Total Digital Security Blog 

Serene office space with a city view at dusk.

3 min read

From Estate Planning to Data Estate Planning: The Next Frontier for Family Offices

For generations, family offices and ultra-high net worth families have mastered the art of estate planning — preserving wealth, ensuring succession, and safeguarding legacy.

Read More

2 min read

Clarity for a New Era: Announcing the New TotalDigitalSecurity.com

Since 2013, Total Digital Security has been dedicated to a singular mission: providing cybersecurity for the world's most successful families and the...

Read More

3 min read

The Secure & Intelligent Family Office: A Leader's Guide to AI & Cybersecurity Integration

In the world of family offices and the ultra-high-net-worth individuals they serve, a new reality has taken hold. It’s a reality defined by a "dual...

Read More

2 min read

Behind the Scenes: The Future of Your Security is Evolving!

June is here, and we're thrilled to share some of the extraordinary progress we're making behind the scenes at Total Digital Security, particularly...

Read More
the smishing threat

3 min read

Chinese "Smishing" Operations: A Growing Threat to Your Digital Wallet

This month, I want to bring your attention to a sophisticated and remarkably successful scam that has expanded globally and is now targeting...

Read More

3 min read

Staying Ahead of Cyber Threats With AI - TDS Vx

Since 2013, Total Digital Security (TDS) has been dedicated to protecting individuals, families, and businesses from cyber threats. Over the years,...

Read More

3 min read

Cybersecurity for Trusted Advisors and Their Private Clients

It's officially tax-season and trusted advisors everywhere will be reaching out to their clients soon. It's also a great time to add value to your...

Read More

6 min read

What I Learned Using AI to Break Down JPM’s 2025 Investment Outlook

Recently, I embarked on a personal project with two clear and distinct objectives:

Read More

5 min read

Cybersecurity Recap for 2024 and Preparing for 2025

Year-End Letter - 2024 Navigating Cybersecurity: Reflections on 2024 and Insights for 2025

Read More
new normal in ai and cybersecurity

5 min read

Hyper Rates of Change: The New Normal in AI & Cybersecurity

Reflecting on Change and Progress

Read More

2 min read

Consumer Cybercrime Losses Approach Enterprise Damages Amid IT Security Boom

In 2013, I started TDS based on “The Democratization of Cyber Risk” where consumer-based cybercrime damages would eventually surpass those targeting...

Read More

3 min read

The Evolving Threat of Phishing Scams – A Glimpse into the Future

We've noticed a new twist in phishing scams that we wanted to bring to your attention. You may well have seen it yourself. In our view, it's a sign...

Read More
national public data breach

3 min read

National Public Data Breach: Immediate Steps and Future Implications

In a significant cybersecurity breach, the National Public Data company — a firm aggregating and storing vast amounts of personal information — was...

Read More

2 min read

The AT&T Breach - What To Do

On the AT&T Breach

Read More

14 min read

Q&A with Brad Deflin, Founder of Total Digital Security

Brad Deflin tells the Total Digital Security story in this Q&A from May 16th, 2024.

Read More

5 min read

Risk Reset in Cybersecurity

At Total Digital Security (TDS,) we’ve consistently avoided the tactic of ‘selling fear.’ Our approach has always emphasized:

Read More
image of individual at desk with an ecosystem of cybersecurity and privacy.

6 min read

Navigating the Cyber Landscape: TDS's Blueprint for Digital Security

In February's blog, we delve deep into the core values of Total Digital Security, encapsulated in our commitment to provide an ecosystem ensuring...

Read More

3 min read

Top Recommendations for CyberSecurity

From our December 2023 CyberAdvisor Letter

Read More

4 min read

Introducing Next-gen Managed Network Security Service

We've been dropping hints about an exciting innovation in collaboration with our partners, and now, it's time to lift the curtain. I hope you will...

Read More

3 min read

AI, Fact v. Fiction, and Email

This is a fact; digital technology drives change like nothing else. So, correspondingly, adaptation and evolution are as crucial to survival and...

Read More
your own private internet

3 min read

Your own private internet

Cybercrime is one of your top risks of loss and inconvenience and continues growing exponentially. We suggest it's time to privatize your internet -...

Read More

2 min read

Them Changes

First, LastPass since it's still #1 for FAQs this year. Here are the answers; yes, the hack was bad. Yes, you need to do something. Maybe, you should...

Read More

3 min read

Last Days for LastPass

I've been using LastPass since 2014 and have recommended the password manager to others for just as long. Even in light of the hacks in years past,...

Read More

2 min read

Nobody Will Do This For You- Protecting Privacy, Preventing Cybercrime

In October, we saw new clients with damages and a near miss of $16,000, $22,000, and $350,000. Losses in these cases are not suffered by businesses...

Read More
a screenshot for Carrie Kerskie with Brad Deflin on cybersecurity and privacy with private email

13 min read

On Private Email Accounts, with Carrie Kerskie

From a podcast w/ Carrie Kerskie and Brad Deflin on Private Email, August 2022.

Read More
PayPal scam screenshot of phishing email

1 min read

PayPal Scam Alert

I briefly mentioned this new scam in last month's CyberAdviser, and we continue to see more victims, so this is a special "heads-up."

