By conducting regular audits on each of your social media accounts, look to review privacy settings, update passwords, ensure two-factor authentication is functioning properly and remove any suspicious connections. As cybercriminals commonly leverage public social media information, these routine checks strengthen your digital security and protect your personal information from potential breaches and attacks.
Scammers may use fake surveys to collect personal data for the purpose of identity theft or fraud, therefore, exercise caution when participating in online surveys or quizzes that request personal information. Always verify the credibility and legitimacy of the website or application before sharing any data, and avoid providing sensitive details like your social security […]
While social media is made for sharing, ensure that the information you publicly release doesn’t unnecessarily expose you to cyber risks. Avoid posting personal information like your full address, phone number, birth date or financial details, as such information can be exploited by malicious actors. Refrain also from sharing your vacation plans in real-time, as […]
Maintaining Facebook security can be challenging due to the complex nature of the company’s applications. It’s likely that you’ve logged into Facebook from various devices and apps, hence the necessity to frequently check these connections. Navigate to the Security tab on Facebook’s Settings page to view your active sessions and the associated browsers and apps. […]
Numerous social media profiles are fabricated with the intent to gather information deceptively. To determine if a profile is deceptive, download the profile picture and perform a Google image search to check if it’s a stock image. If so, engaging with the profile poses a risk and should be avoided.
While email is perhaps the most common source of phishing attacks, they can come from practically anywhere. Text messages, social media, traditional mail and even phone calls may all follow the common phisher’s playbook by pretending to be a legitimate source asking for information. Remember: If you’re not sure, contact the alleged source directly with […]
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.opentext.com/about/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.