Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Security Tip of the Day

Daily tips to create awareness of cyber threats and empower Total Defense users to be safer and more secure online with our security tips and resources..


July 2023
07.31.23

Keep your cybersecurity as simple as possible

When it comes to business cybersecurity, there can be too much of a good thing. As your cybersecurity solutions become more complex, they also become more difficult to manage, which can cause configuration or other security issues. For example, it’s not a good idea to have multiple antivirus or antimalware solutions running at one time. Instead, choose one comprehensive solution.

07.30.23

Why is computer security crucial?

Since computers have become integral to our daily lives and handle a vast amount of personal data, it is vital to establish and maintain robust security measures. Computers are indispensable in various aspects of our lives. Properly setting up your home computer before connecting to the internet is essential to protect both the device and your personal information. Effective computer security guarantees the safe processing and storage of our data.

07.29.23

Have a plan in place in case your business experiences a cyber incident

Even the best cybersecurity money can buy can’t claim to be invulnerable to cyberattacks. Cybercrime prevention is vital, but so is having a response plan in the event of an incident. This means training your employees on what to do if they recognize a cyberattack is taking place. Knowing who to contact and having clear communication channels within your organization will ensure a swift and efficient response to minimize potential damage.

07.28.23

Beware of counterfeit antivirus software

Numerous security applications lack credibility. Some may even heighten your vulnerability while claiming to be “cleaners” or “protectors” of your digital activities. Choose a reputable vendor, such as Total Defense, and remain cautious of persistent alerts and forceful installation prompts. By doing thorough research and reading reviews from trusted sources, you can avoid falling victim to potentially harmful or ineffective software.

07.27.23

Use a next-generation firewall instead of a traditional firewall

This mainly applies to businesses. Traditional firewalls have limited potential and don’t typically include features like built-in malware protection and application monitoring. Next-generation firewalls do and are much more powerful than their counterparts. As a result, upgrading to a next-generation firewall can significantly enhance overall security and better protect sensitive information from new threats.

07.26.23

If you’re on the go, encrypt everything you possibly can

If you’re the type of person who carries around a lot of sensitive information on any type of external storage medium, encrypt it and add password protection. That way, if you lose it or a criminal steals it, the information inside can’t be read. Consider using reputable encryption software to further secure your digital assets and stay safe in the digital realm.

07.25.23

Review website privacy policies

Prior to providing your email address online, ensure there is a privacy policy. Trustworthy websites typically include a link to their privacy policy on forms requesting personal information. Familiarize yourself with this policy before offering your email address or other personal details, so you understand how the site’s owners intend to use the information. By doing so, you can minimize the risk of your information being shared or sold to third parties, ultimately reducing unwanted email and safeguarding your privacy.

07.24.23

Turn off information storage on your browser

Many computer users take advantage of the convenience of saving credentials into your browser so you don’t have to enter them repeatedly. This lets you instantly fill out credit card numbers and personal information across all websites. However, all this data is stored in your browser, meaning a criminal can potentially access it.

A far safer alternative is to disable this feature completely and use a password manager. Password managers are separate from your browser and, unlike browser-based credential storage, are always protected by a master password.

07.23.23

Pay with your phone, not your credit card, whenever you can

Apps such as Apple Pay and Google Pay aren’t just more convenient than carrying around a bunch of credit or debit cards, they’re also more secure. If you use a card to pay for an in-person transaction, you could fall victim to a type of cybercrime called credit card skimming. By comparison, paying with your phone attaches a single-use code to your credit or debit card number that can’t ever be used again. This means the numbers on these cards can’t be read by credit card skimming devices.

07.22.23

If you own a business, consider replacing your MPLS network with SD-WAN

Multiprotocol layer switching (MPLS) networks have, for decades, been the gold standard for businesses that need wide-area network connectivity between several different locations. But due to their age, they have difficulty integrating with newer technologies such as cloud computing. They’re also notoriously expensive and difficult to configure. An increasingly popular alternative to MPLS is software-defined wide area networks (SD-WANs). As the name suggests, they’re a type of WAN that’s controlled via intelligent software. In addition to being far easier to implement with cloud computing, they’re often less expensive. They’re also far easier to configure, as every endpoint device on a network is unified by the software interface: Make a change in the software, and it can be automatically applied to all other networking hardware.

