Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Security Tip of the Day

Daily tips to create awareness of cyber threats and empower Total Defense users to be safer and more secure online with our security tips and resources..


January 2025
01.17.25

Keep your work private: smart monitor placement

Using an external monitor can significantly boost your productivity, but it also increases the risk of exposing sensitive information. If you’re working in a shared space or near a window, your screen can be easily seen by passersby.

Why Monitor Placement Matters:

  • Data Breaches: Sensitive information displayed on your screen, such as financial data, customer information, or confidential work documents, can be easily viewed by others.
  • Distractions: Unintentional screen viewing can distract colleagues and reduce your focus.
  • Security Risks: Hackers can potentially use information displayed on your screen to gain unauthorized access to your systems.

Tips for Secure Monitor Placement:

  • Position Your Monitor Strategically:
    • Place your monitor away from windows and doorways to minimize visibility from outside.
    • Consider using a privacy screen to further restrict viewing angles.
    • Position your monitor so that it’s not directly in the line of sight of passersby.
  • Use a Screen Protector:
    • A privacy screen protector can help to further reduce the viewing angle of your monitor.
  • Minimize Screen Sharing:
    • Only share your screen when necessary and ensure that sensitive information is not visible during screen sharing sessions.

By following these simple tips, you can protect your privacy and maintain a secure work environment, even when using an external monitor.

01.16.25

Watch out for disaster online charity scams

Disaster strikes, and suddenly your inbox is flooded with pleas for donations. While your heart might be in the right place, it’s crucial to be vigilant against charity scams.

Spotting the Red Flags:

  • Suspicious Emails: Be wary of emails from unknown senders, especially those with generic greetings, poor grammar, or urgent requests for donations.
  • High-Pressure Tactics: Legitimate charities rarely use high-pressure tactics or demand immediate payment.   
  • Unusual Payment Methods: Be cautious of requests for donations via wire transfer, gift cards, or cryptocurrency.

How to Donate Safely:

  • Research the Charity: Before donating, research the charity thoroughly. Check their website, look for reviews from reputable organizations like Charity Navigator or GuideStar, and see if they are registered with the relevant authorities.
  • Donate Directly: Donate directly to the charity’s official website or by mailing a check.
  • Be Cautious of Social Media Appeals: Be wary of donation requests on social media, as they are often difficult to verify.

Remember: If something feels off, it probably is. Don’t let scammers exploit your generosity.

01.15.25

Keep your work private: invest in a laptop privacy screen

Working in public spaces like coffee shops or airports can leave your laptop screen vulnerable to prying eyes. That’s where a privacy screen comes in handy.

These specialized screen protectors have a special micro-louver technology that narrows the viewing angle of your screen. This means that while you can see your screen clearly, anyone sitting beside or behind you will only see a darkened screen.

Benefits of Using a Privacy Screen:

  • Enhanced Security: Protects sensitive information like login credentials, financial data, and confidential work documents from prying eyes.
  • Increased Privacy: Allows you to work comfortably in public spaces without worrying about others seeing your screen.
  • Reduced Distractions: Minimizes distractions from nearby people, allowing you to focus on your work.

Privacy screens are easy to install and come in various sizes to fit most laptops.

By investing in a privacy screen, you can significantly enhance your security and privacy while working on the go.

01.14.25

Tap and go: embrace contactless payments for hygiene and convenience

Tired of worrying about germs on your physical cards or handling cash? Contactless payment methods like Apple Pay, Google Pay, and Samsung Pay offer a hygienic and convenient alternative.

How Contactless Payments Work:

These systems use near-field communication (NFC) technology to transmit payment information securely. Simply tap your phone or a compatible card near the payment terminal, and the transaction is complete.

Benefits of Going Contactless:

  • Enhanced Hygiene: Minimize contact with potentially contaminated surfaces like cash and card readers.
  • Increased Speed: Contactless payments are typically faster than traditional card payments.
  • Enhanced Security: Many contactless payment systems utilize advanced security features like tokenization, which replaces your actual card number with a unique code.
  • Convenience: Easily pay for purchases with just a tap of your phone or card.

Getting Started with Contactless Payments:

  • Check Card Compatibility: Ensure your credit or debit card is equipped with contactless payment technology (look for the contactless symbol).
  • Set Up Mobile Wallets: If you have a compatible smartphone, download and set up a mobile wallet like Apple Pay or Google Pay.
  • Find Contactless Terminals: Look for the contactless payment symbol at the checkout counter.

