2021 was, unfortunately, a predictably good year for cybercriminals. With remote and hybrid working solutions gaining popularity, people are using the internet in more ways than ever before, making them ripe targets for cybercrime. In addition, malware that targeted major government infrastructure succeeded with the Colonial Pipeline, which was the victim of a ransomware attack. […]
Most of us can leave WhatsApp chats hanging around like a gallery no one ever visits. By periodically getting rid of the conversations, you don’t need to see or reference anymore, you’ll prevent any sensitive details from falling into the hands of a thief. They don’t even need to physically steal your phone either – […]
A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unidentified to those who would be interested in mitigating the vulnerability (including the vendor of the target software). Until the vulnerability is ended, hackers can exploit it to adversely affect computer programs, data, additional computers or a network. An exploit focused at […]
Zero-day bugs have been a hot topic for cybersecurity in 2022. Google’s July announcement of its fourth zero-day exploit of the year is enough to worry even everyday Chrome users. But are zero-day bugs really cause for concern? Let’s look at what zero-day means, how it’s exploited by hackers and what you can do to […]
It can be easy to shrug off the danger of cyberattack as something that won’t happen to you because you’re just a regular person with a normal life. But if your information ends up in the wrong hands, hackers don’t care. One of the most dangerous threats to cybersecurity is complacency. Be sure to proactively […]
Your business website may be a convenient backdoor into your systems which hackers could exploit to gain access to sensitive information, or simply hijack your website and hold it to ransom. As hackers will often bounce through VPNs across the globe, you can use Google Analytics to monitor where traffic is coming from and flag […]
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.opentext.com/about/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.