Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Security Tip of the Day

Daily tips to create awareness of cyber threats and empower Total Defense users to be safer and more secure online with our security tips and resources..


October 2023
10.31.23

Pay securely with Apple Pay, Google Pay, and Samsung Pay

Mobile payment services like Apple Pay, Google Pay, and Samsung Pay are a safe and convenient way to pay for goods and services. These services allow you to make contactless payments with your smartphone or smartwatch, without having to use your physical credit or debit card.

Here are some of the benefits of using mobile payment services:

  • Security: Mobile payment services are more secure than using your physical card because they don’t transmit your actual card number to the merchant. Instead, they use a unique device identifier and a one-time-use token. This makes it much more difficult for attackers to steal your card information.
  • Convenience: Mobile payment services are very convenient to use. You can make contactless payments without having to carry your wallet or purse. You can also use mobile payment services to pay for online purchases.
  • Speed: Making payments with mobile payment services is faster than using a physical card. You simply need to tap your phone or smartwatch on the merchant’s payment terminal.

Mobile payment services are widely accepted at physical retail stores, and they’re becoming increasingly popular online as well. If you see the logo for one of these services at a merchant, you can usually tap your phone or smartwatch to pay.

Here are some tips for using mobile payment services safely:

  • Make sure that your phone or smartwatch is password protected. This will help to prevent unauthorized access to your mobile payment account.
  • Only use mobile payment services on trusted devices.
  • Be aware of your surroundings when making mobile payments. Avoid making mobile payments in public places where someone could see your PIN or password.
  • Monitor your mobile payment account transactions regularly for any suspicious activity.

If you’re looking for a safe and convenient way to pay, I recommend using a mobile payment service like Apple Pay, Google Pay, or Samsung Pay.

10.30.23

Toggle ad blockers to balance safety and usability

Ad blockers can be great for blocking annoying ads and protecting your privacy, but they can also break some websites. If you have an ad blocker installed, make sure you know how to toggle it on and off.

Here are some tips for using ad blockers safely and effectively:

  • Keep your ad blocker up to date. Ad blockers are constantly being updated to block new ads. Make sure you’re using the latest version of your ad blocker to get the best protection.
  • Only use ad blockers from trusted sources. There are some malicious ad blockers out there that can infect your computer with malware. Only install ad blockers from trusted sources, such as the Chrome Web Store or the Firefox Add-ons website.
  • Whitelist websites that you trust. If a website breaks when you’re using an ad blocker, whitelist it. This will allow the website to show ads, but it will also protect you from malicious ads.
  • Toggle your ad blocker on and off as needed. Some websites don’t work well with ad blockers. If you’re having trouble using a website, try toggling your ad blocker off.

By following these tips, you can use ad blockers safely and effectively to improve your online experience.

10.29.23

Torrenting: risky business

Torrenting was once the go-to way to download pirated video files, but it’s still popular today for downloading a variety of content, both legal and illegal. However, there are a few risks associated with torrenting, including:

  • Malware: Torrents can contain malware, such as viruses and ransomware. When you download a torrent file, you’re essentially downloading the files from other users, so there’s no guarantee that the files are safe.
  • Copyright infringement: Downloading copyrighted content without permission is illegal. If you’re caught torrenting copyrighted content, you could face fines or even jail time.
  • ISP throttling: Some ISPs throttle the internet connections of users who are caught torrenting. This means that your internet speed will be slowed down, making it difficult to browse the web, stream videos, and play games.

If you’re considering torrenting, be aware of the risks involved. If you do decide to torrent, take steps to protect yourself, such as using a VPN and a good antivirus program.

Here are some tips for staying safe when torrenting:

  • Only download torrents from trusted sources.
  • Use a VPN to hide your IP address.
  • Use a good antivirus program to scan downloaded files for malware.
  • Be aware of the copyright laws in your country.

By following these tips, you can help to protect yourself from the risks associated with torrenting.

10.28.23

Big “Download” buttons: A red flag for online scams

You’ve probably seen them before: large, colorful buttons on websites that say “Download” or something similar. But beware! These buttons are often ads (or worse) in disguise. Legitimate software vendors will not make you download their software this way.

If you need to download software, always go to the official website of the vendor or to a trusted app store. Never click on a “Download” button on a random website.

