Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Security Tip of the Day

Daily tips to create awareness of cyber threats and empower Total Defense users to be safer and more secure online with our security tips and resources..


May 2024
05.16.24

Level Up Your Login Security: Google Prompts to the Rescue!

Ever worry about someone snagging your password and sneaking into your accounts? Two-factor authentication (2FA) is your security superhero, adding an extra layer of protection. And for your Google Account, there’s a super convenient 2FA option called “prompts.”

What are Prompts?

Imagine trying to enter a building – you need a key (your password) and a special code from the guard (the prompt). That’s how Google prompts work! When you try to log in to your Google Account from a new device, you’ll get a notification on your phone asking you to confirm it’s really you.

Why Prompts? They’re Awesome!

Here’s why Google prompts are a great choice for 2FA:

  • Super Secure: Even if someone has your password, they can’t log in without approving it from your trusted phone. Hackers foiled!
  • Ultra Convenient: The prompts appear on your phone, which you probably have with you most of the time. No need to fumble for codes from text messages or email.
  • Easy to Set Up: Enabling prompts is a breeze within your Google Account settings.

How to Enable Prompts:

  1. Head to Your Google Account Settings: Log in to your Google Account and navigate to the “Security” section in your settings.
  2. Find 2FA Settings: Look for a section called “Two-factor authentication” or “Verification in two steps.”
  3. Activate Prompts: Follow the on-screen instructions to enable prompts as your 2FA method.

Remember: Don’t leave your accounts vulnerable! Enable Google prompts for your Google Account and enjoy the peace of mind that comes with extra login security.

05.15.24

Mystery machines – check your Google account devices

Ever lend your phone to a friend and completely forget they logged into their Google Account on it? Or maybe you sold your old laptop without wiping it clean. These situations can leave a digital trail – your Google Account access on someone else’s device. Yikes! But don’t panic, there’s a way to check and clean things up.

Google’s Device Dashboard: Your Login Spy

Your Google Account settings have a hidden gem called the “Device Activity” or “Your devices” panel. This is basically a list of all the devices that have recently accessed your account. It’s a great way to see if there are any unfamiliar devices lurking around.

Spot a Stranger? Log Them Out!

Here’s the drill:

  1. Head to Your Google Account Settings: Log in to your Google Account and navigate to the “Security” section in your settings.
  2. Find the Device List: Look for a section called “Your devices” or “Device Activity.” This will show you a list of devices that have recently accessed your account.
  3. Recognize Them All? Great! If all the devices look familiar – your phone, laptop, etc. – then you’re good to go.
  4. Unfamiliar Device? Boot It! See a device you don’t recognize? Don’t wait! Click the device and select “Sign Out.” This will immediately log your account out of that device.

Extra Cyberecurity Tips:

  • Enable Two-Factor Authentication: Two-factor authentication (2FA) adds an extra layer of security to your account. Even if someone has your password, they won’t be able to log in without a special code sent to your phone.
  • Review Regularly: Make checking your device list a regular habit. This way, you can catch any unauthorized access quickly.

Taking control of the devices that access your Google Account is an important security step. By using the Device Activity panel and enabling 2FA, you can keep your account safe and sound.

05.14.24

App password power – unlocking secure connections

Ever tried connecting your email to a new app, but it keeps asking for a weird “app password”? Don’t worry, it’s not a trick question. App passwords are a special kind of security key that helps keep your accounts safe.

Why App Passwords?

Imagine your main email password is like your house key – it opens the main door. An app password is more like a guest key – it lets a specific app access your email, but it doesn’t give them full control. This extra layer of security helps protect your data from unauthorized access.

Where Do I Find Them?

App passwords usually live in your account settings on the main website or app for your email service (like Gmail or Outlook). Look for a section on “app passwords” or “security.” Here, you can generate a unique app password for each app you want to connect.

Keeping Control:

The best part? You have complete control over these app passwords. You can:

  • Generate Unique Passwords: Create a different app password for each app you connect. This way, if one app gets compromised, the others are still safe.
  • Revoke When Needed: Did you stop using an app? No problem! You can easily revoke the app password you generated for it, cutting off its access to your email.

The Benefits of App Passwords:

  • Enhanced Security: App passwords add an extra layer of protection for your sensitive information.
  • Convenience with Control: You can connect your favorite apps without compromising your main account password.
  • Peace of Mind: Knowing you have control over app access gives you peace of mind.

Remember: App passwords are a powerful tool for keeping your online accounts secure. By using them wisely, you can connect your favorite apps without compromising your data.