Read More

5 min read

Spoofing and phishing - take the gain to avoid the pain

Cybercrime and online fraud continue to victimize the unaware and unprepared. In July, we saw various cases, the most severe being a $200,000 loss to...

Read More

3 min read

Everything's Changed

June 29th marked the iPhone's 15th anniversary. It's a moment marked by history and worth pondering.

Read More

3 min read

New partners, new products, and critical updates on phishing threats

Total Digital Security is excited to announce a strategic partnership with Batten Safe.

Read More

1 min read

Changes at F-Secure, now WithSecure

F-Secure this month announced an organizational change that separates their consumer and business cybersecurity lines. The consumer line of products...

Read More

1 min read

Our Partnership with Red Five Security and the Merging of Physical and Digital Risk

In February, we announced a strategic partnership with Red Five Security from Arlington, VA.

Read More

2 min read

Cybersecurity's Rule #1 - don't do this!

Cybersecurity's Rule #1 Please, never do this!

Read More

2 min read

Buckle Up for Privacy and Cybersecurity in 2022

Total Digital Security provides privacy and cybersecurity solutions for private clients and their personal technology. We serve clients in over 40...

Read More

2 min read

On Privacy and Cybersecurity

Values and beliefs in a world of change For some, the events of the last 20 years have compelled greater introspect and evaluation of their core...

Read More
next gen phishing

2 min read

Next-gen phishing is a hybrid and very effective

We're seeing a rash of sophisticated phishing schemes ensnaring even those that are aware and alert to such scams. As we mentioned in November's...

Read More
independence from big tech

1 min read

On reclaiming our independence from Big Tech

In August, we said the time is nigh to say "Goodbye Google" and cleave more Big Tech from our lives. Then last month, we recommended saying "Hello...

Read More
Swiss milk cow in a grass field in the Alps.

2 min read

Digital Vaults for Storing Sensitive Documents

The leading provider of digital vaults is a Swiss firm, SecureSafe. SecureSafe's parent company is DSwiss, a secure electronic document storage...

Read More

2 min read

The Best Browser for Privacy and Protecting Personal Information

Here, we look at internet browsers and make a recommendation for optimal privacy and protection of your personal information.

Read More
T-Mobile logo and slogan in pink banner

1 min read

T-Mobile Breach - What To Do

T-Mobile said yesterday that data from 40 million former clients and prospective clients plus 8 million current users had been breached.

Read More

4 min read

Goodbye, Google

This month's CyberAdvisor covers these four main topics: Decentralizing from Big Tech Essential iPhone security Living with your VPN Hacking smart...

Read More

3 min read

Computer Security - How to protect computer and phones

We define the “Three Primary Attack Surfaces” as email, internet devices, and networks for cyber-fraud and online damages. It’s across these three...

Read More

1 min read

Mobile Protection for iPhone Security, iPads & Androids

For iPhone and iPad security, we've always said these two things:

Read More
an overlay of white photos with mail envelopes and a lock for email security

4 min read

Privatizing Email and Securing Your Inbox

Email is where over 85% of all cyber-related damages start. Over 90% of malware is delivered via email. In 2020, malware attacks increased by 358%....

Read More

3 min read

Cybersecurity for VIP, Private Clients, & High-profile Individuals

Most private clients and wealthy families are woefully unprepared for the massive cyber-related risks they face today. These individuals and groups...

Read More

4 min read

Ransomware, Apathy, and AI

The top question for my inbox in May was, “How can this happen?” How can a computer virus take down the biggest fuel pipeline in the country? The...

Read More

3 min read

Home Internet Routers and Security

Home and office internet and Wi-Fi networks are inherently vulnerable and increasingly targeted by hackers. The recent T-Mobile breach started with...

Read More

2 min read

Protect Privacy & Personal Information with Increased Government Powers

In late 2020 we began to see an emerging trend at TDS - new clients and others reported terrible experiences with cyberstalking and harassment. Our...

Read More
photo image of blue LAN cables on a keyboard with a combination lock for home network cybersecurity

2 min read

Home Network Cybersecurity

Home and home office internet routers have become a major point of failure for privacy and digital security concerns. Routers are more vulnerable...

Read More

2 min read

F-Secure is Best for Computer Security, Again

The thing about cybersecurity is you have to defend successfully 100% of the time. The hacker, on the other hand, only has to succeed once. In other...

Read More

3 min read

Computers, Complexity, and Coping

These are frustrating times, with much to be frustrated about. Politicians failing us at every turn, rampant fraud in government services and relief...

Read More

6 min read

Bursting Big Tech's Bubble

Last month's blog on "Information Weaponization and Warfare" received more attention than any since we began in 2014. I couldn't be more thrilled...

Read More

3 min read

Information Weaponization and Warfare

It's taken me longer than usual to write this blog - the first of 2021. The last few weeks' events have been so unsettling and surreal that...

Read More
photo graphic image montage of businessman in suit holding glowing laptop and pointing to email security

1 min read

Preventing Email Phishing and Spoofing

Prevent Loss from Phishing and Spoofing Emails Anyone using email should be aware of phishing and spoofing emails. In many cases, these fraudulent...

