Even though computers available at libraries, college campuses and other public locations are convenient resources for low-risk activities like browsing the web or collaborating on documents. They’re less not to good for conducting online banking or shopping transactions, because you can’t be sure they’re totally secure. Bets staying with your own devices and networks for […]
Nowadays it’s not uncommon to find publicly available USB ports for charging phones and other devices. But did you know that malicious hackers can take advantage of these charging locations? Hackers can install malware or viruses and steal your information through these public USB ports. Instead, use one of your own chargers and plug it […]
Although computers may be accessible at libraries, college campuses and other public locations they may be OK for low-risk activities like online browsing or collaborating on documents. They should not be used for conducting activities like online banking or shopping, since you can’t be sure they’re 100 percent secure. Stick to your own devices and […]
Say you are traveling, you’re in an airport or cafe, you may be tempted to plug your device into an open USB port to charge it. This may be risky, since you don’t know if the port is compromised. Use a wall outlet for charging your mobile device or instead bring your own battery pack.
When staying in a hotel or studying in a library, be mindful of how you use publicly accessible computers. There’s no telling who accessed these PCs or how safe they may be. Don’t log in to any personal accounts or input any sensitive information – public computers may be infected with keylogging malware designed to […]
It’s best to limit the devices you take with you on trips to a minimum. Whether it be a smartphone, tablet or computer, any one of these devices could expose your personal information if it’s misplaced or falls into the wrong hands. If you can’t bring it with you, tablets and computers are best left […]
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.