Like on an airplane or in an airport, hotel, train/bus station or café — be sure to confirm the name of the network and exact login processes with appropriate staff to ensure that the network is legitimate. Cybercriminals can easily create a similarly named network hoping that users will overlook which network is the valid […]
Your home’s wireless router is the primary entrance for cybercriminals to access all of your connected devices. More and more of our home devices— including thermostats, door locks, coffee machines, and smoke alarms—are now connected to the Internet. Secure your Wi-Fi network and your digital devices by changing the factory-set default password and username.
Public Wi-Fi is relatively risky to use. If you must use it, make sure it asks for a password and limit your activities to secure sites over HTTPS. Consider using a virtual private network as well for added security.
Not all Wi-Fi networks are equally secure. Look to see if the network is secured with WPA, or preferably the more advanced WPA2 or WPA3. The legacy WEP protocol is not considered secure.
When you have guests over, they might ask you for your Wi-Fi password. If you use Apple devices, you can share it easily without having to tell them what it actually is. Make sure Bluetooth and Wi-Fi are enabled on both devices, Personal Hotspot is turned off and your guest has your Apple ID in […]
This type of attack involves someone secretly altering what seems like a direct exchange between two parties. A classic example is someone stealing information from a user connected to a public Wi-Fi network. One way to fend off such attacks is by using a virtual private network to shield your connection.
Privacy /
Legal
Cookie Policy
Do Not Sell My Information
Copyright ©2025 Total Defense LLC. All Rights Reserved.
At Total Defense we take your privacy seriously. We recently made updates to our privacy policy to comply with the European Union’s General Data Privacy Regulation. This policy explains:
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.opentext.com/about/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.