Read More
image of lock and cybersecurity in gray and white

2 min read

Digital Security Basics - Three Primary Attack Surfaces for Hackers

Digital Security Basics: Where You’re Vulnerable

Read More
image from above of arm and hand with smartphone in front of an open laptop

1 min read

The AAA Strategy for Privacy and Digital Security

The dog days of August 2020 start fittingly enough with a hurricane named Isais, which in Spanish means "God Is My Salvation." In turn, salvation...

Read More

5 min read

Three Strategies for Personal Risk Management in the 2020s

Today marks the midpoint of 2020.. Looking at current conditions and thinking about the past six months, it's hard to conceive the range of...

Read More

3 min read

Email Spoofing Risks on the Rise

Threats and damages from email are spiking. Over the last 60 days, we've seen an increase of over 25% in the rate of new "email spoofing" cases. Some...

Read More
foggy trail lined by trees with rising sun at end of path

3 min read

Shifting Priorities for Life After COVID-19

Current events have been called by some, including yours truly, evidence that we are entering a historical age and new world order. If the notion is...

Read More
aerial landscape view of urban city with buildings and lights

36 min read

How'd It Happen - podcast with Brad Deflin

I first met Mike Malatesta at the University of Wisconsin in Milwaukee last December. The YPO had invited me to present "Cybersecurity for Life" at...

Read More
view of earth from space with an overlay of internet network nodes

3 min read

Networks and the New World Order

I started TDS in 2013 with a vision of significant change during our lifetimes.

Read More

3 min read

Managing the Risks of Working from Home

My friend Ted Bauman from Banyan Hill included "Managing the Risks of Working from Home" as a "Special Update" in his March Baumann Letter. Ted and I...

Read More

11 min read

Avoiding Cybercrime and Online Fraud

From a presentation by Brad Deflin to a private investment management firm.

Read More

5 min read

Cybersecurity Simplified - Law CLE

The following transcript is from a presentation made to the Montana 9th Judicial District on June 7th, 2019 for CLE credits in technology. Charts and...

Read More

3 min read

About Total Digital Security

What We Do Total Digital Security provides industry-leading cybersecurity solutions for protection from cybercrime and online risk. We do it by...

Read More
black and white image of man's hands holding a document with a pen as he reviews it with clients

4 min read

Cybersecurity for Professionals & Private Clients

Trusted advisors everywhere are reaching out to their clients this time of year. It's the season for checking-in, catching up, and sharing good...

Read More
Icon of WiFi use a VPN every day

2 min read

VPN User's Guide

VPNs can be cranky for the user. They're impatient, sensitive, and unforgiving. Without some context and critical thought, they'll drive you crazy at...

Read More
a black wrought iron gate at the entrance to the private home of a VIP and wealthy family

5 min read

Family Office Cybersecurity for Private Clients, Wealthy Families, and VIPs

This article originally appeared in the Fall 2019 issue of Family Office Magazine.

Read More
Screen Shot 2019-08-28 at 7.01.23 PM

2 min read

Digital Defense: Keeping your family safe online.

"Digital Defense: Keeping your family safe online" is in its 5th year of publication. The paper started as a collaboration with Merrill Lynch in...

Read More
Gulfstream business jet on approach rx sq

6 min read

Cybercrime-as-a-service for Riches and Retirement

In July, the Governor of Louisiana declared a state of emergency in response to a rash of cyberattacks against its schools. The declaration is the...

Read More
ransomware in paradise

4 min read

Ransomware (Really) is Everywhere

The scourge of digital extortion continues to hit hard over the last few weeks since June's CyberAdvisor titled "Ransomware is Everywhere." You can't...

Read More
desktop locked ransomware woman copy

2 min read

RANSOMWARE is EVERYWHERE

Cybercrime damages in 2019 are expected to reach $1.5 trillion. By 2021, damages will reach as much as $6 trillion. That's a 4x in just the next two...

Read More
read more button blue

3 min read

The Russian Govt and Cybercriminals

In April 2018, I wrote: "Are the Russians in Your Router?" Then in May; "If Your Alexa Wears a Babushka." Nobody got the joke. Last Sunday's...

Read More
an open laptop with a black diary on a table overlooking a green garden

15 min read

Cyber Security for Private Clients

RANE - the Risk Assessment Network Chief Marketing Officer, Greg Radner, interviews Total Digital Security CEO and Founder Brad Deflin, on "Improving...

Read More
black and white image of a smart phone, pen, and watch gears

3 min read

Cybersecurity for High Net Worth Individuals and Families

The Chicago-based firm Hillard Heintze is one of the leading security risk management companies in the world, and Steven Bova is Vice President for...

Read More
Encryption key image

2 min read

End-to-End Encryption and Sharing Documents for Free

The most useful tool for cybersecurity is encryption. But for many, sharing encrypted documents and files isn't affordable or simple enough for...

Read More
front gate hacker laptop

3 min read

What's the Best Browser for Privacy and Security?

An internet browser is like the main gate in and out of your digital life. Without controls and blocks for what comes in, and protection for what...

Read More
screen of code with chrome logo

1 min read

Severe Chrome Vulnerability Reported by Google - Update Immediately

Google's Threat Analysis Group reported a "severe vulnerability" in its Chrome browser. The vulnerability is actively being exploited in the wild,...

Read More
Best Performance Award for F-Secure 2018

2 min read

F-Secure Wins Best Cyber Protection for Computer Security

F-Secure has won the "Best Protection" award by AV-Test for 2018. The win marks the sixth time winning the first place award since 2011. The...

