We use passwords for so many different services and websites that we often resort to using the same password. But this approach is very dangerous.

Think about it for a second. If your one and only password is compromised then every account you use is at risk. This includes your business email, social media accounts and any in-house software your organization uses. And this constitutes a lot of sensitive data. Therefore, the one-password-fits-all approach is a tightrope we don’t recommend traversing.

But creating a password is tough. And remembering it is even more difficult. Especially, as discussed, when you need to remember so many on a daily basis. Sure, you could write them all down, but this in itself is a major security risk. And what if you lose the piece of paper? So, you need a number of password strategies that help you create a unique password every time.

Creating Unique Passwords You Can Remember

For a password to stand out it needs to be memorable. And, for it to remain secure, it needs to be hard to crack. That’s why using your name and date of birth, such as johndoe110275, makes for such a poor password. It may be memorable to you, but it also contains details that are easy to obtain. Instead, you need to get a little more creative.

Acronyms are one of the simplest ways to get creative with your passwords. For example, if you want a unique password for your business emails then you could come up with a phrase such as “I need my business emails on a day to day basis at all times” which, in turn, could form the acronym ‘Inmbeoad2db@at”. It’s a password which is difficult to crack, but also one that’s easy to remember for the creator.

An alternative to acronyms, and equally successful, is the use of passwords which appear similar, but are customized depending on where they are used. So, for example, you could start with a basic template of ‘Alway$_SITENAME_f0rme’ that you adapt for each different account you need to log into e.g. ‘Alway$_Linkedin_f0rme’ or ‘Alway$_Outlook_f0rme’.  This method allows you to memorize a fairly simple foundation for your passwords and then complete the blank with ease each time you need to access that website or app.

Finally, one of the easiest and quickest methods for creating unique passwords is by investing in a password manager. But what is a password manager? Well, rather than assigning the role of password manager to yourself you delegate it to an app. The password manager can not only create randomized passwords that are difficult to crack, but they also act as a digital storage safe. As a result, the pain of both creating and remembering your password for each and every service is significantly reduced.

Final Thoughts

By using proven methods and tapping in to your natural creativity it’s possible to create a unique password for every account you use. Remembering all of these passwords is also a lot easier than you think. But, even if you do struggle to remember them, help is at hand in the form of password managers. So, there really is no excuse for compromising your accounts by recycling the same old password across every account.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Is the Cloud Secure?

Cloud computing is seen as the future of IT, but concerns regarding its security remain. A case in point is the Freedom Healthcare Staffing leak.

Compromised data is always associated with various dangers and problems, but these are always magnified when the data at risk is personal. And the employees of Freedom Healthcare Staffing (FHS) now know what this feels like. Around 957,000 private records were found to be readily available to anyone with an internet connection. These records included drug test records, recruitment details and in-house communications among more technical networking details. Not only were these records available, but the opportunity to edit and delete this data was also an option.

As more and more organizations are moving towards cloud computing, it’s important to understand where FHS went wrong. Let’s see what we can find out.

What Happened with FHS?

The unsecured data at FHS was compromised for one reason and one reason only: negligence. The folder, which contained close to a million records, was on a publicly available drive and had no password protection. Therefore any web browser, such as Chrome or Firefox, could access the data without providing any administration credentials. To make matters worse, the technical data that was visible in this folder provided an opportunity for hackers to delve even deeper into the FHS network. After a security researcher from Security Discovery analyzed this compromised database they informed FHS and all records were quickly secured.

 

Why is Cloud Security So Lax?

Cloud storage is a relatively recent development in IT, so it should come as no surprise that there are teething problems with the technology. But this doesn’t mean data should be left unsecured. Unfortunately, many consumers feel as though the responsibility of their data security should lie purely with the cloud provider. This approach, as FHS discovered, can be highly dangerous. You only have to take a look at the attacks taking place on cloud based data to understand why.

Organizations need to adopt a shared responsibility mindset in order to protect their cloud. And this should incorporate the following:

Enhanced knowledge will, with time, allow us to understand the limitations of cloud security, but as FHS discovered it’s important to take a proactive approach immediately.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Your PC network’s first line of defense is usually a password. But if you’re working with bad passwords then you run the risk of compromising this security.

Almost every computer application requires a password to access it. And, in business, these passwords can provide access to numerous terminals and networks. A lot of data is available on these computer systems and this is why security should always be a priority. However, your security can only be as strong as your first line of defense. And if your passwords are weak then your organization’s security is going to be equally weak.

There are certain mistakes associated with weak passwords that need to be eliminated from your business to keep it safe and secure. Let’s take a look at some of the most common password mistakes:

