New Internet-connected — Internet of Things (IoT) or smart devices — provide a level of convenience in our lives, but they require that we share more information than ever. The security of this information, and the security of these devices, is not always guaranteed. Once your device connects to the Internet, you and your device […]
By searching Google and scanning social media sites, cybercriminals can gather information about your partners and vendors, as well as human resources and financial departments. Employees should avoid oversharing on social media and should not conduct official business, exchange payment, or share personally identifiable information (PII) on social media platforms.
Limit what information you post on social media—from personal addresses to where you like to grab coffee. What many people don’t realize is that these seemingly random details are all that criminals need to know to target you, your loved ones, and your physical belongings—online and in the real world. Keep Social Security numbers, account […]
Most connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with suspicious apps running in the background or using default permissions you never realized you approved—gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and use […]
Do you work with a lot of paper documents or other types of physical media (e.g., CDs or DVDs) that contain sensitive data? If so, it may be advisable to get a paper shredder for safe disposal of such assets once you no longer need them. Pay attention to whether the shredder makes strip, cross, […]
Ever worried about someone looking over your shoulder while you’re on your laptop or tablet? A privacy screen can help. These specialized add-ons reduce the viewing angles on your device so that onlookers can’t see what you’re doing or steal sensitive information. Plus, these screens are usually unobtrusive and easy to install.
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.