Given that it’s possible to use SIM swap scams to get around traditional two-factor authentication, which typically relies on one-time passcodes sent over SMS, downloading an authenticator app can provide some additional security for select accounts. Google and Microsoft have apps that are widely used.
As businesses shifted to accommodate the needs of their newly remote workforces following the COVID-19 pandemic, scammers took note. In order to exploit the uncertainty surrounding the rapid deployment of new software and security solutions, they engaged in deceptive phishing attacks. Targeting Office 365 credentials TechRadar reported on one such attack that encouraged recipients to […]
Use caution when downloading documents and templates attached to emails. They might contain macros-related viruses, which are designed to infect files like Microsoft Word documents. Once you download and open the attachment, the infection will spread, embedding itself in other documents on your computer.
A Microsoft Office macro is a shortcut. It contains code that allows a certain sequence of steps to be automatically performed within documents. Unfortunately, macros have long been favorite tools among cyberattackers, who use them to run malicious code. Unless you absolutely need them, consider disabling macros in the Trust Center of Microsoft Office to […]
Microsoft Office and productivity software in general are both magnets for cyberattacks, since they’re so widely used, meaning any successful attempt will have huge ripple effects. Accordingly, you should, if possible, use the latest versions of these applications, as they’re much more secure than their predecessors and are patched against many known vulnerabilities.
If you forget the password to your local account on your PC, all might seem lost, since there’s no one to email for a reset link. However, you can hedge against this possibility by creating a password reset disk beforehand. “Disk” is a misnomer; all you’ll need is a USB stick or SD Card. Simply […]
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.