Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Security Tip of the Day

Daily tips to create awareness of cyber threats and empower Total Defense users to be safer and more secure online with our security tips and resources..


April 2023
04.30.23

Double-check two-factor authentication before switching your phone number


If you switch your phone number, make sure to update any two-factor authentication (2FA) services you use. As many 2FA processes are based on the phone number, you won’t be able to access your accounts after the number is changed. It’s recommended to use an authenticator app or a trusted device for your 2FA needs, instead of the phone number.

04.29.23

Consider making your Wi-Fi network private for extra security

By default, your router will automatically make your Wi-Fi network visible. However, you have the option of hiding your network completely if you don’t want unauthorized persons to know it’s there. This would require someone to enter the network’s name to connect to it.

04.28.23

Disable voice control on smart TVs if they are not being used

Many smart TVs are capable of being controlled by voice commands, allowing you to easily switch channels or open apps. This convenience, however, comes with a trade-off; your TV might be listening to your conversations and sending this audio data to a server over an unsecured connection. Unless you absolutely need this feature, it is best to deactivate it and protect your privacy. 

04.27.23

Take advantage of quality of service (QoS) features on your network devices

Quality of service is a common feature of routers and other networking hardware that prioritizes some types of network traffic over others. This can be very useful if you have limited data speeds: Without QoS, data comes on a first-come, first-serve basis. Configuring QoS can sometimes be difficult, but many devices have presets you can use. For example, you could prioritize video calling so you always have a stable connection.

04.26.23

Delete old files in Drive to free up space for other Google services

Every Google service typically uses a fixed amount of storage shared across all platforms. That means if you have a lot of files on Google Drive, it’s taking up the same space on Google Docs and Gmail. While Gmail will automatically free up space for new emails if your storage is full, it won’t do the same for other files, such as images, videos or documents.

04.25.23

How to chat with chatbots

Chatbots are widely used to facilitate customer engagement, but they can be awkward and even risky to interact with. If you happen to receive an unexpected call asking, “can you hear me”, a voicemail message claiming that your warranty has expired (even if you don’t have one) or a chat message that suggests you enter sensitive information, it is best to simply ignore and move on.

04.23.23

Use end-to-end encryption whenever possible

Without encryption, the data you send or store can be read by anyone who gains access to it. One option is to use a virtual private network (VPN), which is vital if you’re using a public network. But you can also often encrypt files in cloud or external storage. Some cloud hosts will do this automatically, but you’ll have to encrypt any external data yourself. To protect your data from intruders, consider encryption software, such as TrueCrypt, if you store sensitive data on your portable drives.

04.22.23

Check your phone for unwanted apps

Sometimes, software can be installed on your phone or computer without your knowledge. It’s a good habit to occasionally check the list of apps installed on your devices and make sure you recognize everything on there. If you see something that looks unfamiliar or you no longer use, uninstall it. Be sure to check the “permissions” for all your apps. This will tell you what the app can access and what it can do with the data it collects from you. Make sure the permissions the app requires match its purpose. If something looks suspicious, uninstall it immediately.

04.21.23

Be careful of granting sensitive permissions to new apps

Many apps — even well-known ones — ask for a long list of permissions when they’re installed. This can include location data, camera access, your email information, and other potentially sensitive permissions. Be wary of what you grant access: An image-editing app probably doesn’t need access to your emails to function. Note that location data is a permission that is almost always optional, so it’s unlikely any apps that ask for it need it to function properly. If an app is asking for too many permissions, consider looking for an alternative that might not need to access so much of your information. In any case, it’s important to read through the list of permissions an app is asking for and think carefully about whether granting them is needed.

04.20.23

What’s multi-factor authentication (MFA)?


Multi-factor authentication is a type of authentication that requires multiple pieces of evidence to validate a user’s identity. It typically involves up to three factors – something the user knows (like a password or PIN), something the user has (such as a security token or cellphone), and something the user is (a biometric characteristic, like a fingerprint). For a user to be granted access, they must successfully present these factors. Additionally, multi-factor authentication can also be used to secure online transactions, such as online banking or online shopping. It is increasingly becoming the industry standard for online security, as it is much more difficult for an unauthorized user to gain access to an account with MFA in place.