Read More
colorful binder spines with one marked

2 min read

Our Top Password Manager

Cybercrime is big business. With costs estimated to be in the trillions of dollars annually by 2021 according to Microsoft and the World Economic...

Read More
grey black and white photo of a laptop with PASSWORD MANAGEMENT on the screen

4 min read

How to Make Passwords You Can Remember

A safe password is defined as one that won't be hacked and yet is easy to remember. Here is a technique with some of your creativity that makes great...

Read More
ms-is9l2c

8 min read

Year-End Letter,  2018

Six years ago this March and after 25 years working with Wall Street investment and banking firms, I started Total Digital Security. Risk management...

Read More
Google data center under blue sky privacy

3 min read

On Filter Bubbles and The Data-Industrial Complex

The following article by Brad Deflin was coined "The Filter Bubble is Controlling Your Thoughts" by Ted Bauman, privacy guru at Banyan Hill in his...

Read More
red and white traffic gate with STOP sign

3 min read

Cyber Security and the Gates of Wrath

Sometimes explaining digital risk and cybersecurity takes imagination. For me, metaphors and analogies abound. Here's another one; think of advanced...

Read More

4 min read

10 Reasons Why Private Email is Essential Today

Cybercrime statistics say over 80% of all successful breaches start with an email. Over 90% of new customers that come to us as a result of a cyber...

Read More
the best VPN by Total Digital Security

6 min read

New #1 Recommended VPN

A VPN shields your online activities from the outside, including on public WiFi networks. The encryption and tunneling features of a VPN reduce the...

Read More
Digital Darwin evolution wipad wide banner -859409-edited

6 min read

A Crisis of Critical Thinking Skills for the Digital Age

History will eventually view the dawn of the Digital Age as an inflection point that redefined humanity. And like in times past, change and...

Read More
server room email envelope rx

2 min read

New Security Features for Private Email Accounts

New cybersecurity features have been released for our Private Email service. The enhancements, which have come on a regular basis since we initiated...

Read More
screen of code with chrome logo

2 min read

Update Your Chrome Browser ASAP

A severe security bug has been discovered in Chrome. We advise updating ASAP. Here's how.

Read More
a background of white marble with black streaks

3 min read

Private Client & VIP Cyber Security

Today, cyber risk resides at the intersection of people and the technology they use every day, not servers and IT departments. For VIPs, we combine...

Read More
a split image photo with coach class on left, and private jet on right

5 min read

Private Email Server and Accounts - How-to Guide

Did you know over 90% of successful cyber-attacks begin with an email? Privatizing email reduces cyber risk more than any other measure. And it...

Read More
hacker_cash_money

4 min read

Cyber Crime - Who's Protecting You?

The world's leading researcher covering the global cyber economy says we will soon experience the greatest transfer of wealth in the history of...

Read More
an assortment of WiFi router models

6 min read

Router Hacks, the Russians, and If Your Alexa Wears a Babushka

Is your Alexa insisting you call her Olga? When you ask her about the weather at your summer home, does she reply using the word "dacha"? Recently,...

Read More
field notes spiral pad

6 min read

Cyber Risk in Daily Life - Reporting From the Field

I tell people being in the cybersecurity business is a front-row seat for what’s really happening in the world of hacking and cybercrime. Especially...

Read More
laptop dev hands cyber image rx.jpeg

2 min read

Automatic Software Updates - Why It's So Important?

Total Digital Security offers a comprehensive list of cyber security solutions for both businesses and individuals, with the highest ranked,...

Read More
Wood table with many digital devices and people as viewed from above copy

7 min read

Family Office Cyber Security IT and Trends

Making successful IT-related decisions for the family office today requires a markedly different approach than even just a few years ago. Without...

Read More
white board man pointing rx

3 min read

Cyber Security Awareness Training for Employees

Based on decades of experience in the cyber security industry, Total Digital Security encourages employers and organizational leaders to put more...

Read More
device locks hand rx

3 min read

RMM - for Device Protection

Tablets, laptops, and telephones are increasingly utilized as both personal and business tools that support mobility, efficiency, and communications....

Read More
locked network security FNS laptop copy

3 min read

Small, Mid Size Business Wireless Network Security Solutions

With daily stories about cyber crimes in the news, it doesn’t take a rocket scientist to recognize that cyber threats are real and getting worse. And...

Read More
a cartoon image of a home in a protective bubble protecting it from the dangerous storm

4 min read

Home Office Cyber Security

Even the most secure home is never completely safe. Intruders can find ways to break in, whether it’s through back doors or loose windows, or even...

Read More
Lights of encryption.jpeg

3 min read

Automatic Encryption

While it’s not always necessary for the end user to understand the details of how a virtual private network with automatic encryption works, it’s...

Read More
woman with phone using a VPN for privacy while walking on a cobbled sidewalk

3 min read

What's a VPN? Should I Use One? Which is the best VPN?

Using a VPN service is like having your own private airplane, private airspace, and private airport too -- all of your flights take the same route as...

