Shopping Cart
Your Cart is Empty
Quantity:
Subtotal
Taxes
Shipping
Total
There was an error with PayPalClick here to try again
CelebrateThank you for your business!You should be receiving an order confirmation from Paypal shortly.Exit Shopping Cart


ELECTRONIC & INTERNET SAFETY

How safe are you really when you are on a computer? To be honest, not very!

But, there are certain steps that you can take to protect your computer and yourself while you are online.

What You Need to Know About Working on the Go

Click this text to start editing. This block is a basic combination of a title and a paragraph. Use it to welcome visitors to your website, or explain a product or service without using an image. Try keeping the paragraph short and breaking off the text-only areas of your page to keep your website interesting to visitors.

Service Name

Click this text to start editing. Use this space to describe your products and services to visitors. Double click the images to choose one that represents the product or service you are highlighting.

How Do I Know If A Wireless Network Is Secure?

Service Name

Click this text to start editing. Use this space to describe your products and services to visitors. Double click the images to choose one that represents the product or service you are highlighting.

9 Ways To Increase The Security Of Your Laptop While On The Road

Service Name

Click this text to start editing. Use this space to describe your products and services to visitors. Double click the images to choose one that represents the product or service you are highlighting.

8 Tips For Working Securely From Wireless Hot Spots


How Do I Choose An Antivirus?

  • The best antivirus programs provide users with real-time virus, spyware, and malware protection as well as high removal and detection rates.
  • It is important to consider how many devices you want to protect and whether you are looking to protect a home or office network.
  • Be sure to look at other factors such as price, online support, and whether or not you can sample the software before purchasing.
  • Each year, do a search to make sure that your antivirus software is still performing with the best.  If it's not, it might be time to change programs.

The Best Rated Antivirus Programs for 2019

The Top 10 Sites                         Top 10 Antivirus

Click this text to start editing. This block is a basic combination of a title and a paragraph. Use it to welcome visitors to your website, or explain a product or service without using an image. Try keeping the paragraph short and breaking off the text-only areas of your page to keep your website interesting to visitors.

Click Here to Add a Title

Click this text to edit. Tell users why they should click the button.

How Do You Secure Your Wireless Network At Home?

Click Here to Add a Title

When we first started the TBW, Social Networking was the new craze. Suddenly people could get back in touch with friends they grew up with, connect with new friends, and keep in touch with family and friends across the world.  So what’s the real risk of Social Media and how do you protect yourself and your family?

Click Here to Add a Title

Scams: Phishing, Hidden URL’s, chain letters and more scams are frequently seen as it relates to social networking sites. The best way to protect yourself against these risks is to educate yourself on what they are. Please see our breakdown of phishing methods, further down the page.


Security Settings: When you first set up an account, make sure you go in an set your security settings so that no one other than your friends has the ability to see your personal information.


Predators: Parents should watch their children closely when they are on social networking sites. Although most sites require that children be of 16 years or older, it is common for kids to create pages with false birthdays. If you know that your child has a social media account, get one too! Pay attention to who their friends are and what is being posted. Be cautious of anyone who is not within the same age group as your child, soliciting conversations or friend requests.

Young Kids

Learn More

Teens

Learn More

Parents

Learn More


The Most Unsafe Social Media Apps

We researched the most unsafe social media apps used by young kids & teens.  Here are the results:

Ban These Apps from Your Teen – TeenSafe 2017 Blacklist

The 12 Apps That Every Parent Of A Teen Should Know About

5 Apps Parents Should Delete from Kid's Phones

Top 12 Best Secret Chat Apps You Should Know

Find Hidden Apps Your Teen Doesn’t Want You Seeing


Common Sense Media

Common Sense Media helps families make smart media choices. We offer the largest, most trusted library of independent age-based and educational ratings and reviews for movies, games, apps, TV shows, websites, books, and music.  Click on the link to visit commonsensemedia.org.

Click Here to Add a Title

Click this text to edit. Tell users why they should click the button.

History Timeline of Social Media - BC-2010

What is Phishing?

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication.

There are a number of different techniques cybercriminals use to obtain personal information from users. As technology becomes more advanced, so do cybercriminals. To prevent Internet phishing, users should have a knowledge of how the bad guys use phishing, and anti-phishing techniques to protect themselves from becoming a victim.

