Total Defense

Security & Safety Resource Center

Learn about today's current internet threats and how to stay safe and secure.

Threats & Risks

The latest updates on constantly evolving viruses, malware, ransomware, spyware and online threats.


How to spot an online scam

As you spend more time online, engaging in a greater variety of activities and digitizing previously analogue aspects of your life, you entrust your personal information to online processes. This opens up avenues that scammers may attempt to take advantage of. Keeping yourself protected from fraudulent activity is increasingly important, since so much of day-to-day […]

A quick guide to app tracking

How often after downloading an app have you been asked to share your data? How many times have you said yes – even if you didn’t really know what it meant? In either case, you’re not alone.  When you use an app, search the web or send a message, you leave behind a trail of […]

Don’t let ransomware ruin your holidays or weekends

Ransomware attacks are becoming increasingly common worldwide. Businesses large and small are being robbed of their data, money and security. Estimates by Cyber Ventures indicate small businesses in particular are attacked every 11 seconds and make up over half of all ransomware damages worldwide. But with so many threats, how can you stay protected? To […]

A quick guide to banking Trojans

Online banking is supposed to be convenient and secure,  and most of the time, it is. Consumers have come to regard apps from their banks as trustworthy alternatives to visiting a branch. According to multiple surveys compiled by the U.S. Federal Reserve, adoption of online banking including mobile apps has been climbing steadily for years, […]

Is Your Data Safer in the Cloud or on Your Hard Drive?

Should you store your data on a hard drive or in the cloud?

All about spear-phishing emails

It seems there’s no shortage of cybersecurity threats that cautious individuals need to guard against. Phishing is on the most common methods that criminals use for breaching accounts, stealing credentials and compromising data, and there’s no shortage of variations on this technique, including SMS (short message service) phishing, or smishing, and spear-phishing, a kind of […]