07.21.23

When using 2FA or MFA, use app-based authentication when possible

Two-factor authentication (2FA) and multi-factor authentication (MFA) are excellent ways to help protect your online accounts, but they’re not 100% secure. If they know you’re requesting a secondary code, a savvy cybercriminal can potentially intercept and read the associated text message, gaining access to the code and your account. Whenever possible, use app-based authentication with a frequently-changing code that can only be read within the app. Because there’s no text message to intercept, app-based authentication is more secure than receiving a code.

07.20.23

Recognize how to spot a counterfeit social media account.

Numerous social media profiles are fabricated with the intent to gather information deceptively. To determine if a profile is deceptive, download the profile picture and perform a Google image search to check if it’s a stock image. If so, engaging with the profile poses a risk and should be avoided.

07.19.23

Disable mobile connectivity technologies you don’t use

While faster than 4G LTE, 5G has to function in addition to 4G LTE connectivity, meaning having both on at the same time can rapidly drain your battery. Many mobile devices these days support 5G technology and have it on by default, but not every area is covered by 5G. If you’re in an area that doesn’t have 5G, you can save a significant amount of battery by disabling it in your phone’s settings.

07.18.23

Upgrade devices that are incompatible with modern operating systems.

Newer operating systems tend to be more secure than older ones, particularly when connected to IP networks like the internet. Consider replacing any devices unable to support the latest versions of their respective operating systems (e.g., a PC incapable of installing Windows 11) with up-to-date alternatives.

07.17.23

Prevent carpal tunnel with wrist wrests

Anyone who uses a computer for long periods of time is vulnerable to painful carpal tunnel syndrome. A great way to help prevent it is to use wrist rests on your mousepad and below your keyboard. These will help keep your joints straight as you type and click. Also, taking breaks to stretch your wrists and fingers can provide further relief and protection against carpal tunnel.

07.16.23

Put your router somewhere away from interference

Where you place a wireless router can make all the difference in its range. While you probably already realize walls, floors and ceilings can hinder a Wi-Fi broadcast, you should pay special attention to microwaves, fireplaces and electronic devices such as refrigerators or air conditioners. These can severely distort the signal.

07.15.23

Improve your PC’s performance by eliminating bloatware

Numerous PCs include preinstalled software that is likely never used. Bloatware not only takes up precious disk space but also slows down your computer. Standard removal methods, such as sending the icon to the trash/recycle bin, might not always work. Therefore, consider using third-party tools to assist in uninstalling unwanted programs.

07.14.23

If you’re using a password manager, keep your backup credentials safe

Good password managers let you have one master password along with a provided backup code. The backup code exists in case you forget your master password. Keep this information somewhere safe, perhaps on an encrypted external storage drive, so that you can securely access your accounts in the event of a forgotten master password without relying solely on online recovery methods.

07.13.23

Close credit accounts you no longer use

It’s not a good idea to have too many unused credit accounts. This introduces possible security risks, and in some cases, it may harm your credit score.

You can check how many open credit accounts you have by visiting a credit bureau’s website, such as Experian, TransUnion or Equifax. You may discover you have more open accounts than you realized.

07.12.23

Refrain from using a debit card or bank account for online purchases.

Debit accounts, if compromised, put you at a greater risk of losing money, as unauthorized users can easily withdraw funds. On the other hand, credit cards offer increased fraud and liability protection, along with chargeback options, making them a safer choice for online shopping. Ideally, opt for payment platforms like Apple Pay or Google Pay, which keep your card number undisclosed.

07.11.23

Safeguard your mobile data with a Virtual Private Network (VPN) service

A VPN ensures a secure internet connection by maintaining the privacy of your data exchanges over Wi-Fi. It encrypts information at both the sender’s and receiver’s ends, blocking any inadequately encrypted traffic. Whenever you need to use a public Wi-Fi access point, remember to connect through a VPN if it’s available.

07.10.23

Examine the permissions requested by browser extensions.