Read More
aerial view over the intracoastal water of Palm beach looking at the Breakers Hotel out to the Atlantic Ocean

1 min read

The Palm Beach Chamber of Commerce Presentation on Cybersecurity

Brad Deflin, founder of Total Digital Security presenting to the Palm Beach Chamber of Commerce on Cybersecurity.

Read More

3 min read

About Digital Security

Today’s mobile devices need to support multiple security objectives, such as confidentiality, integrity, and availability. And as we demand more and...

Read More
grey studio office with digital devices and a black coffee cup

3 min read

Comprehensive Personal Protection for all Digital Devices 

Total Digital Security offers a complete set of the best digital device protection software, products & solutions available, including PC, laptop &...

Read More
an open laptop with screen displaying

3 min read

The Best Private Email Account Service, from Total Digital Security

Research has shown that nine out of every ten viruses that infect a computer reach it through an email attachment. Free email is the number one...

Read More
IT security pros in a dark blue room overlooking computers

5 min read

A Home IT Security Department in the Basement?

Online investors, affluent individuals families, family offices, VIPs, and trusted client advisors are all thinking the same thing; is cyber risk...

Read More
Brad Inform Educate Empower.jpg

4 min read

Cyber Security for Leaders in 2018 - Four Things to Know

From the C-suite and boardroom to the supervisor on the floor, to governance committee chairs and risk oversight members and department heads - there...

Read More
chip bug rx copy.jpeg

1 min read

On the Spectre and Meltdown Chip Flaws

Here is everything the average user needs to know about the recently disclosed chip flaws that are being reported by Intel and the media.

Read More
Melania Trump on Cyberbullying and Total Digital Security.png

2 min read

Open Letter to Melania Trump on Cyber Bullying

This letter was originally sent to First Lady Mrs. Trump on December 6th, 2016 by our VP of Marketing, Diane Kisner. To date, we have not received a...

Read More
full protection home network security icon with cables and combination lock

5 min read

Network Security for home, home office, and remote work

Full Network Security - it protects your home or business internet and everything that's connected to it. Computers, laptops, smartphones, your...

Read More
front gates of home with best cybersecurity for family offices

4 min read

Nominated for Best Cybersecurity Provider for Family Offices.

We're proud to have been nominated by the Family Wealth Report for "Best Cybersecurity Provider for Family Offices." To ClearView Financial Media -...

Read More
device_smartphone_mobile_TDS_splash.jpg

5 min read

About Us

"Total Digital Security combines best-in-science solutions made available to anyone, with real-world information and resources that everyone can use...

Read More
20171113_speaker_series_cybersecurity-9391.jpg

2 min read

Live Stream Event - Brad Deflin on Online Risk and Cybersecurity.

I'll be live streaming from an interview with Marc Bernier on the SpeakER Series at Embry-Riddle Aeronautical University this coming Monday, November...

Read More
Spam box master.jpeg

2 min read

New Spam Filters and Controls for Private Email Accounts

New, advanced spam filter and controls are coming for customers using Private Email accounts from Total Digital Security.

Read More
Freeze dollar cube.png

4 min read

Surviving Equifax and the New Normal for Cybercrime.

If you haven't accepted the "new normal" for cyber risk yet, the Equifax breach ought to do the trick. Here's the why, what, and how of freezing your...

Read More
TWS 2017 Diplomat .png

2 min read

The Total Wealth Symposium 2017

I'm honored to have been asked back for my third consecutive Total Wealth Symposium conference! It was the Bahamas in 2015, Bermuda in 2016, and in...

Read More
drawing of a brain with AI over a photo of a man in blue shirt on a laptop computer using cybersecurity

1 min read

Artificial Intelligence is Enhancing Cybersecurity for Individuals

As a startup in 2013, Total Digital Security was launched to find the best IT technology available anywhere and make it accessible, easy to use, and...

Read More
F-Sec PSB Inx2.png

1 min read

Upgrade to Computer Protection from F-Secure

For Your Windows Computers and Laptops - Device Protection upgrade for F-Secure PSB security service. The upgrade is for Windows computers and...

Read More

3 min read

Guns, Gold, and VPNs.

Last year China demanded Apple stop selling VPNs. Then they outlawed encryption. Now, it's Russia doing the same. VPNs are the great equalizer in the...

Read More
TDS 1-minute animated video what we do.png

What We Do: 1-Minute Animation

The elevator speech - an effective expression of your value proposition stated as quickly and succinctly as possible. It's not always easy to...

Read More
ML PBIG Jul-2017 Family Social Media Policy.png

1 min read

Protecting Your Family from Cybercrime - White Papers

The Merrill Lynch Private Banking Investment Group released new editions of their white papers; "Protecting Your Family in the Digital Age" and "Does...

Read More
CySec Getting Better Bauman Letter June 2017.png

2 min read

Cybersecurity: It's Getting a Little Better - All the Time, Redux.

Since 2013 Total Digital Security has provided commercial-grade cybersecurity solutions to individuals and the technology they use every day. We...

Read More
Screen Shot 2017-06-12 at 7.34.08 PM.png

"Family Offices and Cybersecurity" - by Citi Private Bank

$75,000 is the average cybercrime loss experienced by families with a net worth of more than $10 million according to a new white paper by Citi...

Read More
R.W. Emerson.jpg

5 min read

Transcending Cyber Risk in the New Digital Age

"What potent blood hath modest May." - Ralph W. Emerson Emerson's few words transcend again. I've always liked Emerson. And, for me, May is a good...

