According to 2019 data from the FBI’s Internet Crime Complaint Center, about 1,300 complaints were filed with the agency each day that year. A substantial portion of these concerns contained some form of social engineering, a tactic that can be deployed online, over the phone or during in-person interactions. What is social engineering? A 2019 […]
Be careful when clicking directly on links in emails, even if the sender appears to be someone you know. Attempt to independently verify website addresses (e.g., contact your organization’s helpdesk, search the internet for the sender organization’s website or the topic mentioned in the email). Pay attention to the website addresses you click on, as […]
As businesses shifted to accommodate the needs of their newly remote workforces following the COVID-19 pandemic, scammers took note. In order to exploit the uncertainty surrounding the rapid deployment of new software and security solutions, they engaged in deceptive phishing attacks. Targeting Office 365 credentials TechRadar reported on one such attack that encouraged recipients to […]
LinkedIn can be an attractive venue for phishing scams. Why? Because people want to be found and recruited by new and even unfamiliar connections on this platform. They’re looking for opportunities, so they want to be helpful with new contacts. Still, look out for generic names, suspicious messages that pressure you for personal information and […]
Cybercriminals perform social engineering techniques such as phishing, baiting and spear phishing to manipulate their targets into disclosing personal information. Social engineering relies on human interaction to get access to the confidential information they need to commit cybercrimes. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or […]
You might already be aware that one of the tell-tale signs of a phishing ploy is a misspelled domain name or a destination where the true URL is masked by using a link shortener. Be wary of these links, but also look for “https” at the beginning of URLs through which you transmit sensitive data. […]
Privacy /
Legal
Cookie Policy
Do Not Sell My Information
Copyright ©2025 Total Defense LLC. All Rights Reserved.
At Total Defense we take your privacy seriously. We recently made updates to our privacy policy to comply with the European Union’s General Data Privacy Regulation. This policy explains:
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.opentext.com/about/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.