People use the notes app on their smartphones for their grocery lists and other reminders, which is perfectly fine. However, do not use your notes app for personal information like your passwords, social security numbers or credit card information. Notes applications are not automatically encrypted, which means that hackers could easily decipher your private information. […]
Avoid connecting your smartphone to any computer or charging station that you do not control, such as a charging station at an airport terminal or a shared computer at a library. Connecting a mobile device to a computer using a USB cable can allow software running on that computer to interact with the phone in […]
Applications (apps) on your smartphone or other mobile devices can be convenient tools to access the news, get directions, pick up a ride share, or play games. But these tools can also put your privacy at risk. When you download an app, it may ask for permission to access personal information—such as email contacts, calendar […]
Having your mobile device lost or stolen is never fun. You lose an essential instrument while also potentially putting your data in jeopardy, too. Services like Find My iPhone and software like Total Defense Mobile Security provide some remedy, since they allow you to remotely wipe the device, erasing all of its contents and settings […]
Stay current with software updates by applying them as soon as they become available. Besides adding new features, updates also patch security weaknesses and fix other bugs that cybercriminals can exploit. Also definitely be sure to configure a passcode, along with other even more secure options such as a fingerprint or facial recognition scan, if […]
This is your first line of defense in the event of loss or theft. Set your phone to automatically lock after being idle and use a password manager to store all passwords. With just one master password, a computer can generate and retrieve all your other account passwords.
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.