Click Here to Add a Title

Spear

Spear phishing is a targeted attack in which the hacker knows which specific individual or organization they are after.  They do research on the target in order to make the attack more personalized and increase the likelihood of the target falling into their trap.

http://thenounproject.comThe Noun ProjectIcon TemplateRemindersStrokesTry to keep strokes at 4pxMinimum stroke weight is 2pxFor thicker strokes use even numbers: 6px, 8px etc.Remember to expand strokes before saving as an SVGSizeCannot be wider or taller than 100px (artboard size)Scale your icon to fill as much of the artboard as possibleUngroupIf your design has more than one shape, make sure to ungroupSave asSave as .SVG and make sure “Use Artboards” is checked100px.SVG

Whaling

Spear phishing attacks tend to target senior executives or other high-profile targets. The content will be crafted to target an upper manager and the person's role in the company. The content of a whaling attack email may be an executive issue such as a subpoena or customer complaint.

Email/Spam

The most common technique where the same email is sent to millions of users with a request to fill in personal details. These details will be used by the phishers for their illegal activities. Most of the messages have an urgent note which requires the user to enter credentials to update account information, change details, or verify accounts.

Session Hacking

In session hijacking, the phisher exploits the web session control mechanism to steal information from the user. In a simple session hacking procedure known as session sniffing, the phisher can use a sniffer to intercept relevant information so that he or she can access the Web server illegally.

Search Engines

Phishing scams that involve search engines where the user is directed to product sites which may offer low cost products or services. When the user tries to buy the product, entering the credit card details, it’s collected by the phishing site. There are many phishing websites offering credit cards/loans to users at a low rate.

Web Based Delivery

One of the most sophisticated phishing techniques, the hacker is located in between the original website and the phishing system. The phisher traces details during a transaction between the legitimate website and the user. As the user continues to pass information, it is gathered by the phishers, without the user knowing about it.

Link Manipulation

Link manipulation is the technique in which the phisher sends a link to a malicious website. When the user clicks on the deceptive link, it opens up the phisher’s website instead of the website mentioned in the link. Hovering the mouse over the link to view the actual address stops users from falling for link manipulation.

Clone Phishing

A phishing attack where a legitimate email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical/cloned email. The attachment or link within the email is replaced with a malicious version and then sent from an email address spoofed to appear to come from the original sender.

SMS Phishing

Text messages that claim to be from a bank that tell users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher) is dialed, prompts tell users to enter their account numbers and PIN. Sometimes uses fake caller-ID data to give the appearance calls come from a trusted organization.

Voice Phishing

Messages claiming to be from a bank telling users to dial a phone number regarding problems with their bank accounts.  Once the phone number (owned by the phisher) is dialed, prompts tell users to enter their account numbers and PIN.  Sometimes uses fake caller-ID data to give the appearance calls come from a trusted organization.

Malware

Malware requires it to be run on the user’s computer. The malware is usually attached to the email sent to the user by the phishers. Once you click on the link, the malware will start functioning. Sometimes, the malware may also be attached to downloadable files such as Adobe PDF' or those using Flash.

Ransomware

Ransomware denies access to a device or files until a ransom has been paid. Ransomware for PC's is malware that gets installed on a user’s workstation using a social engineering attack where the user gets tricked in clicking on a link, opening an attachment, or clicking on malvertising.

Trojan

A Trojan horse is a type of malware designed to mislead the user with an action that looks legitimate, but actually allows unauthorized access to the user account to collect credentials through the local machine. The acquired information is then transmitted to cybercriminals.

Keyloggers

Malware used to identify inputs from the keyboard. The information is sent to the hackers who will decipher passwords and other information. To prevent key loggers from accessing personal information, secure websites provide options to use mouse clicks to make entries through the virtual keyboard.

Malvertising

Malvertising is malicious advertising that contains active scripts designed to download malware or force unwanted content onto your computer. Exploits in Adobe PDF and Flash are the most common methods used in malvertisements.

Content Injection

Content injection is the technique where the phisher changes a part of the content on the page of a reliable website. This is done to mislead the user to go to a page outside the legitimate website where the user is then asked to enter personal information.

How to Protect Yourself From Phishing...

  • If you don't know who the sender of a message is, don't click on any attachments or embedded links and never submit confidential information through forms embedded in or attached to email messages.
  • If you receive an email reminding or asking you to update your account, or asking for money, go directly to your financial institution or account's website or call them to verify the information you received is correct.
  • Don’t fall for scare tactics.
  • Be suspicious of social media invitations from people you don’t know.
  • Watch out for generic-looking requests for information. Many phishing emails begin with “Dear Sir/Madam.” and have many typos and misspellings. Recent real examples targeting TurboTax include ”Your Change Request is Completeed” and “User Peofile Updates!!!”
  • Update and maintain reliable anti-virus software.

Click Here to Add a Title

Click this text to edit. Tell users why they should click the button.

United States Computer Emergency Readiness Team National Cyber Awareness System

Click Here to Add a Title

Click this text to edit. Tell users why they should click the button.

KEEP SAFE APP TO PROTECT YOUR PHONE WHILE ONLINE