Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Security Tip of the Day

Daily tips to create awareness of cyber threats and empower Total Defense users to be safer and more secure online with our security tips and resources..


June 2020
06.30.20

Connect an Android phone to your Chromebook for streamlined security

Some Chromebooks support automatic pairing with Android phones. This combination makes it easy to share a data connection between the two devices and to sign in without having to type in a password.

An on-device security application can help protect your Android handset or tablet from multiple threats. Total Defense Mobile Security shields against malware, privacy intrusions, and data breaches, with minimal impact to performance.

06.29.20

Pick antivirus that won’t grind your PC to a halt

Depending on the solution, antivirus software can noticeably degrade PC performance as it scans. This hit can be particularly costly if you rely on VoIP, video conferencing or virtual desktop software that needs steady performance. Make sure your AV solution doesn’t jeopardize your applications.

06.28.20

Recognize charity scams

Charity scams are a predictable feature of any major disaster. Usually, these scams have tell-tale signs such as typos, odd return email addresses and aggressive marketing language. Just to be safe, check for guidance from bodies such as the Federal Trade Commission, and avoid opening any messages with senders you don’t recognize.

06.27.20

Get email faster by using the Gmail or Outlook apps

If you have a Gmail or Outlook.com email address, you can get your email faster if you use the official apps than if you rely on a standards-based mail client like Apple Mail or Mozilla Thunderbird. That’s because the apps use proprietary protocols that those clients do not. The tradeoff is having to see ads in your inbox.

06.26.20

Turn a few laptop ports into many with a dock

Modern laptops are quite thin, with some having only a single port or two. If you need more ports, you can use a docking station. These accessories can turn a single USB-C or Thunderbolt connector into many other types of I/O, including USB-A, SD card readers, Ethernet, and video ports (HDMI, DisplayPort, etc.)

06.25.20

Adjust Quality of Service in your router

Some internet routers provide advanced settings that let you determine how certain types of traffic are handled by your network. This functionality, usually called Quality of Service, is useful for ensuring that demanding applications like online games and VoIP or video conferencing get priority.

06.24.20

Back up your Mac’s file to iCloud

Once you’re signed into iCloud on a Mac, you can backup your local files to the cloud via an iCloud Drive setting. Just go to System Preferences -> Apple ID and click on the “Options” button next to iCloud Drive and enable the setting for “Desktop and Document Folders.” Doing so will make it so that anything on your desktop is synced with your iCloud account.  

06.23.20

Protect your data with a good digital defense

Make sure that you regularly make offline back-ups of all of your computers, phones, or other devices. Disconnect them backups—both virtually and physically—from your main systems. Use high-quality antivirus and anti-malware software appropriate to your devices and make sure to enable automatic updates on them. Make sure your devices have the latest operating software updates and set those updates to load automatically if you can. Use two-factor authentication when possible. This means the hacker would need more than just your password and user ID to access your system—he would also need something like a one-time code that is sent directly to your phone.

06.22.20

Don’t expect emails from the IRS

The IRS is the only source of official guidance on tax refunds and stimulus payments. The agency doesn’t directly email individuals and will instead reach out only via mail. For all other information, the IRS website is your best bet, as it includes lots of FAQs and some online tools for helping you calculate tax withholding and stimulus eligibility.

06.21.20

Check your settings before joining an online meeting

If you use online meeting software for audio and video conferencing, it’s recommended to use their preview screens to ensure all your settings are right before joining. You can mute your mic and/or turn off your camera there. Doing so can help avoiding leaking information or making comments that you didn’t want others to hear.

06.20.20

Be aware of options selected by default to limit spam

When you sign up for some online accounts or services, there may be a section that provides you with the option to receive email about other products and services. Sometimes there are options selected by default, so if you do not deselect them, you could begin to receive unwanted spam email from those lists as well.

06.19.20

Know the different types of Ethernet ports

All Ethernet ports on consumer electronics like laptops and gaming consoles look the same from the outside, but they’re not necessarily the same under the hood. Some support Gigabit Ethernet (1000 Mbps), while others are merely Fast Ethernet (100 Mbps). Even faster speeds like 10 Gigabit Ethernet are available on some computers like the iMac Pro.

06.18.20

Try mesh networking

Wi-Fi coverage can become very spotty if you’re far from the router or there are a lot of walls and furniture in between you and it. Mesh networking can solve this problem, by distributing coverage throughout a home via multiple points/satellites that all broadcast the same SSID. You’re no longer as reliant on being close to the main router.

06.17.20

Position your external monitor in a private place

Connecting your laptop to an external monitor gives you much more real estate for working and for viewing media like video. Positioning is important, though – since these monitors are so big, they can broadcast a lot of information in plain view. To avoid walk-by surveillance, position them somewhere where they can’t easily be seen, like away from a window or near a corner.

06.16.20

Use privacy settings on social networking sites

Social networking sites typically allow you to choose who has access to see your email address. Consider hiding your email account or changing the settings so that only a small group of people that you trust are able to see your address. Know that when you use applications on these sites, you may be granting permission for them to access your personal information. So, be cautious about which applications you choose to use.