By embracing contactless payments, you can enjoy a more hygienic and convenient shopping experience while enhancing your overall security.

01.13.25

Stay secure – the importance of software updates

Cybersecurity threats are constantly evolving, and keeping your devices up-to-date is crucial for staying protected.

Why Updates Matter:

  • Patching Vulnerabilities: Software updates often include security patches that address vulnerabilities that could be exploited by hackers. These vulnerabilities can allow attackers to gain access to your system, steal your data, or even take control of your device.
  • Improved Performance: Updates can also include performance enhancements, bug fixes, and new features that improve the overall user experience.

How to Stay Updated:

  • Enable Automatic Updates: Enable automatic updates for your operating system, web browser, and other software applications whenever possible. This ensures that your devices are always protected with the latest security patches.
  • Check for Updates Regularly: Manually check for updates on a regular basis, even if automatic updates are enabled.
  • Avoid Untrusted Sources: Never download software updates from untrusted sources, such as email attachments or suspicious websites.
  • Update on a Secure Network: Avoid installing updates while connected to public Wi-Fi networks, as they can be less secure.

By keeping your devices updated, you’re taking a proactive step towards enhancing your online security. Remember, staying informed and proactive is key to staying safe in the digital world.

01.12.25

Online banking security: 2-factor authentication is key

Let’s be real, nobody wants to deal with the hassle of a hacked account, especially when it comes to your hard-earned cash. That’s why two-factor authentication (2FA) should be your new best friend, especially for your banking and credit card accounts.

Think of it like this: your password is like a key to your digital front door. 2FA adds a second lock – a unique code sent to your phone or a voice call. This extra layer makes it way harder for hackers to break in, even if they somehow snag your password.

Most banks offer a few different 2FA options. Text messages are pretty common, but a phone call might be even safer.

Here’s the deal:

  • Set up 2FA on all your financial accounts ASAP. It takes a few minutes and could save you a ton of headaches down the line.
  • Explore the different 2FA options your bank offers. Choose the one that feels most secure and convenient for you.
  • Be wary of phishing attempts. Never enter your 2FA codes into any links or websites you didn’t initiate yourself.

By taking these simple steps, you’re taking a huge step towards protecting your finances from cyber threats. Don’t wait for a disaster to strike – enable 2FA today!

01.11.25

Don’t fall for fake updates – stay safe from phishing emails

Ever receive an email urging you to update your software with a handy link? It might seem convenient, but be cautious! These emails could be a clever trick by cybercriminals trying to steal your information or infect your device.

Why Phony Updates Are a Threat:

  • Fake Websites: Phishing emails often contain links to websites that look legitimate. These websites might trick you into downloading malware disguised as a software update.
  • Malicious Attachments: Emails might also have attachments containing malware instead of the promised update. Once opened, these attachments can infect your device.

How to Spot a Phishing Scam:

  • Unfamiliar Sender: Be wary of emails from unknown senders or senders with suspicious email addresses.
  • Sense of Urgency: Phishing emails often create a sense of urgency, pressuring you to click a link or download an attachment immediately.
  • Generic Greetings: Phishing emails often use generic greetings like “Dear Customer” instead of your actual name.
  • Grammatical Errors: Pay attention to typos and grammatical errors, which are common in phishing emails.

Staying Safe from Phony Updates:

  • Verify the Source: Don’t click on links or download attachments from suspicious emails.
  • Go Directly to the Source: If you’re unsure about a software update, visit the official website of the software developer to check for updates.
  • Update Manually: Update your software directly through the program itself, not through links in emails.
  • Keep Software Up-to-Date: Regularly update your software and operating system to ensure you have the latest security patches.

By being cautious and following these tips, you can avoid falling victim to phishing scams disguised as software updates. Remember, it’s always better to be safe than sorry!

01.10.25

Navigating the online world with your kids

Just like the real world has good and bad neighborhoods, the online world has its own set of safe and unsafe spaces. As parents, it’s our responsibility to guide our children through this digital landscape.

Think of it like this: you wouldn’t let your child wander alone in an unfamiliar city without some guidance. The same principle applies to the online world.