Here are some tips for staying safe when downloading software:

  • Only download software from trusted sources, such as the official website of the vendor or a trusted app store.
  • Be wary of any website that prompts you to download software without your permission.
  • Read the reviews of a software product before downloading it. This can help you to identify any potential scams or security risks.
  • Use a security solution that can scan for and block malicious software.

By following these tips, you can help to protect your computer from the risks associated with downloading software from untrusted sources.

10.27.23

What’s a browser plug-in?

Browser plug-ins are extensions that add new features to your web browser. For example, a plug-in might allow you to watch videos on websites that use Flash technology, or to play games that require Java.

Plug-ins can be useful, but they can also be a security risk. That’s because attackers can exploit vulnerabilities in plug-ins to install malware on your computer.

Before installing a plug-in, make sure that it’s necessary and that the site you’re downloading it from is trustworthy. You can also check online reviews of plug-ins to see what other users have said about their security.

Here are some tips for staying safe when using browser plug-ins:

  • Only install plug-ins from trusted sources, such as the official website of the plug-in developer.
  • Keep your plug-ins up to date. Software developers often release updates to fix security vulnerabilities.
  • Disable plug-ins that you don’t use. The more plug-ins you have installed, the greater the attack surface for attackers.
  • Use an internet security solution that can scan for and block malicious plug-ins.

By following these tips, you can help to protect your computer from the risks associated with browser plug-ins.

10.26.23

Practice digital minimalism

In an era of constant connectivity, consider adopting digital minimalism to reduce your online footprint. Regularly review and declutter your digital life by unsubscribing from unnecessary emails, deleting unused accounts and limiting app installations. By minimizing your digital presence, you in turn decrease the potential attack surface for cyber threats.

10.25.23

Yahoo account key: A convenient and secure way to log in to Yahoo Mail

If you use Yahoo Mail, a Yahoo Account Key can be a convenient and secure way to log in. A Yahoo Account Key is a notification sent to your mobile device, which you can approve or reject. This means that you don’t need to remember a password, and your account is more secure.

To use a Yahoo Account Key, you’ll need to set it up in the Yahoo Account Security settings. Once you’ve set it up, you’ll be able to log in to Yahoo Mail by simply approving the notification on your mobile device.

It’s important to note that your mobile device should be secured with its own passcode or biometric login. This will help to protect your Yahoo account if your mobile device is lost or stolen.

Here are some of the benefits of using a Yahoo Account Key:

  • It’s more convenient than remembering a password.
  • It’s more secure than using a password.
  • It’s easy to set up and use.

10.24.23

Keep a close eye on your financial statements

Stay vigilant against potential financial fraud by frequently reviewing your bank and credit card records. Look out for any unauthorized transactions or suspicious activity — irrespective of how major or minor any given transaction may be. Reporting any discrepancies promptly can help mitigate the impact of identity theft or unauthorized access to your accounts.

10.23.23

Securely share your files within the hybrid world

In today’s growing remote work environment, secure file-sharing practices are a must in safeguarding sensitive data from unauthorized access: Opt for reputable and encrypted file-sharing platforms that offer access controls and password protection. Make use of link expiration features to restrict file access to specific time periods. Furthermore, educate employees about the potential risks associated with public file-sharing services and discourage sharing sensitive data through unsecured channels.

10.22.23

Conduct regular phishing awareness training

Phishing is one of the most common cyber threats, with the number of phishing-related daily emails reaching millions. Speaking to business owners and managers, consider implementing routine phishing awareness training for employees, focusing on simulated phishing exercises to let employees know how to recognize and report phishing attempts. Given that employees are common targets for phishing attacks, educating them in this area can significantly reduce the risk of such infiltrations.

10.21.23

Implement an MDM solution

Deploying a mobile device management (MDM) system is deemed a must for enterprises aiming to safeguard and govern corporate-owned mobile devices effectively. MDM software facilitates administrators to remotely set up, supervise and fortify devices utilized within the company. This ensures the implementation of strong security measures, such as device encryption, passcode mandates and data wipe functionalities in instances of device misplacement or theft. Additionally, MDM simplifies software updates, application distribution and access management for sensitive corporate information.

