Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Security Tip of the Day

Daily tips to create awareness of cyber threats and empower Total Defense users to be safer and more secure online with our security tips and resources..


May 2026
05.04.26

How to protect your identity? Limit what you share on social media.

Social media makes it easy to stay connected, but it also makes it easy for strangers, scammers, and data brokers to collect personal information about you. Every post, photo, like, and comment helps build a digital profile that others can search, copy, and misuse. From a cybersecurity perspective, limiting what you share online is one of the most effective ways to reduce identity theft and impersonation risk.

Here’s how to think about social sharing with security in mind—and how to protect your identity without quitting social media altogether.

Why oversharing puts your identity at risk

Social networks are enormous, highly searchable databases. Unlike private conversations, public posts can be saved, reshared, indexed by search engines, and scraped by criminals. That makes social media a goldmine for anyone trying to steal identities or answer security questions.

According to the Federal Trade Commission, the Consumer Sentinel Network received over 1.1 million identity theft reports in 2024, with a large portion tied to information gathered online, including social media and email exposure.

The less personal data you share publicly, the fewer tools criminals have to work with.

Personal information you should never share publicly

Some details should always stay private, no matter the platform.

Never post:

  • Your home address or location details
  • Your full date of birth
  • Your Social Security number or ID numbers
  • Phone numbers or personal email addresses
  • Photos of official documents (ID, boarding passes, bills)

Even “harmless” posts can be combined to reconstruct sensitive information.

Common posts that quietly expose too much

Not all risky posts seem dangerous at first glance.

Be careful with:

  • Birthday shout‑outs that reveal your birth year
  • Travel posts announcing you’re away from home
  • Back‑to‑school photos showing school names
  • Job updates that list your role and employer
  • Pet posts (often used to guess password recovery answers)

Attackers piece together these details over time.

Lock down your privacy settings

Privacy controls are your friend—but only if you use them.

Best practices:

  • Set profiles to private whenever possible
  • Limit who can see past posts
  • Review tagged photos before they appear
  • Disable search engine indexing of your profile
  • Remove old friends or followers you don’t recognize

Revisit these settings every few months since platforms change them often.

Think before sharing stories and reels

Short‑lived content still carries long‑term risk.

Before posting, ask:

  • Would I be okay if a stranger saved this?
  • Does this reveal my location or routine?
  • Could this answer a security question?

If the answer is unclear, don’t post it publicly.

Protect kids and family members, too

Family posts can expose more than just you.

Avoid:

  • Posting children’s full names and birthdays together
  • Sharing school schedules or locations
  • Publicly tagging minors in real time

Once posted, these details are nearly impossible to fully erase.

Build safer social habits

Limiting what you share doesn’t mean staying silent—it means being intentional.

Safer sharing habits include:

  • Keeping personal milestones vague
  • Sharing photos after events, not during
  • Using nicknames instead of full legal names
  • Separating public profiles from private accounts

Privacy grows stronger with consistency.

Final takeaway

Social media was never designed with identity protection in mind. By limiting what you share, tightening privacy controls, and thinking like a cybersecurity expert before you post, you take away the raw materials criminals rely on. Less public information means fewer opportunities for fraud and impersonation—and far more control over your digital identity.

05.03.26

Search for yourself online using operators to protect your digital identity

Most people don’t realize how much personal information about them is publicly available online. A quick search of your name can reveal phone numbers, old resumes, workplace documents, social media profiles, and even email addresses. Regularly searching for yourself online is a simple but powerful cybersecurity habit—and using search operators helps you uncover far more than a basic Google search ever will.

Here’s how everyday users can use search operators to see what information is exposed and take action to protect it.

Why you should Google yourself regularly

Your online footprint changes all the time. New data brokers, leaked documents, or impersonation attempts can surface without warning. According to the Pew Research Center, 67% of U.S. adults say they understand little to nothing about what companies are doing with their personal data, even though it’s widely available online (Pew Research Center, 2023).

Searching for yourself helps close that awareness gap.

What are search operators?

Search operators are special characters or commands that refine search engine results. They let you look for specific types of information instead of random mentions of your name.

