Total Digital Security Blog 

an image of a man using a laptop and vpn with encryption in an internet cafe

3 min read

Why Use a VPN? The Before and After.

When using your phone to connect to a public WiFi hotspot, the signal from your device to the WiFi router is easily tapped, monitored, and scanned using cheap, widely available technology. Anyone can do it. Also, without protection, your phone can...

Read More
a black wrought iron gate and the entrance of a yellow home

3 min read

Real Estate Cyber Risks - Workshops and Broker Summit

At the heart of every residential real estate sales transaction lies information highly sought after by cyber criminals from around the world. The...

Read More

3 min read

Congress Bans Yahoo Mail

The House of Representatives has reported a sharp increase in ransomware attacks and is blaming staff's use of YahooMail. The House Information...

Read More

2 min read

The Imminent Super-Cycle of Cyber Crime

Every new customer that came to us last week all shared the same problem; their email had been hacked. Most were on Gmail, a few on Hotmail, and...

Read More

3 min read

The Rise of the Hacker for Hire

The criminal version of a hacker-for-hire is like a combination private eye and hitman. In each case, the professional is paid on contract to gain...

Read More
an open laptop with image of woman's face on the screen holding keys to new house

3 min read

Cyber Security for Real Estate Professionals.

Residential real estate brokers and agents were among our first customers back in 2013. It was the year before when we began seeing a massive wave of...

Read More