways to strike it rich. But don’t worry, you can take some simple steps to fortify your device and keep your personal data safe.

1. Lock It Down with a Strong Passcode

This might sound like a no-brainer, but it’s the first and most important step. A simple 4-digit PIN is easy to guess. Opt for a strong, unique alphanumeric passcode—one that’s long and uses a mix of letters, numbers, and symbols. Even better, use biometric security like a fingerprint or face scan. These are much harder for a hacker to fake.

2. Be an App Inspector

We all love a good app, but not all apps are created equal. Before you download anything, especially from a new or unknown developer, do your research. Check reviews, look at the developer’s website, and most importantly, review the app’s permissions. Does a simple flashlight app really need access to your photos and contacts? If an app asks for more permissions than it needs to function, it’s a big red flag. Stick to official app stores like the Apple App Store and Google Play, which have security measures in place to vet apps before they’re published.

3. Keep Your Software Updated

Those update notifications you get for your phone’s operating system (iOS or Android) aren’t just for new emojis and features. They contain crucial security patches that fix vulnerabilities hackers have found. Ignoring these updates leaves your phone exposed and vulnerable. Turn on automatic updates so your phone can stay protected without you having to think about it. It’s like getting a new, stronger suit of armor to defend against the latest threats.

4. Be a Wi-Fi Warrior

Connecting to free public Wi-Fi at a coffee shop or airport might seem convenient, but it’s a huge security risk. Many of these networks are not encrypted, which means a hacker can easily intercept the data you send and receive—from your login credentials to your banking information. If you have to use public Wi-Fi, avoid any activity that involves sensitive data. The best solution? Use a Virtual Private Network (VPN). A VPN encrypts your connection, creating a secure tunnel for your data and shielding it from prying eyes.

By following these four simple steps, you can significantly reduce your risk of becoming a victim of a cyberattack. Your phone is a powerful tool, and by taking these precautions, you ensure it stays a tool for you, not for a hacker.

09.01.25

Free Wi-Fi: Friend or Foe? What You Need to Know

We’ve all been there: you’re out and about, maybe at a coffee shop, an airport, or a hotel, and you see that glorious “Free Wi-Fi” option. It’s tempting, right? A quick way to check emails, scroll through social media, or even get some work done. But before you connect, it’s crucial to understand a simple truth: public Wi-Fi networks are not created equal. In fact, many are far less secure than you think, and they can pose a real risk to your personal information.

The Risks of Public Wi-Fi

Connecting to a public Wi-Fi network is like having a conversation in the middle of a crowded room. You can talk to your friends, but anyone with a little know-how can listen in. On an unsecured network, your data—like passwords, banking details, and personal messages—can be intercepted by hackers. They might be sitting at the next table, just waiting for someone to log into their bank account or enter a credit card number. This is a common method for cybercriminals to steal sensitive information.

Even if a public Wi-Fi network requires a password, it might still not be secure. A password that’s shared with everyone at a coffee shop or hotel isn’t really a private key. It’s better than nothing, but it still leaves you vulnerable.

Be Your Own Security Guard

So, how can you stay safe in the Wi-Fi wild west? The key is to be your own security guard.

  • Assume the Worst. Always assume a public Wi-Fi network is insecure. This mindset will encourage you to take extra precautions.
  • Avoid Sensitive Activities. While connected to public Wi-Fi, avoid doing anything that involves personal or financial information. This includes online banking, shopping, and logging into accounts that contain sensitive data. If you have to do something important, switch to your phone’s cellular data connection, which is far more secure.
  • Use a VPN. A Virtual Private Network (VPN) is your best friend when using public Wi-Fi. It creates a secure, encrypted tunnel for all your internet traffic, hiding your activity from prying eyes. Think of it as a private, secure lane on the internet highway. Even if a hacker intercepts your data, it will be scrambled and unreadable.
  • Enable a Firewall. A firewall is a safety barrier that controls incoming and outgoing network traffic. Make sure the firewall on your computer or mobile device is enabled. It can block suspicious connections and stop hackers before they can even get started.

The Safest Way to Connect

The bottom line is to think before you click. Public Wi-Fi is convenient, but it’s not always safe. By using a VPN, avoiding sensitive activities, and being aware of the risks, you can protect yourself from potential threats.