04.19.23

Beware of copycat apps

It’s all too easy to accidentally install a malicious app on your phone. This could be because an app mimics a legitimate one; for example, if you want the Amazon Alexa app, make sure it’s the official software by Amazon by checking the source and reading the user reviews. Also, be wary of apps that are offered for free, as they may contain malware or viruses. When downloading an app, always check the app’s reviews and check the permissions it requests before installation. Also, make certain it’s from a trusted source such as the official app store for your mobile operating system.

04.18.23

Don’t share personal details in emails

It’s important to remember that emails are not always secure, and you should be aware that someone might be able to view the contents of your emails at some point in the future. Therefore, it’s important to be mindful of the information you include in an email, and to avoid including any sensitive information. Be particularly cautious when responding to requests from strangers, who may be trying to collect personal details such as your name, address or phone number – never provide this information via email.

04.17.23

If you want to pay with debit online, use a third-party payment service

If you get scammed by a bad seller with your credit card information, you have ways of getting your money back. Most credit card companies have built-in protections from fraud or unauthorized transactions. However, this isn’t the case with debit cards: Losing money from a debit card purchase is far less likely to be retrieved. If you want to pay with debit online, use a third-party payment option that hides your debit information from the seller.

04.16.23

Take advantage of cloud storage — but don’t neglect physical backups

Cloud storage can be an invaluable way to access your important documents and data remotely and keep it safe in case your local storage fails. However, cloud storage is typically kept behind a password, meaning an unauthorized user can potentially access it if they have your credentials. In addition, cloud storage isn’t 100% safe from data breaches or outages. To keep your data safe and secure, use a physical backup such as an external hard drive in addition to cloud storage.

04.15.23

Rather than paying a ransom, use a backup file

Ransomware is a very real and dangerous threat that can lock you out of your files until a payment is made. However, by taking the time to regularly back up your data, you can protect yourself from ransomware and avoid having to pay the ransom. Not only is there no guarantee that paying the ransom will restore your files, but restoring from a backup is a much more reliable and effective option.

04.14.23

Disconnect home cameras when they’re not being used

A skilled cybercriminal is capable of remotely turning on cameras to spy on you. If you’re not using a camera, whether it’s part of an in-home security system or webcam, it’s best to disconnect it entirely.This is particularly important if you have an in-home security system. Make sure to turn off the power to the camera system and remove the cables from the outlets when not in use. If you have a WiFi camera system, it’s important to make sure the signal is strong enough so that it can’t be easily hacked. Lastly, it’s important to keep the camera’s software up to date to protect your system from any potential hackers.

04.13.23

Always pay with the most secure method possible

When shopping online, you’ll often have several choices for payment. There’s virtually always credit card options, but PayPal and Google Pay are also commonly available. These options tend to be more secure than entering credit card information because they don’t require you to share any card numbers with the seller. PayPal is especially notable: They’ll step in if a transaction goes bad, such as if you never receive an item or there’s a billing issue the seller won’t resolve.

04.12.23

For sensitive communications, it’s important to use end-to-end encryption

This means the message is always protected while traveling from the sender to the receiver. Unfortunately, email and many chat apps do not use this type of encryption. When looking for secure apps, make sure to read the details of their encryption measures. Additionally, if you are concerned about the privacy of your emails, consider using an encrypted email service.

04.11.23

Use two-factor authentication

Two-factor authentication adds an extra step to logging in after you enter a password. This usually involves entering a code sent via text message or email to complete the login process. Sometimes, an app such as Google Authenticator is used. The benefit of this is that even if someone has your password, they won’t be able to log in without access to the code.