10.20.23

Consider cyber insurance

Despite their emergence in relatively recent history, cyberattacks are a growing, persistent concern for individuals and businesses alike. Cyber insurance offers financial protection and peace of mind in case of a cyber incident. It can cover various expenses, including:

The process of becoming insured requires an assessment of your risk exposure and the consideration of the type of coverage that best suits your needs.

10.19.23

Free antivirus: buyer beware

Free antivirus software can be tempting, but it’s important to be aware of the risks. In exchange for not charging a price, some free antivirus solutions may collect and sell your personal data. Others may not provide any real protection at all.

If you’re looking for antivirus software, it’s best to stick with trusted vendors with viable business models. These companies are more likely to invest in developing and maintaining effective antivirus protection.

Here are some tips for choosing an antivirus solution:

  • Look for a solution from a reputable vendor with a good track record.
  • Read reviews from other users to get their feedback on different antivirus solutions.
  • Make sure the solution offers the features you need, such as real-time protection, malware scanning, and phishing protection.
  • Consider your budget and choose a solution that fits your needs.

By following these tips, you can choose an antivirus solution that will help protect your computer from malware and other threats.

10.18.23

Be mindful of voice assistants

While voice assistants offer convenience and entertainment value, be mindful of their potential privacy implications. Voice assistants continually listen for voice commands whenever active, raising concerns about data privacy and security. Review the device’s privacy settings and disable any features that don’t align with your security preference, and be cautious when linking sensitive accounts or providing personal information through voice commands. Consider also regularly reviewing and deleting voice recordings stored by the assistant to limit potential data exposure.

10.17.23

Explore hardware security keys

Enhance your online security by considering hardware security keys. These keys are physical devices that provide 2FA, working to protect your accounts from unauthorized access. They generate unique cryptographic codes that are difficult for attackers to replicate. When logging into an account of yours, you’ll need to insert the security key and follow the prompts to complete the authentication process. Notably, hardware keys are more secure than traditional 2FA methods like SMS codes or authenticator apps, as they are not susceptible to phishing attacks or malware.

10.16.23

Secure your smart home

As the adoption of smart home technology continues to rise, it’s a must to safeguard your home and personal information. To achieve this, consider following these five guidelines:

  1. Ensure strong, unique passwords are used for all smart devices and regularly update them.
  2. Keep your devices’ firmware and software up to date to address any potential security vulnerabilities.
  3. Create a separate network solely for your smart devices — isolating them from your primary network — and add a firewall for an additional layer of protection.
  4. Set up voice assistants with voice recognition and limit access to sensitive information.
  5. Thoroughly review the privacy settings of your smart home devices to control the data they collect and share. Make adjustments accordingly based on your security preferences.
10.15.23

Embrace zero-knowledge encryption

Zero-knowledge encryption is a robust method of safeguarding your sensitive data and communications. With this encryption approach, third-party service providers store your data in an encrypted form while the decryption key is held by only you. Zero-Knowledge encryption can apply both personally and professionally: Services that embrace zero-knowledge encryption — such as certain secure messaging apps and cloud storage platforms — ensure that even if their systems are breached, your data remains unreadable and secure.

10.14.23

Enable ‘Find My Device’

You can protect your mobile devices from loss or theft by enabling the “Find My Device” or similar tracking features available on most smartphones and tablets. These tools allow you to locate your device’s last known location, lock it remotely or even erase its data if necessitated. To activate this feature on iPhone, go to:

  1. Settings.
  2. Tap on your name at the top of the screen.
  3. Click “Find My.”
  4. Switch “Find My iPhone” to on. 

In the same settings section, you can also opt to share your location with family and friends.

10.13.23

Be cautious when installing browser extensions

Opt for well-known and reputable browser extension stores — such as Chrome Web Store or Firefox Add-ons — to reduce the risk of downloading counterfeit or malicious software. Furthermore, avoid granting unnecessary permissions to extensions, as these permissions may compromise the integrity of your information. Regularly review your installed extensions — ideally on a weekly basis, if not more frequently — and remove any that you no longer use to reduce the attack surface and keep your browser secure.

