Turn off features on your computer or mobile devices that allow you to connect automatically to Wi-Fi. Once you’ve finished using a network or account, be sure to log out.
Use strong passwords or touch ID features to lock your devices. These security measures can help protect your information if your devices are lost or stolen and keep prying eyes out.
Just because a connector fits your device doesn’t mean you should use it for charging. Unlicensed third-party cables might damage your phone or PC. There’s also the more subtle risk of quicker-than-normal battery degradation through fast-charging. All batteries lose their ability to hold a charge over time, but high-voltage charging accelerates this process.
When you do have Bluetooth enabled, make sure it is “hidden,” not “discoverable.” The hidden mode prevents other Bluetooth devices from recognizing your device. This does not prevent you from using your Bluetooth devices together. You can “pair” devices so that they can find each other even if they are in hidden mode. Although the […]
Disconnect your device from the Internet when you aren’t using it and make sure your device isn’t programmed to automatically connect to Wi-Fi. The likelihood that attackers will target you becomes much higher if your device is always connected.
The United States Computer Emergency Readiness Team (US-CERT) recommends locking your device when you are not using it. You might only step away for a few minutes, but that’s enough time for someone to steal or destroy your information. Use strong PINs and passwords to prevent others from accessing your device.
Privacy /
Legal
Cookie Policy
Do Not Sell My Information
Copyright ©2025 Total Defense LLC. All Rights Reserved.
At Total Defense we take your privacy seriously. We recently made updates to our privacy policy to comply with the European Union’s General Data Privacy Regulation. This policy explains:
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.opentext.com/about/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.