These extensions offer a plethora of indispensable features, ranging from swift page-saving methods to diverse filters that eliminate intrusive content. However, it’s crucial to understand the extent of information they can access. Some extensions even possess the capability to read and modify data on every page you visit. Always ensure the extension is trustworthy before integrating it into your browser.

07.09.23

If you experience “echos,” try using earbuds, headphones or a headset

If people on the other end of your audio feed complain about echoing sound, it’s likely because you’re not using a proper setup. For example, using just a webcam or microphone with external speakers could cause echoing. You can prevent this from happening by ensuring the sound you hear doesn’t feed back into your microphone. Earbuds, headphones or a headset will all work. This simple adjustment will greatly improve your audio quality and make the experience more enjoyable for everyone involved.

07.08.23

Stay vigilant when encountering relatively fresh top-level domains such as .click and .loan

The internet has evolved beyond the typical .com, .org, and .gov domains, introducing a plethora of new ones in the mid-2010s. While some, like .blog and .fitness, are embraced by reputable sources, others like .click and .loan are notorious scam hotspots. Keep a keen eye on your URL bar – typing something like “cheap.loan” might just land you on a perilous site rather than executing a harmless web search.

07.07.23

If you do remote work, invest in a decent webcam

The last thing you want during a video call is to look unprofessional with a grainy or low-resolution camera feed, so purchasing a quality webcam is worth it. However, just because a webcam claims to have features such as full HD support doesn’t mean the image won’t look terrible. Perform your due diligence, look at premium brands and always check customer reviews. Additionally, consider factors like lighting and camera angle to further enhance your video call appearance and create a professional impression.

07.06.23

Phishing scams can come from anywhere

While email is perhaps the most common source of phishing attacks, they can come from practically anywhere. Text messages, social media, traditional mail and even phone calls may all follow the common phisher’s playbook by pretending to be a legitimate source asking for information. Remember: If you’re not sure, contact the alleged source directly with a different communication method.

07.05.23

Consider a second monitor to boost your productivity

Have you ever found yourself constantly jumping between browser tabs because you need to look at two things at the same time? Maybe you’re writing an email or document and need to refer to another tab for reference. Rather than jumping back and forth between tabs, a second monitor enables you to view two screens at once.

A couple of things to keep in mind: Your video card must support multiple monitors with enough ports to plug all of them in, and make sure you have enough desk space. Finally, don’t forget to configure your OS to recognize more than one display at a time.

07.04.23

Update your web browser immediately, or better yet, set it to update automatically

Web browsers are essential tools for both mobile and desktop devices, making them prime targets for cyberattackers aiming to exploit vulnerabilities in their structures, plugins, extensions, and more. As a result, it’s crucial to update them swiftly by either checking an app store (for mobile) or locating the appropriate button in their settings menu (for desktop). Better still, configure your browser to update automatically or on a predetermined schedule.

07.03.23

If you don’t get a lot of sun at your computer, consider a sunlamp

Many underestimate the necessity of exposing yourself to natural sunlight for at least 5-10 minutes a day. A persistent lack of sunlight can lead to negative psychological symptoms such as anxiety and depression. At the same time, not everyone lives in a climate that gets much sunlight. If you can’t spend some time outdoors each day, using a sunlamp for 30-60 minutes each day can help. It’s not a perfect substitute, but it’s certainly better than nothing.

07.02.23

Don’t overindulge in social media

Social media can be a great way to stay in touch with friends and family. However, it’s possible to have too much of a good thing. A common concern researchers have expressed is that social media can make you less happy, as you may constantly be comparing yourself to others. The best defense is to not spend too much time on social media. If you have trouble peeling yourself away, set up a timer to limit how long you spend scrolling. Many free apps can accomplish this.

07.01.23

Pay attention to what you’re agreeing to during app installations

It’s common for these free apps to try and sneak in extra software you don’t want during the installation process. For example, a popular cleaning app will attempt to install a partnered antivirus program if you click “I agree” during one of the steps. This can be especially frustrating if you already have an antivirus service installed, as the new service will attempt to replace your existing platform.

The solution? Don’t mindlessly click “I agree” during installations, and read each screen carefully to avoid problems.