Read More
a green highway sign

4 min read

Keeping the Net Neutral for Cyber Security and Privacy

This week's blog by Dr. Gary Kessler, professor at Embry-Riddle Aeronautical University and Head of the Department of Security Studies and...

Read More
ransomware news copy.jpg

4 min read

How to Prepare for Ransomware Everywhere

One of my first ever blogs was on ransomware. I called it “The Evolution of Extortion.” In early 2014 I tagged Ransomware as the #1 cyber-threat...

Read More
password binder notebook rx.jpeg

2 min read

The Art and Science of Passwords - Redux

Here's the right way to a great password that is effective and yet easy to remember.

Read More
device_smartphone_mobile_TDS_splash.jpg

7 min read

Building a Next-Gen Platform for New Producers and Consumers in the Cybersecurity Industry.

In 2012, I sensed the Internet’s “democratization” effect was reaching cyber risk, such that a massive increase in cyber crime was not far away....

Read More

2 min read

Cybersecurity Solutions -Getting a Little Better All the Time

The Beatles once sang that “I have to admit it’s getting better ... a little better., all the time.” You might not read about it in the headlines,...

Read More
Screen_Shot_2016-02-24_at_5.39.05_PM_copy.png

3 min read

Speaking and Educating on Cybersecurity

For Total Digital Security, 2017 is proving to be a busy year for speaking, educating, and training on cybersecurity and cyber crime. Here, we list a...

Read More
white sun lit office space with white coffee cup and person with a real estate closing document

3 min read

Cybercrime in Real Estate - a New Version of Wire Fraud

If you want to see the state of innovation in crime around the world, watch what's happening in cyber. Smart and sophisticated criminals everywhere...

Read More
family office people graphic-086623-edited.jpeg

3 min read

Family Office Cyber Security Education and Training

Total Digital Security provides cyber security solutions and services directly to users including wealthy individuals and family members, family...

Read More
people employees cybersecurity training education

2 min read

CySEB - Cyber Security as an Employee Benefit

In an era defined by digital technology, new sensibilities for survival and success are increasingly required for employees and organizations alike....

Read More

3 min read

The #1 Way to Start Your New Year Right?

Want to know the #1 action to take as your first accomplishment in 2017 that will benefit you for a lifetime? Start using a password manager....

Read More
logo icons 2016.png

2 min read

Thank You - 2016

When you are building a business and consumed by it in almost all you do, life's lines blur. Work and play become one, as do day and night, weekdays...

Read More
FL Bar New Face of Risk.png

1 min read

Florida Bar CLE Requirements Increased - Tech Mandated for 2017

The Florida Bar recently announced a three-hour increase in its CLE requirements and is mandating technology-related CLE courses. The new requirement...

Read More
slide #3 of a pop quiz for family office cybersecurity

4 min read

Cyber Security Education for the Family Office

Try asking the following three questions of individuals and groups representing the family office and its multiple constituencies: "Do you think...

Read More
Screen Shot 2016-10-23 at 7.07.05 PM.png

4 min read

October's DDoS Attack on the Internet - the Democratization of Global Power

Friday's attack on the internet is a watershed event in the chronical of national security and economic stability. Mark the moment, we've witnessed...

Read More
private_email_security.jpeg

2 min read

The Ultimate Email Account

500 million Yahoo email accounts hacked. Who'd have thunk it? Well, I did. In fact, in 2012 I thought about the Democratization of Cyber Risk (which...

Read More
SDAR_workshop_Brad-181252-edited.jpg

1 min read

Florida Bar CLE Training - Cyber Security for the Florida Lawyer

"The New Face of Risk" for the Florida Lawyer." Tuesday, November 1st 2016 Check-in: 07:45am General Session: 8:00am - 10:00am This course is...

Read More

3 min read

Cybercrime- Protecting home, families & businesses in the digital age.

We returned this year to the Total Wealth Symposium, held annually by the Sovereign Society for its most elite members and advisors. While the...

Read More
Brad Deflin presenting to Realtors on cyber risk and cyber security for real estate professionals

1 min read

Realtors® Association of Palm Beach - Cyber Security for Realtors®

Total Digital Security is holding an ongoing series of education and training sessions for members of the RAPB - Realtors® Association of Palm Beach....

Read More
cybersecurity education

4 min read

Cyber Security Education and Training

Total Digital Security provides cyber security training programs that range from comprehensive, employee-wide education and testing, to workshops for...

Read More
lawyer_documents_device_signbanner_crop.jpg

1 min read

CLE Accredited Training in Cyber Security for Lawyers

Accredited CLE Training - Cyber Security for Lawyers This course focuses on individuals and the technology they use every day, specifically from the...

Read More
Real Estate Broker Summit with Total Digital Security on Cyber Security in Real Estate Sales

1 min read

Training for Cyber Security in Real Estate Sales.

This course offers a comprehensive overview of cyber risk, cybercrime, and the measures that mitigate the risk professionally and personally -...

Read More
cloud_hand_vpn_intro_sldie.jpg

1 min read

An Introduction to VPNs.

Without encryption, you should assume all you do on free WiFi is part of a public conversation. Anyone can watch you enter passwords, communicate...