05.13.24

Data Defenders: Spreading the Love

The key is to diversify where you store your data. Think of it like having multiple safes for your valuables! Here are a few options:

  • Local Backup: External hard drives (HDDs) are your local backup buddies. They’re like portable vaults that you can physically hold onto. Just copy your important files onto the HDD regularly.
  • Cloud Backup: Cloud storage services are like online safety deposit boxes. They let you store your data on remote servers, accessible from anywhere with an internet connection.

Double the Protection is Twice as Nice

Using a combination of local and cloud backups gives you the best of both worlds:

  • Peace of Mind from Local Backups: Having a physical copy of your data on an HDD gives you peace of mind in case of, say, a cloud service outage.
  • Cloud’s Convenience Advantage: Cloud storage is super convenient – you can access your files from any device, anywhere. It’s also great for protecting your data from physical disasters like fires or floods.

Don’t wait for disaster to strike! Start backing up your important data today. By using a combination of local and cloud storage, you can ensure your precious information is safe and sound.

05.12.24

Password power-up – autofill your way to security

We all know the struggle – you need to log in to your favorite website, but where on earth is that password? Juggling multiple accounts and passwords can be a nightmare. But fear not, there’s a superhero in your corner: your web browser’s autofill feature!

Autofill: Your Digital Login Sidekick

  • Save Your Passwords: Most web browsers offer a built-in password manager. When you create a new account or log in to an existing one, the browser will ask you if you want to save your password. Say yes! This way, the browser remembers it for you.
  • Autofill to the Rescue: Once you’ve saved your login information, autofill takes over! When you return to that website, the browser automatically fills in your username and password for you. No more hunting through sticky notes or digging through your brain!

Strong Passwords Still Matter!

While autofill is convenient, it’s important to remember that strong passwords are still essential. Autofill doesn’t make your passwords any stronger, it just remembers them for you. Here are some tips for creating strong passwords:

  • Mix it Up: Use a combination of uppercase and lowercase letters, numbers, and symbols. Think of it like creating a super strong password chain!
  • Go Long: Longer passwords are harder to crack. Aim for at least 12 characters, but the longer the better.
  • Uniqueness is Key: Don’t use the same password for multiple accounts. If one gets compromised, the hackers won’t have access to all your other accounts.

Security Perks of Autofill:

  • Less Phishing Potential: Autofill can help you avoid phishing scams. These scams try to trick you into entering your login information on a fake website. Since autofill uses the saved information for the real website, it’s less likely you’ll accidentally fall for a phishing attempt.
  • Convenience Meets Security: Autofill makes logging in a breeze, but it doesn’t compromise security. You can still have strong, unique passwords for all your accounts.

Autofill is a handy tool that can make your online life easier and more secure. Just remember to create strong passwords and you’re golden.

05.11.24

Update ASAP – how to keep your software squeaky clean

Ever heard of a software update? It’s like a digital shield for your computer, phone, or any device you use online. These updates fix security holes that hackers love to exploit. The sooner you install them, the safer you are!

So, how do you know when an update is available? Here’s the lowdown:

Update Detectives:

  • Vendor Websites: Most software companies post updates on their official websites. You can usually find a “downloads” or “support” section where you can check for the latest version.
  • Automatic Update Alerts: Many programs have built-in update checkers. They’ll notify you when a new update is available, so you don’t have to go searching.
  • Enable the Auto-Pilot: If your software offers automatic updates, turn that feature on! It’s like having a security guard who takes care of things for you.

Why Wait? Update Now!

Think of those security holes as cracks in your digital armor. Hackers love to find these cracks and sneak in to steal your information or mess with your device. Updates patch those holes, keeping you safe.

Here’s a bonus tip: Never download updates from suspicious emails! Updates always come from the official website of the software company, not some random stranger in your inbox.

Keeping your software up-to-date is a simple but powerful way to protect yourself online. By following these tips, you can make sure your devices are always shielded and secure.

05.10.24

See what you type: unmasking your password (safely)

Ever gotten locked out of your account because you mistyped your password for the hundredth time? We’ve all been there. Those little dots hiding your password as you type can be super secure, but also super frustrating!

Here’s the thing: toggling the password visibility setting (that little eye icon you often see) can actually help you avoid those annoying lockouts. Why? Because seeing what you’re typing ensures you’re entering the correct characters.

But Isn’t Hiding My Password More Secure?

Yes and no. Password masking (hiding your password with dots) is a great security feature, especially on public computers or if someone might be peeking over your shoulder. But if you’re confident you’re in a safe space, seeing your password can be a benefit.