Here’s how to help your kids navigate the digital landscape safely:

  • Know Their World: Take an interest in the online platforms and apps your children use. Spend time exploring them together.
  • Open Communication: Encourage open and honest conversations about their online experiences.
  • Teach Critical Thinking: Help them identify and evaluate information critically. Discuss the difference between reliable sources and misinformation.
  • Emphasize Online Safety: Teach them the importance of strong passwords, the dangers of sharing personal information online, and the risks of cyberbullying.
  • Set Clear Boundaries: Establish clear rules and guidelines for internet use, including time limits and appropriate content.
  • Lead by Example: Demonstrate responsible online behavior yourself.

Remember, the online world is constantly evolving. Stay informed about the latest online safety trends and continue to have open and ongoing conversations with your children about their digital experiences.

01.09.25

Privacy first: muting your smart speaker during calls

Smart speakers like Amazon Alexa and Google Home offer incredible convenience, but they also come with privacy considerations. If you frequently use your smart speaker while on phone calls or video conferences, it’s crucial to mute it.

Why Muting Matters:

  • Unintentional Recordings: Smart speakers are always listening for their wake words (like “Alexa” or “Hey Google”). During a call, your speaker might inadvertently record sensitive information shared on the call.
  • Background Noise: Even if your speaker isn’t actively listening, background noise from your calls can be picked up and potentially used for unintended purposes.

How to Mute Your Smart Speaker:

  • Physical Mute Button: Most smart speakers have a physical mute button. Simply press the button to mute the microphone.
  • Voice Command: You can usually mute your speaker using a voice command, such as “Hey Google, mute yourself.”

Additional Privacy Tips:

  • Review Privacy Settings: Regularly review your smart speaker’s privacy settings and adjust them to your preferences.
  • Delete Recordings: You can usually review and delete past voice recordings.
  • Be Mindful of What You Say: Remember that your smart speaker is always listening, even when not actively engaged.

By taking these simple steps, you can minimize privacy risks and ensure a more secure experience with your smart home devices.

01.08.25

Guard your data: be mindful of what you share online

The pandemic shifted many of our daily activities online – shopping, banking, even ordering groceries. While this convenience is great, it’s crucial to be mindful of the information you’re sharing with online businesses.

Think Before You Click “Submit”:

  • Scrutinize Data Requests: When making an online purchase, pay close attention to the information being requested.
    • Do you really need to provide your date of birth, social security number, or home address for this transaction?
    • If a website asks for more information than seems necessary, consider canceling the purchase and finding an alternative vendor.
  • Stick to the Essentials:
    • Only provide the absolutely necessary information during checkout.
    • Avoid filling in optional fields unless you’re comfortable sharing that data.
  • Avoid Saving Payment Information:
    • Resist the urge to save your payment information on websites.
    • If a website automatically saves your card details, delete them after each purchase.

Why Data Minimization Matters:

  • Reduced Risk of Data Breaches: The less data you share online, the lower your risk of being affected by a data breach.
  • Targeted Advertising: Companies use your data to target you with ads. By limiting the information you share, you can reduce the amount of targeted advertising you receive.
  • Protecting Your Privacy: Your personal information is valuable. By being mindful of what you share, you can protect your privacy and reduce the risk of identity theft.

Every piece of information you share online has the potential to be misused. Be mindful of what data you provide to online businesses and take steps to protect your privacy.

01.07.25

Spotting fake stores: how to avoid online shopping scams

Online shopping has become incredibly convenient, but it also comes with risks. Fraudsters are constantly creating fake e-commerce sites to trick unsuspecting shoppers. Before you hit that “buy” button, it’s crucial to do your homework.

How to Spot a Fake Online Store:

  • Check the Website Address: Look closely at the website address (URL).
    • Does it look legitimate?
    • Are there any misspellings or unusual characters?
    • Beware of websites that use “https://” but lack a padlock icon in the address bar.
  • Read Reviews:
    • Search for reviews from other customers on independent review sites like Trustpilot or Google Reviews.
    • Be wary of websites with suspiciously high ratings or very few reviews.
  • Look for Contact Information:
    • Legitimate businesses will typically provide contact information like a physical address, phone number, and email address.
    • If this information is missing or difficult to find, be cautious.
  • Check for Security Measures:
    • Look for signs that the website uses secure payment methods like PayPal or credit card processing through reputable companies.