04.10.23

If you’re still using older devices, keep a close eye on them

There’s no problem with holding onto a phone, tablet, or computer for a long period of time, but there are two important conditions you should keep in mind. If the device’s support has reached its end-of-life and is connected to the internet, you should seriously consider upgrading to a newer model. This is because devices that meet these criteria are more vulnerable to malware infections, as they contain unpatched security flaws.

04.09.23

Beware of gift card scams

Some scammers posing as a legitimate company, government agency, senior manager, family member or other trusted source will ask you to purchase gift cards and send them the code in exchange for something. This could be a new job, tax benefits, lotteries or to help a good cause. However, there are no circumstances in which a legitimate person or institution will ask you to pay in the form of gift cards. You can safely assume any communications that ask you to purchase gift cards are a scam.

04.08.23

Time to get rid of your unused apps!

It’s not just about de-cluttering your closet or bookshelf, it also applies to any digital stuff you have, like your phone apps. Take a look through your phone and if you come across an app you haven’t used in a while (or ever!), get rid of it. You’ll be doing yourself a favor by reducing potential security risks, plus you’ll have more storage space! Additionally, it’s important to make sure that all of your downloaded apps are up-to-date. Outdated apps can also pose security risks and cause your phone to run more slowly.

04.07.23

Stay on top of your network’s security

Ignoring your network’s security is a recipe for having it breached. Some may want to leech off your internet connection, which can slow it down or open it up to bad actors. Others may want the data that’s inside your network. If you’re an entrepreneur, you could be made vulnerable to data breaches or ransomware. To avoid a bad situation, keep all of your network devices secure with strong passwords and good policies, such as using WPA2 encryption.

04.06.23

Consider a paid data cleanup tool

Data cleanup tools can help your computer run smoothly and prevent it from picking up harmful or unnecessary files, such as trackers. They can also clean out your personal data, such as your internet history, to reduce the risk of it falling into the wrong hands. Free tools will generally get the job done, but they have to be configured and run manually, which can take time. Instead, consider an app that runs automatically in the background. This type of service often has bonus features such as keeping your drivers updated in addition to keeping your computer clean, so it can be exceptionally useful.

04.05.23

Beware of tech support scams

Usually, whenever technical help is required, you are the one to reach out to the company, not the other way around. However, this is commonly used in many scams. Somebody may call or email you and ask you to complete some action, such as giving out your Social Security number or account login details. Never interact with somebody claiming to provide tech support unless you have started contact with them via a reliable source first.

04.04.23

Dealing with cyberbullies – don’t add fuel to the fire

Fighting back is only likely to make the bully ramp up the situation. Depending on what’s going on, you might want to try ignoring them instead. A lot of times, the cyberbully just lives for the reaction they get from their target. You can also take subtle steps, like blocking messages on social media or changing your email address if you’re getting unwanted emails. If the problem persists, you may have a stronger case for taking legal action.

04.03.23

Be wary of bad actors on social media

Social media can be useful for staying connected with friends, family and coworkers — but there are also people with bad intentions. Don’t accept friend requests or private messages (PMs) from people you don’t trust. Report any aggressive or indecent behavior to the platform itself, and if someone threatens your life, contact the police. Block trolls and anyone who makes you feel uncomfortable — don’t engage with them. Avoiding bad actors can help you stay safe online and protect your privacy.

04.02.23

Use the right networking equipment

There’s a wide range of networking equipment to choose from, and knowing which is best for your network can keep it running smoothly. For example, if your Wi-Fi needs to cover long distances, consider investing in a wireless extender, powerline adapter or mesh network. A wireless extender is useful if you want your Wi-Fi signal to travel farther. A powerline adapter can be handy if there are lots of obstacles (walls, floors, fireplaces, electronics, etc.) interrupting your connection. A mesh network can make it so you have more than one source for a wireless signal.

04.01.23

Achieve redundancy so you never lose data

Redundancy comes in many forms: Battery backup, redundant internet connections and data backup, to name a few. Use an uninterruptible power supply (UPS) so you’re protected in case of a brownout, consider redundant internet connections if your area is vulnerable to outages and back up your data frequently. Doing all of this can help prevent you from losing valuable work.