Read More
banner of the Total Digital Security Four Fundamentals of Cybersecurity for Life icons

2 min read

Cybersecurity for Life - The Four Fundamentals.

Since 2013, Total Digital Security has been informing and educating individuals and groups about advanced principals and solutions for cyber-self...

Read More

2 min read

When Cybercrime Became an Existential Threat.

Mark the moment - cybercrime has joined terrorism as one of the two pillars of existential threats in the world. On July 7th, the UK's NCA (think FBI...

Read More
two hands holding up a precision measuring instrument with RISK spelled out

2 min read

Real Estate Cyber Security

The recent New York Post headline rang "My realtor's email was hacked, and I'm out $2 million dollars!" to subquote an ex-Lehman banker suing his...

Read More
a real estate workshop on cybersecurity with Brad Deflin presenting

2 min read

Speaking, Training, and Workshops for Real Estate Sales Professionals.

When we first coined the "democratization of cyber-risk" in 2012, we explained the phenomenon as a top-down process. Cybercrime started at the top:...

Read More
SWIFT.jpg

1 min read

On the SWIFT Breaches.

Unfortunately for its brand, customers, and partners, SWIFT seems to be operating in a sub-optimal “reactive” mode to the series of cyber breaches on...

Read More
stacks of bundled $100 bills on a white surface

3 min read

Cyber Security in Real Estate Sales

"Cyber Security in Real Estate Sales " begins by addressing three crucial questions: Is cyber risk a real problem in the real estate sales industry?...

Read More
an image of a man using a laptop and vpn with encryption in an internet cafe

3 min read

Why Use a VPN? The Before and After.

When using your phone to connect to a public WiFi hotspot, the signal from your device to the WiFi router is easily tapped, monitored, and scanned...

Read More
a black wrought iron gate and the entrance of a yellow home

3 min read

Real Estate Cyber Risks - Workshops and Broker Summit

At the heart of every residential real estate sales transaction lies information highly sought after by cyber criminals from around the world. The...

Read More

3 min read

Congress Bans Yahoo Mail

The House of Representatives has reported a sharp increase in ransomware attacks and is blaming staff's use of YahooMail. The House Information...

Read More

2 min read

The Imminent Super-Cycle of Cyber Crime

Every new customer that came to us last week all shared the same problem; their email had been hacked. Most were on Gmail, a few on Hotmail, and...

Read More

3 min read

The Rise of the Hacker for Hire

The criminal version of a hacker-for-hire is like a combination private eye and hitman. In each case, the professional is paid on contract to gain...

Read More

3 min read

Cyber Security for Real Estate Professionals.

Residential real estate brokers and agents were among our first customers back in 2013. It was the year before when we began seeing a massive wave of...

Read More

1 min read

Cyber Security Speaking, Training, and Workshop Services.

Since 2013, Total Digital Security has been serving individuals, families, professional practices, and small businesses with advanced resources and...

Read More

3 min read

The Evolution of Pickpocketing - The Phone Hack

Financial theft over public WiFi hot-spots is today's digital equivalent of pickpocketing - one of the oldest and most widespread crimes in the...

Read More

3 min read

Apple Mac and iOS Devices are Increasingly Coming Under Attack

We're in the field every day, where the rubber-hits-the-road when it comes to cyber crime, online fraud, and how it affects individuals and their...

Read More

7 min read

Hedge Funds and Cyber Risk

An Obama administration official showed up at the SALT conference last week to warn the hedge fund industry and its investors of the distinct risks...

Read More

3 min read

The Four Fundamentals of Cyber Security - How to Protect

Since 2013, Total Digital Security has been informing and educating individuals and groups about advanced principals and solutions for cyber-self...

Read More
photo over a frozen lake of the F-Secure cybersecurity company headquarters in Helsinki Finland

3 min read

F-Secure Wins Again for Best Computer Security

F-Secure, one of our preferred IT security vendors was in the news last week. Tech research leader Gartner,Inc. named the Helsinki-based firm a...

Read More

6 min read

Privatize Email

A recent article in the Atlantic Magazine titled "Why an Email Hack Feels So Personal" struck a familiar chord with us at Total Digital Security....

Read More
the logo for the San Diego Real Estate Association

3 min read

Total Digital Security - Cyber Security Services for Realtors

Total Digital Security is pleased to announce we are the exclusive provider of cybersecurity services and solutions to The Greater San Diego...

Read More

3 min read

Cyber Safe Travel - Hotels, Airports and Public WiFi.

August 18th 2017 - We're updating this report on "Cyber Safe Travel" as a result of the recent increase in reports of hotel WiFi based fraud and...

Read More

4 min read

Defending from IRS Tax Refund Fraud and ID Theft in 2016

It's easy to do, it's free, it's very effective, and you don't have to wait to be a victim before using the IRS's Form 14039 to protect your identity...

Read More

2 min read

2015 - A Few of Our Favorite Things

2015 - A Look Back at Some Favorites from the Year in Cyber Security

Read More
black and white photo of a raging ocean with waves pounding a lit lighthouse

7 min read

Total Security - It's What We Do

Cyber crime has become the predominant risk we face as a society today, and when you consider the longterm mega-trends driving change; it's clear we...