The Perks of Password Visibility:

  • Say Goodbye to Typos: Those sneaky typos can really mess up your login attempts. Seeing your password lets you double-check for any mistakes before hitting enter.
  • Catch Those Caps Lock Surprises: We’ve all accidentally left Caps Lock on, leading to failed logins. Seeing your password ensures you’re using the correct case for each letter.
  • Copy and Paste with Confidence: Sometimes, you might need to copy and paste your password from a password manager. Seeing it briefly ensures you’re copying the correct thing.

Even if you enable password visibility, be aware of your surroundings. If someone is lurking nearby, switch it back to hidden mode.

The Key Takeaway:

There’s no one-size-fits-all answer when it comes to password visibility. It depends on the situation. But if you’re confident you’re in a safe space, toggling that eye icon can help you avoid those frustrating login struggles.

05.09.24

Software sunset: when your programs reach end-of-life

Imagine your favorite pair of jeans. You’ve loved them for years, but eventually, they get worn out and ripped. Software can be like that too. Sometimes, companies decide to stop supporting a program, which means no more updates or security patches. This software is then considered “end-of-life” (EOL).

Why should you care? Here’s the deal: EOL software is like a house with a broken lock – it’s wide open for hackers! Without updates, security vulnerabilities can pop up, making it easy for attackers to sneak malware (bad software) onto your computer and steal your information.

The Dangers of Clinging to EOL Software:

  • Hackers Love Easy Targets: Outdated software is like a flashing neon sign for hackers, letting them know they can exploit those security holes to get in.
  • Compatibility Chaos: EOL software might not work well with newer programs, causing crashes or frustrating glitches. It’s like trying to wear your ripped jeans to a fancy party – not a good look!
  • Performance Problems: Software updates often include improvements that make things run smoother. Sticking with EOL software means your computer might chug along slowly, making you less productive.

What Can You Do?

  • Upgrade or Ditch: The best way to deal with EOL software is to upgrade to a newer version (if available) or ditch it altogether. Most software companies will announce when a program is nearing its end-of-life, so you have time to prepare.
  • Check for Updates Regularly: Don’t wait for notifications! Make it a habit to check for software updates regularly. Keeping your programs up-to-date is like putting on a virtual suit of armor for your computer.
  • Seek Software Support: If you’re unsure about a program’s status, contact the software company directly. They can advise you on updates or recommend alternative software.

Don’t let your software become a security risk. By keeping things up-to-date and retiring EOL programs, you’re taking a big step towards protecting your computer and your precious data.

05.08.24

Software patches: tiny updates, big security boosts

Ever heard of a “software patch”? It might sound fancy, but it’s actually a pretty simple concept. Patches are like little updates for your computer programs and operating system (OS) that fix security holes and keep your tech healthy.

Think of it like this: imagine your favorite jacket has a small tear. A patch would be that perfect little fabric piece that sews it up, making your jacket strong and ready to wear again. Software patches work the same way, but for the digital world!

Why Patches Matter:

  • Plugging Up Security Holes: Software isn’t perfect, and sometimes tiny cracks can appear – these are called vulnerabilities. Hackers love these vulnerabilities because they can exploit them to sneak malware (bad software) onto your computer. Patches act like shields, closing those holes and making it way harder for hackers to get in.
  • Keeping Things Running Smoothly: Patches don’t just fix security issues; they can also improve your software’s performance. They might squash annoying bugs that make things run slow or crash unexpectedly.
  • New Features, Who Dis? Sometimes, patches even add cool new features to your software! Think of it as a bonus gift on top of the security and performance improvements.

Patching Made Easy:

  • Don’t Delay, Update Today! Most software programs and operating systems will automatically notify you when a patch is available. Don’t ignore these notifications! Hitting “update” is like putting on a virtual suit of armor for your computer.
  • Automatic is Awesome: Many programs offer the option to automatically install patches. This is a great way to stay protected without having to remember to update everything yourself.
  • Scan and Patch: Security software like Total Defense Ultimate Internet Security can help! It scans for outdated and vulnerable software and can even automatically patch them for you. Pretty cool, right?

Regular patching is an essential part of keeping your computer safe and healthy. By keeping your software up-to-date, you’re making it much harder for hackers to steal your information or mess with your files.

05.07.24

Be picky about who you connect with online

Social media is all about connecting with people but hold on a sec. While building a big follower list might seem cool, it’s important to be choosy about who you let into your online world. Not everyone with a funny meme or a seemingly perfect profile pic is who they say they are. So, how can you make sure you’re connecting with real people you can trust?

