Tag Archive

Cradlepoint NetCloud Engine

Cradlepoint NetCloud: Securely Connecting People, Places and Things with 4G LTE, SD-WAN and Cloud Services …

Jungle Computer is a Cradlepoint Reseller …
Distributed and mobile enterprises across many industries are embracing cloud, mobile, and Internet of Things (IoT) technologies to increase business agility, empower distributed workforces, and gain operational insights—driving the need for always-connected people, places, and things.

As a result, an increasing amount of enterprise network traffic is moving off private IP networks and onto the public Internet. The Cradlepoint NetCloud platform is designed specifically for this new “Interprise” era and allows companies to deploy private cloud networks over wired and wireless broadband Internet services for branch, mobile workforce, vehicle, and IoT networks.

Jungle Computer
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com

Basics Computer Security

The basics of computer security, and how to make sure you’re protect.

Let’s cover computer security.

The first thing we’re going to talk about is something called a dictionary attack which has to do with your passwords. When creating your passwords, some sites require extremely specific and complicated passwords, which is actually a bit unnecessary. The type of attacks they’re trying to guard you from are dictionary attacks.

Dictionary attacks are programmed to try every word in the dictionary, or in its own database of common words and passwords, as the password for a large mass of usernames. If your password is Kangaroo, they’re probably going to break into your account. Most passwords aren’t this simple, but that doesn’t matter. They attack such a massive amount of accounts that they only need a few passwords that are relatively simple. When creating a password, you want to use different cases, numbers, and symbols, but one of the most effective ways to create a good password is to throw some random letters in there (ex: kangarooSyCA67). Also, stay away from sequential numbers.

SecurityPhishing, another thing to watch out for, is emails or webpages that mimic other valid sites to try and trick people into entering their personal information, though the site truly isn’t connected to the site it’s trying to mimic. In general, two ways to safeguard from these attacks are checking the address in the browser and to open a new browser and go to the website that is claiming to contact you.

Let’s also discuss encryption and HTTPS. If you are at Starbucks trying to access your bank account, you have reason to be suspicious that someone could see and take your information. You will want to look for a green HTTPS instead of HTTP at the beginning of the web address. That means that the site you’re sending your information to is encrypting your passwords and other information, scrambling up data according to a code that only they know.

In general, whenever you’re showing private or sensitive information, check for HTTPS. A few other general tips: don’t share passwords between important accounts. If a site you use gets hacked into, your password may be compromised regardless of its strength. Also, don’t download strange files. If you don’t recognize the file type like .pdf, .txt, .jpg, be wary. Some of these files you download can be very powerful and even run your computer from the inside.

Lastly, keep your software updated, particularly software that interacts with the internet. One way that information can be compromised is when ‘bad guys’ find holes and gaps in security of older versions of software. Those bugs have been patched in newer versions, so if you keep everything updated, you’ll avoid lots of problems. These are very basic things you should know about how to keep your information safe on your computer.


Jungle Computer LLC.
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com

Top 10 Online Threats

Jungle ComputerThe strategies hackers use to break into your site can be complicated but the results are usually pretty simple; lost revenue.

Here are the 10 most common threats identified by the Open Web Application Security Project:

1. Injection.

It’s not uncommon for web applications to have injection flaws, especially SQL injection flaws. A hacker who finds one will send malicious data as part of a command or query. The attacker’s message tricks the app into changing data or executing a command it was not designed to obey.


2. Cross-site Scripting.

Cross-site Scripting flaws occur whenever an application sends user-supplied data to a web browser without validating it first. Hackers use these flaws to hijack users away from the site or deface it, thereby costing the site owner in lost business.


3. Insecure Direct Object References.

Applications that lack checks to verify a user is authorized to view particular content can be manipulated to access private data.


4. Broken Authentication.

When account credentials and session tokens aren’t properly protected, hackers can assume users’ identities online.


5. Cross-site Request Forgery (CSRF).

A CSRF attack tricks unknowing site visitors into submitting forged HTTP requests via image tags, XSS, or other techniques. If the user is logged in, the attack succeeds.


Jungle Computer Repair6. Security Misconfiguration.

Security misconfiguration flaws give hackers unauthorized access to system data via default accounts, unused pages, unpatched flaws, unprotected files and directories.


7. Insecure Cryptographic Storage.

Many web applications don’t do enough to protect sensitive data such as credit card numbers, Social Security numbers and login credentials . Thieves may use this data for identity theft, credit card fraud or other crimes.


8. Failure to Restrict URL Access.

Often an app will protect sensitive interactions by not showing links or URLs to unauthorized users. Attackers use this weakness to access those URLs directly in order to carry out unauthorized actions.


9. Insufficient Transport Layer Protection.

Applications often fail to authenticate, encrypt and protect the confidentiality of network traffic. Some use weak algorithms, expired or invalid certificates or use them incorrectly. This allows hackers to “eavesdrop” on online exchanges. An SSL Certificate typically neutralizes this threat.


10. Invalidated Redirects & Forwards.

Web applications often redirect or forward legitimate users to other pages and websites, using insecure data to determine the destination. Attackers use this weakness to redirect victims to phishing or malware sites, or use forwards to open private pages.

https://www.secureserver.net/security/malware-scanner.aspx?ci=89298&prog_id=270511

Support Local Businesses

In lean times, consumers pinch pennies and eliminate most luxuries. From cutting back on extras to more prudent spending and budgeting, people inject a degree of caution into their financial habits. In such a volatile environment, smaller, local businesses count on your patronage in order to stay afloat; every transaction is precious to them. So when deciding where to spend your hard-earned dollars on tonight’s dinner or a gift for a friend, consider the benefits of turning to local, independently owned businesses within your community.

Local businessesThere are far-reaching advantages to deciding to “shop local.” By supporting local businesses, you are in turn supporting your local economy; significantly more money stays in a community when purchases are made at locally owned, rather than nationally owned, businesses. The U.S. Small Business Association and the U.S. Department of Labor report the positive impacts of small, independent business on local economies.

  • Local businesses are more likely to utilize other local businesses such as banks, service providers, and farms.
  • For every $100 you spend at local businesses, $68 will stay in the community.
  • Independent retailers return more than three times as much money per dollar of sales to the community in which they operate than chain competitors. Independent restaurants return more than two times as much money per dollar of sales than national restaurant chains.
  • Small businesses employ 77 million Americans and accounted for 65% of all new jobs over the past 17 years.

In addition to helping build the local economy, there are also notable intangible benefits that come from supporting businesses in your local community.

  • Local businesses are owned and operated by your neighbors!
  • They care about and are invested in the well-being of your community and its future.
  • Local businesses are more accountable to their local communities and donate more money to non-profits.
  • Supporting local businesses is good for the environment because they often have a smaller carbon footprint than larger companies.
  • It isn’t always the easiest or most convenient option to visit a local independent business rather than a large national chain that might be down the street.

more


Jungle Computer LLC.
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com

Online Storage

Store your files in the cloud! Access documents, photos, video, and more — anytime, anywhere.

We make the cloud flexible, reliable and affordable.
No matter how you choose to use it, Online Storage gives you the features you want – including expert 24/7 support – at a price that puts other cloud services to shame. Still not convinced? Check out the chart below to see how we stack up against the competition.
Learn more

Online Storage

Jungle Computer LLC.
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com