  • Writing it Down: All over the country there are thousands of Post-It notes containing secure login details that are attached to PCs. This is a major security risk. Passwords need protection of their own. If they’re on display for the entire world to see then, that’s right, the entire world can take advantage of them. Instead, memorize the password or invest in a password manager. 
  • Sharing Passwords: Although not quite as severe as writing your password down, sharing passwords with colleagues is still a guaranteed method of weakening your password. It may feel as though sharing your password – if, for example, you’re away from the office and a colleague needs to access a document on your PC – is a safe move, but there is no guarantee that your PC will remain secure. If you do have to share your password then make sure you change it as soon as possible. 
  • Using the Same Password: You should never use the same password across multiple applications. If you do favor recycling your passwords in this manner then you can easily fall victim to password bots. These automated pieces of code are loaded up with login details – usually purchased on the dark web – and then instructed to try and gain access to other websites with them. So, if your LinkedIn login details have been hacked, it’s possible for a hacker to use a bot to try these details in Gmail, Twitter and Instagram. And, if the details are the same, you’re going to get hacked. 
  • Based on Personal Details: An easy method for formulating a password that you can remember is by basing it on some personal details. So, for example, you may use your date of birth or your mother’s maiden name. It’s unlikely you’ll forget these, so you won’t have to write them down and compromise their security. The only problem is that personal details can easily be accessed by others. And this is never truer than in the digital age where our personal details are splashed all over our social media accounts. 
  • Too Simple: A password needs to be complex, so working with passwords such as ‘123456’ and ‘Password’ is a poor strategy. However, due to the ease with which these can be remembered, many people use them as passwords. And hackers are aware of this. What you really want is a password which is unusually complex e.g. one that doesn’t contain recognizable words or number sequences.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


It’s crucial that PC networks are secure and protected. But this doesn’t mean that individual PCs should be neglected when it comes to security.

There are plenty of threats awaiting your employees’ workstations. And these are often threats that are difficult to monitor and identify. Protecting each individual workstation should be a priority. You can achieve this by providing training to your employees. Educating them in the best practices of workstation security allow you to enhance security. And there are measures that you, as an organization, can also take to protect your workstations.

The Best Ways to Secure a PC Workstation

The damage that can be caused from a single PC can have wide reaching implications for your organization. So, protecting these workstations is essential. Make sure you implement the following:

  • Lock Screens: When employees go to lunch they have a tendency to leave their PC unattended. And this is very dangerous. Anyone passing, be they an employee or a visitor, has the opportunity to access the data on that PC. You don’t have to be a security expert to understand how serious a threat this is. However, the threat can be completely nullified by encouraging your employees to lock their screens. In Windows 10 all you have to do is hit the Windows key and the L-key to password protect your screen. 
  • Disable USB Ports: USB ports are a major security risk to workstations as they allow a multitude of devices to connect to your PC. These can be as innocent as a charging device for your phone, but there’s also the potential for malware to be uploaded to the workstation. There’s a myth that gluing up USB ports is a suitable solution, but the truth is that this approach is amateur at best. Instead your IT team needs to be disabling power to these ports to prevent unauthorized devices being connected. 
  • Encrypt Personal Files: Every employee will have unique and sensitive files on their workstations. Giving these files a high level of security should be a priority. And your employees have the opportunity to strengthen this security. All they need to do is encrypt the folders that contain these files. By right clicking the folder in question you can move through Properties and then click the Advanced button to access Advanced Attributes. In here you can select encryption options and set a unique password. 

Final Thoughts 

It’s important that your organization and employees work together to strengthen workstation security. Training should always be a priority. A good training program will deliver skills that are invaluable in protecting workstations. And, by protecting individual workstations, you are significantly reducing the threat of any data breaches.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


We all use passwords on a daily basis, but do we know how they work? And how do you go about creating the best and most secure passwords?

Every day, in our home and business lives, we use an assortment of passwords to gain access to systems that are important to us. Entering passwords is such a regular occurrence that it soon becomes automatic. This regularity means that we pay little attention to the process. But we should. Passwords, after all, are what protect our data. And, in an age of huge data breaches, it needs protecting.

This protection can be enhanced with good passwords. For a good password to provide security, however, you need to understand how a password works.

What is a Password?

Passwords have been used since the dawn of time to gain access to secure areas. In ancient times, a visitor to a king’s palace would have gained access in exchange for a password. Fast forward several hundred years and very little has changed. Accessing a king’s palace may not be a major requirement in your life, but passwords are crucial in the digital age. Using a series of numbers, letters and symbols, a password helps you to gain access to computer networks, databases and social media.

How Does a Password Work?

It’s easy to enter passwords all day long, but understanding the process is another matter. What is it that allows a series of characters to grant you access to shielded content? Let’s take a look.

When you set up a password it’s not stored in the same form as it’s typed. Instead it’s stored as a hash. Using advanced cryptography, a hash takes your password and converts it into a number. These hashes tend to be 128 or 256 digits long depending on the encryption method. Either way they’re more complex than a 10-character password. These hashes are then stored in a file as a reference guide to verify the password entered. If the password matches the corresponding hash then access is approved. Otherwise, access is denied.

What Makes a Good Password?

Now you know how a password works you need to make sure you have a good password. The stronger your password is the less chance there is of a hack taking place. To strengthen your passwords make sure you:

  • Keep it Long: A longer password adds complexity. Hackers tend to target passwords through brute force attacks, so a longer password is more time consuming. Aim for around 15 characters as this isn’t too difficult to remember, but it also provides complexity.
  • Avoid Obvious Passwords: Many IT users go for simple passwords such as PASSWORD. And when that expires they add a number on the end. While these passwords are very easy to remember they’re as easy to guess. These types of passwords will be the first ones that hackers try. More often than not they’ll pay off. And that’s why you need to create a unique password.
  • Don’t Use Personal Information: Another common mistake with passwords is to use personal information such as your name or date of birth. This may feel unique, but it’s information that is researchable. Hackers are cunning and it won’t take them more than a few minutes to get this data. So, make sure that nothing contained within your password can be connected to yourself.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More