Used properly, operators turn Google or Bing into a powerful personal data discovery tool.

Basic searches to start with

Begin with variations of your name:

  • First name + last name
  • First name + middle initial + last name
  • Name + city or state
  • Name + employer

This shows what a casual searcher might find.

Advanced search operators you should use

Now dig deeper with targeted operators.

Find possible email addresses

“First Last”@

This helps surface email addresses associated with your name in public forums, documents, or data broker listings.

Find documents that mention you

“First Last” filetype:doc

“First Last” filetype:pdf

“First Last” filetype:xls

These searches often reveal resumes, spreadsheets, or internal documents accidentally indexed by search engines.

Check for exposed usernames

“First Last” site:github.com

“First Last” site:linkedin.com

“First Last” site:facebook.com

This shows where your name appears on specific platforms.

Search for phone numbers

“First Last” “phone”

“First Last” “(###)”

These queries can uncover listings tied to old accounts or data brokers.

What to do if you find exposed information

Finding your data online doesn’t mean you’ve been hacked—but it does mean action is needed.

Take these steps:

  • Request removals from data broker websites
  • Update privacy settings on social media accounts
  • Remove outdated resumes or files from public sites
  • Lock down accounts tied to exposed email addresses

Most platforms include “request removal” or “report information” options.

Make searching yourself a routine

Digital hygiene works best when it’s consistent.

Best practices:

  • Search for yourself every 3–6 months
  • Repeat searches after job changes or moves
  • Use private browsing to avoid biased results
  • Document what you remove so you can check again later

Think of this as preventive cybersecurity—not paranoia.

Final takeaway

Search engines already know a lot about you. Using search operators helps you see what attackers, scammers, and strangers can see too. Spending ten minutes every few months searching for yourself can prevent impersonation, fraud, and long‑term privacy issues. Visibility is the first step to control.

05.02.26

How to use parental controls to limit the content your kids can view

Kids today grow up with screens everywhere—phones, tablets, laptops, TVs, and game consoles. That access can be great for learning and creativity, but it also means children can easily stumble into content that isn’t age‑appropriate. Parental controls help families set healthy digital boundaries and give parents peace of mind without having to constantly look over a child’s shoulder.

If you’re a parent or caregiver, here’s a practical, real‑world guide to using parental controls effectively.

Why parental controls matter more than ever

Children encounter online risks earlier and more often than many parents realize. According to the Family Online Safety Institute (FOSI), only about 47% of parents use parental controls on smartphones, even though children increasingly access content through mobile devices. This gap highlights how many kids may be navigating the internet with limited protections in place (FOSI 2025 Online Safety Survey).

Parental controls don’t replace conversations—but they provide an important safety net.

What parental controls can actually do

Most major platforms include built‑in tools that let parents manage access in flexible ways.

Parental controls commonly allow you to:

  • Block or filter specific websites and categories
  • Limit access to certain apps or games
  • Set screen‑time schedules and daily limits
  • Restrict in‑app purchases or require approval
  • Monitor activity and receive alerts

These features let you guide rather than spy.

How to set up parental controls by platform

Start with the systems your family uses most.

On smartphones and tablets

  • Apple devices: Use Screen Time to manage apps, content, and downtime
  • Android devices: Use Google Family Link to approve installs and limit access

On computers

  • Windows and macOS both allow creating child profiles with content restrictions
  • You can disable programs or limit browsing by user account

On game consoles and smart TVs

  • Xbox, PlayStation, Nintendo, and most smart TVs offer age ratings, purchase controls, and usage limits

Set controls per child when possible—age and maturity matter.

Best practices for using parental controls effectively

Tools only work when used thoughtfully.

Do this:

  • Review settings regularly, especially as kids grow
  • Start restrictive and loosen over time
  • Pair controls with clear explanations and family rules
  • Focus on safety, not punishment

Avoid:

  • Secret monitoring without discussion
  • Over‑blocking educational or creative content
  • Ignoring updates when platforms change features

Controls should evolve along with your child.

Talk first, then configure

Technology alone won’t keep kids safe online.