Quality over Quantity:

  • Know Your Crew: Focus on building genuine connections with people you actually know in real life, like friends, family, or colleagues. These are the folks you can trust to see your vacation photos and funny cat videos.
  • Beware of Random Requests: Ever get friend requests from people you don’t recognize? Don’t just hit “accept” automatically! Check out their profile – do they have any mutual friends? Does their profile seem real, with actual photos and posts? If something feels off, hit “decline” and move on.
  • Group It Up: Many social media platforms let you organize your connections into groups. This is a great way to control who sees what. For example, you might have a close friend group, a family group, and a work group. This way, you can tailor your posts to the specific audience.

Stranger Danger Goes Digital:

  • Fakebook Faces: Just like in real life, not everyone online is who they seem. Scammers and hackers might create fake profiles to trick you into adding them as friends. Be wary of profiles with very few friends, generic photos, or posts that seem too good to be true.
  • Do Your Research: If you’re unsure about someone, do some digging! Search for their name online to see if any other profiles pop up. You can also try a reverse image search on their profile picture to see if it’s being used elsewhere.
  • Privacy Perks: Most social media platforms have privacy settings that let you control who can see your information and posts. Take advantage of these settings! You can choose to only share with friends, or even create custom groups with different levels of access.

When it comes to social media, it’s okay to be a little suspicious. Taking the time to verify who you’re connecting with can save you a lot of headaches down the road.

05.06.24

Oversharing – think before you post on social media

We all love sharing our lives on social media – that vacation pic, that hilarious cat video, that delicious dinner you cooked. But hold on a sec! Everything you post online, well, it kinda stays online forever. And while sharing is fun, it’s important to be mindful of what you put out there.

Here’s the deal: Once you hit “post,” that information becomes part of your digital footprint, and it’s not always easy to control who sees it. So, how can you share safely and smartly?

Privacy Power Up:

  • Be Profile Picture Savvy: Your profile picture is kind of your online face. Avoid using anything that reveals too much personal information, like your home address in the background.
  • Lock Down Your Profile: Many social media platforms let you control who sees your posts. Take advantage of privacy settings to make sure only approved friends or followers can see your information.
  • Think Before You Tag: Tagging your friends in photos or posts is fun, but make sure they’re okay with it first. Everyone has the right to control their online presence.

Think Twice Before You Type (or Click):

  • TMI (Too Much Information): Social media isn’t the place to overshare personal details like your birthday, address, or phone number. This kind of information can be used by scammers or identity thieves.
  • Vacation Vibes…Later: Planning a trip? Maybe wait to post those amazing beach photos until you’re back home. Letting everyone know your house is empty can be a security risk.
  • Raging After Work? Venting about your boss or a bad day at work might feel good in the moment, but it could come back to bite you later. Social media posts can be seen by employers or colleagues.

Once you post something online, it’s almost impossible to completely erase it. So, take a deep breath, think about who might see your post, and consider if it’s something you’d be comfortable sharing with everyone.

05.05.24

Wi-Fi woes – choose your connection wisely

We all love free Wi-Fi, but public Wi-Fi networks, like at coffee shops or parks, are convenient, but they can be risky for your data. Why? Because they’re often not very secure, meaning someone could potentially snoop on your online activity.

So, how can you stay safe while surfing the web? Here’s the scoop:

  • Stick to Your Home Turf: Whenever possible, connect to your home Wi-Fi network. It’s usually password-protected and way more secure than public options.
  • Mobile Data to the Rescue: If you’re out and about, consider using your phone’s mobile data connection instead of public Wi-Fi. It might use up your data plan faster, but it’s a safer bet for sensitive activities like online banking or shopping.
  • Public Wi-Fi? Extra Caution Needed: Absolutely have to use public Wi-Fi? No worries, there are ways to minimize the risk. First, make sure you have antivirus and firewall software installed on your device. These act like digital shields, protecting your information from prying eyes.
  • Hold off on the Sensitive Stuff: Avoid logging into important accounts like your bank or email while on public Wi-Fi. If it can wait, hold off until you’re on a secure network.

A little caution goes a long way. By choosing trusted connections and taking some precautions, you can keep your online activity safe and sound.

05.04.24

Your Gmail settings: a quick security check-up

Ever feel like your Gmail might be acting a little…strange? Maybe emails are going missing, or you see unfamiliar addresses in your “Sent” folder. Don’t worry, it could be a simple setting gone rogue!

The good news is, Gmail lets you customize tons of stuff, from how you view emails to where you send them from. But with all that power comes a little responsibility – you must to keep an eye on those settings.