Additional Tips:

  • Use a Credit Card: Credit cards offer better fraud protection than debit cards.
  • Be Wary of Deals That Seem Too Good to Be True: If a deal seems incredibly low, it’s likely a scam.
  • Trust Your Gut: If something feels off about the website or the transaction, don’t proceed.

By taking the time to research and verify the legitimacy of online retailers, you can protect yourself from fraud and enjoy a safe and secure online shopping experience.

01.06.25

Think before you click: the dangers of email attachments

We’ve all received those tempting emails – “Urgent Invoice,” “Photos from Last Night,” or even something seemingly innocuous like “Birthday Wishes.” But before you click that enticing attachment, think twice.

Email attachments, even from trusted sources, can be a major source of cyber threats. Malicious actors often disguise malware as seemingly harmless files.

Here’s why you need to be extra cautious:

  • Hidden Malware: Attachments can contain viruses, ransomware, and other malicious software that can infect your computer, steal your data, or even hold your files hostage.
  • Phishing Attacks: Phishing emails often include attachments designed to trick you into revealing sensitive information or installing malware.
  • Forwarding the Threat: Even if you trust the sender, the attachment they forwarded to you might have been infected without their knowledge.

Tips for Staying Safe:

  • Verify the Sender: Always double-check the sender’s email address before opening any attachment. Be wary of slight variations in the sender’s name or email domain.
  • Check the File Extension: Be cautious of unexpected file types or attachments that don’t match the context of the email.
  • Use a Strong Antivirus: Keep your antivirus software up-to-date and run regular scans to detect and remove any threats.
  • Hover Over Links: Before clicking on any links within an email, hover your mouse over the link to see the actual URL.

By exercising caution and following these tips, you can significantly reduce the risk of infection from malicious email attachments.

01.05.25

Lock it down: password-protect your video meetings

Video conferencing has become an essential part of our work and social lives. But with convenience comes responsibility. Many people overlook a crucial security step: requiring a password or PIN to join meetings.

Why Password Protection Matters:

  • Zoom Bombing: Unwanted guests, known as “Zoom bombers,” can disrupt meetings with inappropriate content, offensive language, or even malicious intent.
  • Data Breaches: Sensitive information discussed during meetings can be easily intercepted if unauthorized individuals join.
  • Maintaining Confidentiality: Password protection ensures that only intended participants can access the meeting, preserving confidentiality and protecting sensitive information.

How to Implement Password Protection:

  • Utilize Built-in Features: Most video conferencing platforms offer built-in features to set meeting passwords or require participant approval.
  • Create Unique Passwords: Avoid using simple or easily guessable passwords.
  • Change Passwords Regularly: Update meeting passwords frequently, especially for recurring meetings.

Additional Security Tips for Video Meetings:

  • Minimize Screen Sharing: Only share your screen when necessary and ensure that sensitive information is not visible on your screen during the meeting.
  • Be Mindful of Background Noise: Be mindful of background noise that could reveal personal information.
  • Use a Strong, Unique Password for Your Account: Protect your video conferencing account with a strong, unique password.
  • Enable Two-Factor Authentication: If available, enable two-factor authentication for your video conferencing account.

By taking these simple steps, you can significantly enhance the security of your video meetings and protect yourself from unwanted interruptions and potential data breaches.

01.04.25

VPNs: your shield against online threats while working remotely

Working from home has become increasingly common, but it also introduces new security challenges. Public Wi-Fi networks, coffee shops, and even your home internet connection can leave you vulnerable to cyberattacks. That’s where a Virtual Private Network (VPN) comes in.

Think of a VPN as a secure tunnel that encrypts your internet traffic. This means your data is scrambled and unreadable to anyone trying to eavesdrop on your connection, including hackers and even your internet service provider (ISP).

Here’s why a VPN is essential for remote work:

  • Data Encryption: A VPN encrypts all your internet traffic, protecting sensitive information like login credentials, financial data, and confidential work documents.
  • Bypassing Geo-restrictions: Some websites and services are restricted based on your location. A VPN can help you bypass these restrictions by masking your IP address.
  • Increased Privacy: A VPN can help you browse the internet more anonymously by hiding your real IP address.
  • Enhanced Security on Public Wi-Fi: Public Wi-Fi hotspots are notoriously insecure. A VPN provides a secure and private connection, even when using public Wi-Fi.