10.12.23

Act fast if your account was breached

Data breaches and account breaches happen all the time, so it’s important to know what to do if one of your accounts is affected. Here are some tips:

  • Change your password immediately. Use a strong, unique password for each of your accounts. A password manager can help you create and manage strong passwords.
  • Enable two-factor authentication (2FA). 2FA adds an extra layer of security to your accounts by requiring you to enter a code from your phone in addition to your password.
  • Monitor your accounts for suspicious activity. Regularly check your account statements and credit reports for any unauthorized activity.

By following these tips, you can help protect your accounts and your personal information from being compromised in a data breach.

10.11.23

Use a firewall on your computer to block unauthorized access to your network

Firewalls essentially serve as a barrier between your device and the internet. Specifically, they monitor incoming and outgoing network traffic, blocking unauthorized connections and potential cyber threats. Most devices come with built-in firewalls, but for additional peace of mind, you can also opt for third-party firewall software. In doing so, configure the firewall to allow only trusted applications to access the internet and block any suspicious or unknown connections.

10.10.23

Shred digital files for secure disposal

Deleting files from your computer doesn’t mean they’re really gone. With the right tools, someone could recover sensitive data even after you’ve deleted it.

That’s why it’s important to shred digital files before you dispose of them. File shredding software overwrites deleted items to make them far less accessible.

There are many different file shredding software programs available, both free and paid. Some popular options include:

  • Eraser
  • ShredIt
  • iShredder

To use a file shredding software program, simply select the files you want to shred and then click the “Shred” button. The software will then overwrite the files with random data, making them virtually impossible to recover.

Here are some tips for using file shredding software:

  • Shred files regularly. Don’t wait until you’re about to dispose of a computer or hard drive to shred your sensitive files.
  • Shred all copies of a file. If you have a copy of a file on your computer and on a USB drive, shred both copies.
  • Use a secure shredding algorithm. Some file shredding software programs offer different shredding algorithms.

By following these tips, you can use file shredding software to securely dispose of your sensitive digital files.

10.09.23

Wipe all personal data before recycling or selling old personal devices

Before disposing of or selling your old electronic devices, it’s very important to securely wipe all personal data. Deleting files generally isn’t enough, as they can still be recovered by a persistent and skilled hacker: Use specialized data erasure software or perform a factory reset to make sure all data is permanently removed and inaccessible. This applies not only to smartphones but also to laptops, tablets and other devices containing personal information.

10.08.23

Force HTTPS connections with browser extensions for better security

HTTPS is a secure way to browse the web, while HTTP is not. That’s why you should always look for the lock icon in the address bar before entering sensitive information, such as your credit card number or social security number.

But what if the website you’re visiting doesn’t offer HTTPS? That’s where browser extensions like HTTPS Everywhere come in. HTTPS Everywhere automatically redirects you to the HTTPS version of a website whenever possible. This helps to protect your privacy and data security by encrypting your connection to the website.

To install HTTPS Everywhere, simply visit the Chrome Web Store or Mozilla Add-ons website and add the extension to your browser. Once installed, HTTPS Everywhere will automatically start working in the background. You don’t need to do anything else.

Here are some of the benefits of using HTTPS Everywhere:

  • Protects your privacy and data security. By encrypting your connection to websites, HTTPS Everywhere prevents third parties from eavesdropping on your traffic. This is especially important when you’re entering sensitive information, such as your credit card number or social security number.
  • Makes it easier to identify secure websites. When you’re using HTTPS Everywhere, you’ll always see the lock icon in the address bar on secure websites. This makes it easy to tell which websites are safe to visit and which ones are not.
  • Works on most major websites. HTTPS Everywhere is compatible with most major websites, including Google, Facebook, Amazon, and Twitter. This means that you can use the extension to protect yourself on the vast majority of the websites you visit.

If you’re concerned about your online security, I highly recommend installing HTTPS Everywhere. It’s a free and easy way to make your browsing experience more secure.

10.07.23

Be cautious when sharing personal information with online surveys or quizzes.

Scammers may use fake surveys to collect personal data for the purpose of identity theft or fraud, therefore, exercise caution when participating in online surveys or quizzes that request personal information. Always verify the credibility and legitimacy of the website or application before sharing any data, and avoid providing sensitive details like your social security number, financial information, or passwords.