Make time to:

  • Explain why certain sites or apps are limited
  • Encourage kids to ask before installing new apps
  • Let children know they can come to you if something feels wrong
  • Agree on rules together where appropriate

The same FOSI study found that nearly 89% of children feel comfortable talking to parents when something online makes them feel unsafe, showing how powerful open communication can be when paired with controls.

Review permissions and purchases

Parental controls also protect your finances and your child’s privacy.

Use approval settings to:

  • Prevent accidental in‑app purchases
  • Approve new app downloads
  • Block apps that collect excessive data

This reduces both exposure and surprise charges.

Final takeaway

Parental controls are not about surveillance—they’re about guidance. When you combine built‑in tools with honest conversations, you create a safer digital environment that grows alongside your child. Start simple, stay involved, and remember: the goal is protection, not perfection.

05.01.26

A practical guide for Android smartphone users to avoid downloading malicious apps

Android gives you flexibility and choice—but that same openness makes Android users a prime target for malicious apps. From fake photo editors to “helpful” utility tools, bad apps often look harmless until they start stealing data, draining your battery, or hijacking your accounts.

The good news: avoiding malicious apps doesn’t require technical expertise. It requires awareness, a few smart habits, and knowing what to look for before you tap “Install.”

Why malicious Android apps are still a big problem

Even with Google Play security improvements, attackers constantly try to sneak harmful apps past app‑store defenses. In fact, Google reported blocking over 1.75 million harmful apps from reaching the Play Store in 2025, along with removing tens of thousands of malicious developer accounts, as Android malware tactics become more sophisticated.

That means risky apps are still out there—and some only get caught after people install them.

Stick to trusted app sources only

This is your first and strongest line of defense.

Do:

  • Download apps only from the Google Play Store
  • Keep Google Play Protect enabled
  • Avoid links that push you to “install manually” or sideload apps

Don’t:

  • Install apps from random websites or pop‑ups
  • Trust “cracked,” modded, or free‑premium versions of paid apps

Sideloaded apps bypass Google’s screening entirely.

Check the developer and app history

Before installing any app, pause for 20 seconds and research it.

Look for:

  • A recognizable developer name with other published apps
  • A professional website linked in the app listing
  • A long update history—not something brand new with millions of claims

Be cautious if:

  • The developer name is generic or mismatched
  • The app description looks copied or poorly written
  • The app promises unrealistic features

Legitimate developers leave a clear digital footprint.

Read reviews the smart way

Star ratings alone aren’t enough.

Instead:

  • Read the most recent reviews
  • Look for patterns like sudden one‑star warnings
  • Watch for repeated complaints about ads, pop‑ups, or logins

Red flag phrases include:

  • “This app started showing ads everywhere”
  • “Asked for permissions it didn’t need”
  • “Phone slowed down after installing”

Fake apps often manipulate early reviews to appear safe.

Watch app permissions closely

Permissions reveal an app’s true intentions.

Be skeptical if:

  • A flashlight wants access to contacts
  • A game requires SMS or call access
  • A calculator asks for microphone or camera use

Best practice:

  • Read permissions before installing
  • Deny optional permissions you’re uncomfortable with
  • Uninstall apps that request new permissions after updates

If permissions don’t match the app’s purpose, walk away.

Avoid “too good to be true” apps

Malicious apps often use emotional bait.

Common traps include:

  • “Boost your battery instantly”
  • “Clean your phone in seconds”
  • “Free VPN with unlimited speed”
  • “Earn money just by installing”

Real security and performance tools don’t rely on hype or urgency.

Keep your phone protected after installation

Prevention doesn’t stop at download.

Protect your device by:

  • Keeping Android OS and apps updated
  • Removing apps you no longer use
  • Running Play Protect scans regularly
  • Using a reputable mobile security app

If something feels off—battery drain, overheating, strange pop‑ups—uninstall the app immediately.

Final takeaway

Malicious Android apps succeed because people trust fast installs and familiar icons. Slowing down, checking app details, and questioning permissions can stop most threats before they reach your phone. Treat every app install like a security decision—because it is.