Getting Started with a VPN:

  • Choose a Reputable Provider: Research and select a reputable VPN provider with a strong security track record.
  • Install and Configure: Download and install the VPN client software on your devices.
  • Connect to the VPN: Connect to the VPN server before accessing any sensitive information or company networks.

While your company may require a specific VPN for work access, consider using a personal VPN for all your internet activities when working remotely for an added layer of security and privacy.

01.03.25

USB-C vs. USB-A: A Speed Showdown

Remember those bulky USB-A ports? They’re slowly becoming a thing of the past, replaced by the sleek and versatile USB-C. But is it just a design change, or is there a real difference?

In a word: yes! USB-C isn’t just about convenience (though that reversible connector is a game-changer). It’s about speed and future-proofing your devices.

Here’s the breakdown:

  • Speed Demon: USB-C supports significantly faster data transfer speeds than its predecessor. This means lightning-fast file transfers, smoother video streaming, and a generally more responsive experience.
  • Powerhouse: USB-C can deliver more power, allowing for faster charging of your devices.
  • Versatility is Key: USB-C is a universal standard, capable of handling everything from data transfer and charging to video output.

While USB-A still has its place, USB-C is clearly the future of connectivity. If you’re in the market for a new laptop, phone, or other devices, prioritize those with USB-C ports to take advantage of the latest technology and future-proof your gadgets.

01.02.25

Why an ethernet connection is might be best for work from home

Working from home offers flexibility, but it also comes with unique security challenges. While Wi-Fi is convenient, an Ethernet connection provides a significant boost to your security and overall work experience.

Why Ethernet Wins:

  • Enhanced Security:
  • Wi-Fi signals can be intercepted by neighbors or even more sophisticated attackers.
  • Ethernet connections establish a direct, wired link between your device and your router, making it much harder for hackers to eavesdrop on your network traffic.
  • This significantly reduces the risk of data breaches and man-in-the-middle attacks.
  • Improved Stability:
  • Wi-Fi signals can be affected by interference from other devices, walls, and even weather.
  • An Ethernet connection provides a more stable and reliable connection, minimizing interruptions and ensuring smooth workflow.
  • Faster Speeds:
  • Ethernet connections may offer faster speeds than Wi-Fi, especially for data-intensive tasks like video conferencing and large file transfers. This can significantly improve your productivity.

Easy Setup:

  • If your laptop lacks an Ethernet port, you can easily purchase a USB-to-Ethernet adapter.
  • Simply connect the adapter to your laptop and then to your router using an Ethernet cable.

By choosing an Ethernet connection for your work-from-home setup, you’re prioritizing both security and performance. It’s a simple yet effective step towards creating a more secure and productive work environment.

01.01.25

New year, new security smarts: staying safe online in 2025

The digital world is constantly evolving, and so should your cybersecurity knowledge. As we head into 2025, here’s how to stay ahead of the curve and keep your online life secure:

Embrace continuous learning:

  • Stay Informed: The online threat landscape is ever-changing. Dedicate time to learn about new security threats and best practices.
  • Trusted Resources: Websites like Staysafeonline.org offer valuable information and resources on online safety.
  • Make it a Family Affair: Discuss online safety with your family. Share what you learn and encourage them to do the same.

Simple steps, big impact:

  • Strong Passwords: Use unique and strong passwords for all your online accounts. Consider a password manager to help you create and manage them securely.
  • Two-Factor Authentication (2FA): Enable 2FA whenever possible. This adds an extra layer of security by requiring a second verification 1 code to access your accounts.  
  • Software Updates: Keep your operating system, software applications, and antivirus software up-to-date to patch vulnerabilities.
  • Beware of Phishing: Be cautious of suspicious emails, text messages, or phone calls. Don’t click on links or download attachments from unknown senders.
  • Secure Wi-Fi: Avoid using public Wi-Fi for sensitive activities like online banking. If you must use public Wi-Fi, consider using a VPN for added security.

Make security a habit:

By incorporating these simple steps into your routine, you can significantly enhance your online security posture. Remember, cybersecurity is an ongoing process. Stay informed, be vigilant, and make smart choices to navigate the digital world with confidence.