No items in your cart
No items in your cart
Be careful when clicking directly on links in emails, even if the sender appears to be someone you know. Attempt to independently verify website addresses (e.g., contact your organization’s helpdesk, search the internet for the sender organization’s website or the topic mentioned in the email). Pay attention to the website addresses you click on, as […]
Several HP laptops come with a built-in privacy screen to help limit the visibility of your display from people on either side of you. Known as HP Sure View, there are a couple different ways to turn this setting on, depending on the model of your computer. For most models, you simply need to press […]
It’s considered a best practice in the world of cybersecurity to limit access only to people who need it. To reduce your sharing settings for a folder in Google Drive, right-click the folder and select “Share.” Add people or groups who need access and remove those who don’t. If you use Drive as part of […]
If you’re worried about potentially sharing personal information from your environment during your next Skype call, consider blurring the background. To do this for all calls, click on your profile picture, and navigate to the audio and video settings. You can select “Blur” under the section that reads “Choose background effect.”
If you use two monitors, optimize their positioning. If you use each monitor about the same amount, arrange both directly in front of you, with a slight curve. If you use one more than the other, place it in front of you, and curve the other toward your dominant eye. Also, always position monitors discreetly […]
Business information typically includes a mix of personal and proprietary data. While you may think of trade secrets and company credit accounts, it also includes employee personally identifiable information (PII) through tax forms and payroll accounts. Do not share PII with unknown parties or over unsecured networks.
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.