If you’re working from home but still need to troubleshoot with an employer IT administrator, don’t jumble help-desk requests in a single feed. Use a VIP channel for IT issues or security concerns so that they are directed straight to an IT professional who can address them. A phishing scam is a good example of […]
Times have certainly changed for the majority of businesses as a result of the pandemic, and specifically, for the employees who are now working from home. This adjustment has caused industries and individuals alike to adjust their workflows. Job security isn’t the only thing to worry about, though; there’s also information security concerns. With so […]
Malware is commonly spread by users clicking on a malicious email attachment or a link. Don’t open attachments or click on links unless you’re confident they’re safe, even if they come from a person you know. Be particularly cautious of attachments with sensational names, emails that contain misspellings, or emails that try to entice you […]
According to 2019 data from the FBI’s Internet Crime Complaint Center, about 1,300 complaints were filed with the agency each day that year. A substantial portion of these concerns contained some form of social engineering, a tactic that can be deployed online, over the phone or during in-person interactions. What is social engineering? A 2019 […]
Be careful when clicking directly on links in emails, even if the sender appears to be someone you know. Attempt to independently verify website addresses (e.g., contact your organization’s helpdesk, search the internet for the sender organization’s website or the topic mentioned in the email). Pay attention to the website addresses you click on, as […]
As businesses shifted to accommodate the needs of their newly remote workforces following the COVID-19 pandemic, scammers took note. In order to exploit the uncertainty surrounding the rapid deployment of new software and security solutions, they engaged in deceptive phishing attacks. Targeting Office 365 credentials TechRadar reported on one such attack that encouraged recipients to […]
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.