Like biological viruses, computer viruses spread in highly specific ways. Just as influenza infects people via airborne droplets containing virions the body’s immune systems can’t stop, malware takes over computing devices by bypassing their defenses. In other words, viruses don’t come out of nowhere, and with the right preparations it’s possible to contain them before they cause […]
As over 20,000 USB memory sticks are lost each year in the U.S. alone, it’s a wise idea to protect any data you might keep on one with encryption. There are two ways you can do this. You can buy encrypted USB drives that use hardware to protect whatever you store on them, or you […]
Malicious code, also called SQL injection, is a type of attack that places unwanted files on your computer. They may automatically install themselves into your device without your explicit permission. One good way to avoid these attacks is by disabling AutoRun or AutoPlay for external media sources. This prevents external media infected with malicious code […]
Nowadays it’s not uncommon to find publicly available USB ports for charging phones and other devices. But did you know that malicious hackers can take advantage of these charging locations? Hackers can install malware or viruses and steal your information through these public USB ports. Instead, use one of your own chargers and plug it […]
Say you are traveling, you’re in an airport or cafe, you may be tempted to plug your device into an open USB port to charge it. This may be risky, since you don’t know if the port is compromised. Use a wall outlet for charging your mobile device or instead bring your own battery pack.
To prevent theft, loss of sensitive information and unauthorized access to your personal information, don’t leave your mobile devices unattended in a public area. That also includes any USB or external storage devices you may carry with you. While traveling, if you plan on leaving any devices in your hotel room, be sure those items […]
Privacy /
Legal
Cookie Policy
Do Not Sell My Information
Copyright ©2024 Total Defense LLC. All Rights Reserved.
At Total Defense we take your privacy seriously. We recently made updates to our privacy policy to comply with the European Union’s General Data Privacy Regulation. This policy explains:
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.opentext.com/about/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.