It's A Jungle Out There... We Can Help!
Office Hours
8 AM - 5 PM
Contact Us
570.970.6555

Another WILD Software Recommendation

Store passwords and more with LockBox … A secure, digital vault for protecting your private details. You can generate ultra-secure passwords, using stronger, more complicated passwords is more important now than ever because “password123” just won’t do anymore! Save login credentials, add notes, links, account info, registrations details, files and store them privately and securely. Protect everything in your…

Read More

So What Is Malware

So what is malware? It comes in a bewildering variety of forms. Computer viruses are probably the most familiar type of malware so named because they spread by making copies of themselves. Worms have a similar property. Other types of malware, such as spyware, are named for what they do: In the case of spyware, it transmits personal information,…

Read More

ATM Security Hoax

ATM Security Hoax: Who needs 911 when you’ve got your trusty PIN number? This scam reports that if you need to call the police at an ATM machine, you can subtly make the call by typing in your PIN number backwards. The website Hoax-Slayer.com reports that the scam “stated that this method of calling the police is very seldom…

Read More

Basics Computer Security

The basics of computer security, and how to make sure you’re protect. Let’s cover computer security. The first thing we’re going to talk about is something called a dictionary attack which has to do with your passwords. When creating your passwords, some sites require extremely specific and complicated passwords, which is actually a bit unnecessary. The type of attacks…

Read More

Top 10 Online Threats

The strategies hackers use to break into your site can be complicated but the results are usually pretty simple; lost revenue. Here are the 10 most common threats identified by the Open Web Application Security Project: 1. Injection. It’s not uncommon for web applications to have injection flaws, especially SQL injection flaws. A hacker who finds one will send…

Read More