No items in your cart
No items in your cart
Some devices will automatically seek and connect to available wireless networks or Bluetooth devices. This instant connection opens the door for cyber criminals to remotely access your devices. Disable these features so that you actively choose when to connect to a safe network.
Lock your device when you are not using it. Even if you only step away for a few minutes, that is enough time for someone to steal or misuse your information. Set your devices to lock after a short time and use strong PINs and passwords. In a world where we are constantly connected, cybersecurity […]
When you find yourself out in the great “wild Wi-Fi West,” avoid free Internet access with no encryption. If you do use an unsecured public access point, practice good Internet hygiene by avoiding sensitive activities (e.g., banking) that require passwords or credit cards. Your personal hotspot is often a safer alternative to free Wi-Fi.
When you’re traveling—whether domestic or international—it is always important to practice safe online behavior and take proactive steps to secure Internet-enabled devices. Back up your contacts, financial data, photos, videos, and other mobile device data to another device or cloud service in case your device is compromised and you have to reset it to factory […]
Like on an airplane or in an airport, hotel, train/bus station or café — be sure to conﬁrm the name of the network and exact login processes with appropriate staﬀ to ensure that the network is legitimate. Cybercriminals can easily create a similarly named network hoping that users will overlook which network is the valid […]
You might have set up an email auto responder for anyone who messages you while you’re on vacation or otherwise not checking your workplace email. Don’t reveal too much information in these messages, as it might tip off someone to your whereabouts and facilitate theft or vandalism at your home.
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.