06.15.20

Consider a screen protector for your laptop

If you want to keep what happens on your laptop screen to yourself, you might need a screen protector. These specialized accessories block certain lines of sight, so that nearby people can’t see what’s happening. This is particularly useful for keeping usernames to yourself; it also lets you turn off automatic password scrambling, a feature which can be annoying if you’re not sure that you’re typing it in correctly.

06.14.20

Switch to contactless payments for better hygiene

Worried about getting pathogens on your credit/debit card or on the change you receive after a cash payment? Explore options for contactless payments. These range from NFC/chip-based technologies like Apple Pay and Google Pay to code scanners like Walmart Pay and Target Wallet. All you need is a bank account or card to link the payment solution to and, in the case of Apple/Google Pay, a compatible phone.

06.13.20

Enable automatic software updates when possible

Enable automatic software updates whenever possible. This will ensure that software updates are installed as quickly as possible. Do not use unsupported EOL software. Always visit vendor sites directly rather than clicking on advertisements or email links. Avoid software updates while using untrusted networks.

New vulnerabilities are continually emerging, but the best defense against attackers exploiting patched vulnerabilities is simple: keep your software up to date, some software can check for updates automatically like our Ultimate Internet Security. This is the most effective measure you can take to protect your computer, phone, and other digital devices.

06.12.20

Stay current – Keep pace with new ways to stay safe online

Keep up with new technology and ways to manage privacy. Visit staysafeonline.org, our own Security Tip of the Day or other trusted websites for the latest information about ways to stay safe online. Talk about what you discovered with your family and engage them on a regular basis to share what they know about privacy.

06.11.20

Be wary of update links in an email message

Attackers have used email messages to direct users to websites hosting malicious files disguised as legitimate software updates. Users should also be suspicious of email messages that claim to have a software update file attached—these attachments may contain malware.

06.10.20

Parents – remain positively engaged

Pay attention to and know the online environments your children use. In the real world, there are good and bad neighborhoods, and the online world is no different. Help them to identify safe and trusted websites and apps. Encourage them to be cautious about clicking on, downloading, posting and uploading content.

See our recent article “Having conversations with your kids about online safety during pandemic” for more information on what parents and kids can do to protect themselves in today’s fast-changing digital environment.


06.09.20

Configure two-factor authentication on all financial accounts

Two-factor authentication is recommended for everyday use in applications and services, but it’s especially important on banking accounts, as well as those for credit cards. Most financial institutions offer multiple options for verifying your identity after the correct entry of a password. An automated voice call is technically safer than an SMS text, if the option is available.

06.08.20

Mute smart speakers during sensitive conversations

Have an Amazon Alexa, Google Nest Mini or other smart speaker? You probably want to mute it if you join a lot of phone calls or video conferences while at home. This is easy in most cases; for example, the Nest Mini’s mute switch is on the back. While muted, speakers won’t listen for their respective keywords or upload any audio data to the cloud.

06.07.20

Watch what information you give away

During this global pandemic, be extra alert to the kinds of information being collected to complete any online transaction. If the merchant is requesting more data than you feel comfortable sharing, cancel the transaction. You only need to fill out required fields at checkout and you should not save your payment information in your profile. If the account autosaves it, after the purchase go in and delete the stored payment details.

06.06.20

Do your e-commerce homework

Fraudsters are fond of setting up fake e-commerce sites in times of unrest like the current pandemic. Prior to making a purchase, read reviews to hear what others say about the merchant. In addition, look for a physical location and any customer service information. It’s also a good idea to call the merchant to confirm that they are legitimate.

06.05.20

Be very careful what you download

Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don’t know and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.

06.04.20

Create a password for online video meetings

Video conferencing software is more popular than ever. That said, there are some security liabilities associated with its use, such as not enforcing password requirements for attendees. A password-less meeting could in theory let anyone join in, which could in turn let them listen to the discussion and steal sensitive information as well. Require a password or PIN (or organizer approval) to join.

06.03.20

Set up a VPN for remote access to workplace applications

Some companies require employees to use virtual private networks (VPNs) to access applications while out of the office. Even if not a technical requirement, though, it’s a good idea to use a VPN so that you avoid risks such as data interception from man-in-the-middle attacks, as well as ISP surveillance. VPNs are available as both paid subscriptions from dedicated providers and as utilities built into some web browsers, like Opera.

06.02.20

Know the real difference between USB-A and USB-C

Reversible USB-C ports aren’t just slimmer than old-school USB-A ports – they’re also much faster in almost all instances. The USB specification does not support the USB-A connector after USB 3.2, meaning it can’t deliver the faster speeds of USB 4.0 and beyond. But USB-C can. Use USB-C for faster file transfers and better Ethernet speeds, too.

06.01.20

Use Ethernet if you’re working from home

As work-from-home arrangements become increasingly common, the quality of home internet connectivity is more important than ever. A direct Etherent connection to your router or switch will provide better stability and possibly faster speeds than Wi-Fi – plus it’s immune to certain types of cyberattacks against Wi-Fi security mechanisms. If your laptop lacks a built-in Ethernet jack, consider a compatible Ethernet-to-USB adapter instead.