Here’s why a quick review is a smart move:

  • Double Check Your “Send Mail As”: This setting lets you send emails from other accounts, like Yahoo or Outlook. But make sure it’s your account listed. A sneaky hacker could change this to send emails pretending to be you.
  • Watch Out for Forwarding Funnels: Does your mail seem to be disappearing and reappearing in weird inboxes? Someone might have set up email forwarding to another address. Check your settings to make sure your emails are only going where you want them to.

How to Do a Security Check-Up:

  1. Open Gmail and head to Settings (it’s that gear icon in the top right corner).
  2. Click on “See all settings” – that’s where all the magic happens.
  3. Take a look at “Accounts and Import” and “Forwarding and POP/IMAP”. These are the areas where someone might mess with your settings.

A few minutes spent checking your settings can save you a big headache (and maybe some embarrassment!)

05.03.24

Suspicious email – hit delete – don’t reply

We’ve all been there. You open your inbox and see an email that raises your eyebrows. Maybe the sender’s address looks like a jumbled mess, the subject line screams urgency with bad grammar, or there’s an attachment you wouldn’t touch with a ten-foot pole. These are the red flags of a suspicious email, and the worst thing you can do is reply. Replying can open a can of worms, so let’s break down why it’s risky and what you should do instead.

Why Replying is a Big No-No:

  • Spam Magnet: Replying to a suspicious email is like waving a giant flag that says, “Hey, this email address is active!” This can lead to a flood of even more unwanted emails from the same sender or others lurking in the shadows.
  • Data Interception: Hackers are crafty. They can use sneaky techniques embedded in replies to steal your information. Think of it like a digital pickpocket – a reply gives them a chance to snatch your data.

Your Safe Email Action Plan:

Now that you know why replying is a bad idea, here’s what to do when a suspicious email lands in your inbox:

  1. Mark it as Spam: Most email programs have a handy “spam” button. Clicking this button helps your email provider learn what’s junk and keeps your inbox cleaner in the future. Think of it as training your email to be a spam-fighting ninja!
  2. Block the Sender: Feeling extra cautious or annoyed? Don’t hesitate to block the sender’s address entirely. This acts like a digital bouncer, stopping future emails from that address from reaching your inbox.
  3. Delete it! This is the simplest and most effective option. If something feels fishy, trust your gut and get rid of the email altogether. No need to overthink it – just hit delete and move on.

By following these tips, you can transform yourself from a potential victim into a savvy email security pro. Remember, a little caution goes a long way in protecting yourself from email scams and keeping your inbox safe.

05.02.24

Ditch the password—unlock your PC with your face

Sick of typing passwords all the time? Windows Hello can help! It lets you sign in to your Windows PC with your face, fingerprint, or even iris scan. No more scrambling to remember complex passwords.

Plus, it’s more secure than a regular password. Hackers can guess passwords, but they can’t steal your face! Windows Hello uses special hardware to recognize you, so it’s super safe.

Here’s how to get started:

  1. Open Settings on your Windows PC.
  2. Click on “Accounts” and then “Sign-in options.”
  3. You’ll see different options for Windows Hello. Just choose the one you like – face recognition, fingerprint, or PIN.
  4. Follow the on-screen instructions to set it up. It’s really easy!

Now you can unlock your PC with just a glance or a tap! Isn’t that cool?

05.01.24

Suspicious email? Don’t click! Here’s how to spot a phishing scam

Ever get an email that just feels…off? Maybe it’s from a friend but the tone seems strange, or it has an urgent request out of the blue. Hold on! These could be phishing scams. Here’s how to stay safe:

  • Weird = Warning Sign: Unfamiliar email addresses, strange wording, or unexpected attachments are all red flags. Don’t click links or open attachments!
  • Second Guess, Then Delete: When in doubt, delete it! You can always check with the sender directly (by phone, not email) if you’re unsure.
  • Contact the Source: If the email claims to be from a bank, credit card company, or other service, reach out to them directly. Don’t use phone numbers or links in the email – find their official contact information.

Phishing for Information:

Scammers use phishing emails to trick you into revealing personal information like passwords or credit card details. They might:

  • Fake Familiarity: Pretend to be someone you know, like a friend or colleague.
  • Urgency Creates Hurry: Pressure you to act fast, leaving no time to think clearly.
  • Too-Good-To-Be-True Offers: Promise amazing deals or threaten consequences to grab your attention.

Don’t trust everything you see in your inbox. If an email seems suspicious, delete it and contact the sender directly through a trusted channel. Stay safe out there.