Read More
a large silver vault door with computer devices to copy and store estate planning documents in a secure digital vault

3 min read

Estate Planning and Digital Vaults

Estate plans are no longer complete without the inclusion of digital assets and passwords as part of the asset protection and transfer strategy. The...

Read More

3 min read

Ransomware - Four Things You Must Know.

Ransomware is the evolution of extortion. It's one of the fastest growing crimes of 2015 and is trending higher with a capacity to become the #1...

Read More

2 min read

Giving the Gift of Privacy

Looking for a meaningful gift that will last a lifetime this holiday season? For your family members and loved ones, nothing will keep giving like...

Read More
blue computer screen with email security icons for protecting personal information

4 min read

Privatize Your Email and Reclaim Control of Your Personal Information.

One of the key elements to achieving privacy and cyber security as an individual or family is email. "Free" services like Gmail, AOL, Yahoo, and...

Read More

2 min read

From Bits to Bullion - The Alchemy of Cyber Crime.

Mobile computing, cloud storage, and Big Data software have changed the way we interact with information. Less than 10 years into this trend, data...

Read More

2 min read

Network Security: a Plug-and-Play Solution for Home and Business

Innovation in the field of cyber security is heating up in a big way. After decades of stagnation in the industry, recent regulatory pressures...

Read More
a person's hand on a wooden table holding an iPhone with the Total Digital Security logo

4 min read

Device Protection for Avoiding Cybercrime

In today’s hyper-connected world, device security is of utmost importance. Cyber criminals exploit the anonymity of the internet to perpetrate an...

Read More
photo of overlaying identification documents to cope and store in a secure digital vault

2 min read

Digital Documents and Secure Digital Vaults

Online digital vaults for sensitive and treasured electronic files are the safe deposit box of the future. Some of our most precious possessions...

Read More

2 min read

The Art and Science of Passwords

Using and managing passwords is a drag, but the fact remains they are the keys to our information kingdom and for the foreseeable future, an...

Read More

2 min read

4 Phases of Effective and Sustainable Cyber Risk Management

Here we offer a four phase strategic approach to effective and sustainable cyber risk management and mitigation. Awareness and Awakening Planning and...

Read More

3 min read

Nonprofit Organizations - Four Guideposts for IT Strategy and Cyber Security

Nonprofits are facing new challenges managing their IT today. The shift to mobile has changed the organizations' operating perimeter, and new risks...

Read More

9 min read

Managing Change in the Digital Age

Does it feel things are changing faster than ever before? Well, they are. For the past 50 years, the pace of change in everyday life has been...

Read More

3 min read

Wearables - Protecting the Intersection of Digital and Analog Life

Airports, public WiFi networks, hotels, cafes and anywhere else people gather in the course of their daily activities - all are honeypots for...

Read More
a satellite image of Earth with Florida in the center

9 min read

Cybersecurity Florida - Becoming the Nation's "Cyber State"

According to Steve Kroft of CBS News' "60 Minutes" and Wilfredo Ferrer, the U.S. Attorney for South Florida, Florida owns some dubious titles in the...

Read More
using other peoples metadata

1 min read

OPM - Other People's Metadata

If your enterprise trades in sensitive information, especially as it pertains to security clearances with the U.S Government and its employees,...

Read More

4 min read

IT Security as an Employee Benefit

For the enterprise, the greatest challenges in cyber security today exist at the individual level and with protecting perimeter operating...

Read More
image from above of a busy city sidewalk street with many people moving in all directions

4 min read

Cyber Crime- How Individuals and Personal Information Became Target #1

Like everything it touches, the Internet has successfully democratized cyber risk, and the theft of personal information has become the #1 motive for...

Read More

6 min read

Corporate Treasury in the Information Age.

The AFP's annual Corporate Treasurer's Council Forum was held in Chicago last week and titled "Treasury in the Information Age." CTC members include...

Read More
large black wrought iron gate at the entrance to a long driveway to a large house

4 min read

Cybersecurity for Residential Real Estate Firms and Associates

Residential real estate sales agents and firms were early adopters of the internet, and now online technology plays a fundamental role in almost...

Read More
blue background with white letters spelling a crossed-out X over F-E-A-R and an iPhone VPN

4 min read

3 Reasons to Start Using Personal VPN Services Every Day.

A Virtual Private Network or VPN is the most effective way to protect yourself from the internet when using mobile technology online. Without a VPN,...

Read More
a group seated at a board table with the leader standing overlooking glass window cityscape

4 min read

Cybersecurity for Non-Profit Organizations

In this week's report, we offer a fresh look at information security and privacy strategies that specifically address the challenges that most...

Read More

4 min read

ERAU - At the Leading Edge of Cyber Security as a Social Science.

Embry-Riddle Aeronautical University has graduated six astronauts, provided the airline industry with more pilots than anywhere else in the world,...

Read More

2 min read

How Can Consumers Protect Themselves After Data Breaches?

It’s Finally Happened - A Data Breach You've received a letter from your bank or a business that you’ve patronized. There’s been a data breach. Your...

Read More
photo of a large conference room and presentation screen with red clothed circular tables and professionals at work with computers

3 min read

The Family Office Cyber Security - The New Face of Risk

Family offices are finding the emerging risks related to cyber security as particularly challenging. Even by today's standards, the online...

Read More
1 2