10.06.23

Physically backup your data

Beyond backing up your data on a secure cloud network, consider also fortifying your information through physical storage. Physical backups provide an added layer of protection, ensuring that your data is safeguarded even in the event of unexpected digital mishaps or cyberattacks. Keep these physical storage devices in a safe and secure location — ideally away from the primary data source — to further ensure their effectiveness in preserving your sensitive data.

10.05.23

Avoid oversharing on social media

While social media is made for sharing, ensure that the information you publicly release doesn’t unnecessarily expose you to cyber risks. Avoid posting personal information like your full address, phone number, birth date or financial details, as such information can be exploited by malicious actors. Refrain also from sharing your vacation plans in real-time, as it can signal your home is unoccupied, making you vulnerable to burglaries. Consider regularly reviewing your social media profiles for any oversharing and adjust your privacy settings accordingly.

10.04.23

Avoid mobile redirects with privacy-focused browsers and network-level tools

Mobile redirects can be annoying and intrusive. They can also be dangerous, as they can lead you to malicious websites that can infect your device with malware or steal your personal information.

One way to avoid mobile redirects is to use a privacy-focused browser. These browsers are designed to protect your privacy and security online. They often include features such as ad blockers, tracking blockers, and pop-up blockers.

Some popular privacy-focused browsers include:

  • Brave
  • DuckDuckGo
  • Firefox Focus
  • Tor Browser

Another way to avoid mobile redirects is to use a network-level tool such as Pi-hole. Pi-hole is a network ad blocker that can block ads and other unwanted traffic across your entire home network.

Here are some tips for using privacy-focused browsers and network-level tools to avoid mobile redirects:

  • Install a privacy-focused browser on your mobile device.
  • Enable the ad blocker and tracking blocker features in your browser.
  • Consider using a network-level ad blocker such as Pi-hole.
  • Be careful about clicking on links in messages or posts. If you see a link that you’re not sure about, don’t click on it.
  • Keep your browser and operating system up to date.

By following these tips, you can help to protect yourself from mobile redirects and other online threats.

10.03.23

Enable two-factor authentication (2FA) on all your important online accounts

2FA adds an extra wall of protection alongside your password and username. Two-factor authentication (2FA) works by providing you with an exclusive code that you must enter along with your credentials. This prevents unauthorized access, even if your password is compromised. Enable 2FA on all your accounts — particularly those that hold sensitive data.

10.02.23

Use a VPN when connecting to public Wi-Fi networks to secure your internet traffic

While public Wi-Fi networks should generally be avoided where possible, protect your online browsing from potential cyberattacks by a virtual private network (VPN). A VPN is a cost-effective way to encrypt your internet traffic, making access difficult for hackers — even on unsecured networks. It essentially creates a secure tunnel between your device and the internet, ensuring that your data remains private and confidential. Choose a reputable VPN service that does not log your online activities and offers strong encryption protocols.

10.01.23

Regularly review and update your privacy settings on social media platforms.

You can fortify your online privacy by regularly reviewing and updating your privacy settings on all social media platforms. Check in on who can view your posts, profile information and friend lists, preferably limiting the visibility of your posts to those you know. Also, regularly review third-party app permissions and revoke access to any suspicious or unused applications.

Here are some tips for reviewing and updating your privacy settings on social media platforms:

  • Check who can see your posts, profile information, and friend lists. Most social media platforms allow you to choose who can see your posts and profile information. You can also choose to keep your friend lists private.
  • Limit the visibility of your posts to those you know. If you want to keep your posts private, you can choose to only share them with friends or with a select group of people. You can also choose to make your posts public, but be aware that anyone on the internet will be able to see them.
  • Review third-party app permissions and revoke access to any suspicious or unused applications. Social media platforms allow you to connect third-party apps to your account. These apps may have access to your personal information, so it’s important to review their permissions and revoke access to any apps that you don’t use or that you don’t trust.

Here are some additional tips for protecting your privacy on social media:

  • Be careful about what information you share online. Don’t share your address, phone number, or other personal information with people you don’t know.
  • Be wary of friend requests from people you don’t know. If you receive a friend request from someone you don’t know, don’t accept it.
  • Be careful about clicking on links in posts or messages. If you see a link that you’re not sure about, don’t click on it.
  • Use a strong password for your social media accounts and enable two-factor authentication.

By following these tips, you can help to protect your privacy on social media platforms.