Tuesday, April 24, 2012

A Primer on Password Security

As the number of sites and devices you access multiplies, so do the number of passwords you have to manage over time.  One thing is for sure, we probably don't spend enough time making sure our passwords are safe once we establish a new account,login to a new website, or set up a device to connect to the Internet.

Easiest to Guess and Steal 

If "password" is your online password, you're in good company, and that's bad.  As the single most popular log-in used to access online accounts, it's also the most easily hacked by cybercriminals. Changing the "o" to a zero - "passw0rd" is not much better.  It ranks as the 18th most common, according to SplashData, a company that produces SplashID, a secure password management software.  And with more websites now requiring passwords to include both letters and numbers, you may think you're safe with "abc12."  Think again.  That password ranked fifth.

Top 25 Most Common Passwords

#1. password
#2. 123456
#3. 12345678
#4. qwerty
#5. abc123
#6. monkey
#7. 1234567
#8. lemein
#9. trustno1
#10. dragon
#11. baseball
#12. 111111
#13. iloveyou
#14. master
#15. sunshine
#16. ashley
#17. bailey
#18. passw0rd
#19. shadow
#20. 123123
#21. 654321
#22. superman
#23. qazwsx
#24. michael
#25. football
Some interesting trends have popped up with SplashData's analysis of millions of passwords. Joining the longtime "don"use" password, "qwerty" the top to bottom sequence on a keyboard is "qazwsx."
There's also an increased use of common names.  Officials, however, are baffled by the popularity of "monkey" and "shadow."  But what's clear is that using any of these passwords significantly increases your risk of identity theft. Although cyberthieves sometimes apply sophisticated hacking software, they're more likely to depend on repeatedly trying common passwords to log into your account.


Create Strong Passwords

There are lots of resources on the Internet about how to choose a strong password. For example,  Microsoft's Safety & Security Center shows you how to create strong passwords. In brief, here's a few tips:
  • Go long.  Use at least 12 keystrokes. One study shows that a good 12-character password would take hackers more than 17,000 years to crack.
  • Mix it up.  Use upper- and  lowercase letters, punctuation, symbols, and numbers.
  • Finesse your favorites. For easier recall, base your passwords on foods you like, TV shows, or first letters of a song, but with tweaks, symbols, and conscious misspellings.
  • Think different. Don't use the same password for everything, particularly on your secure sites, such as banks and shopping sites
Security threats are a growing issue for businesses of all sizes. There’s a lot at stake—your computers and network systems, your information and your customers’ data. We stay on top of the latest security hazards and employ a variety of technologies to keep all systems and data safe. At TeamLogic IT our security services ensure your business is always protected. We help by selecting, implementing, and managing IT security services for you.

Friday, April 6, 2012

Is Cloud Computing Right for Your Business?

Cloud Computing may finally be compelling for small to medium sized businesses. To get an idea of the size of the expected market for SMBs, CRN has published a recent survey of more than 3000 SMBs at http://tinyurl.com/7d8v2aj.

There are advantages and limitations to Cloud Computing. As such, you will want to assess your company's situation carefully to ensure Cloud Computing is a good fit as part of your annual business plan. Businesses that would benefit from several of Cloud's advantages without being impacted by the limitations, make good candidates for Cloud Computing.

Keep in mind that when you do engage an IT company, it should not be trying to sell any specific solution. Instead, your consultant should engage you in a discussion about yourself and your business. As a trusted IT partner, your consultant should  make recommendations that meet that your company's specific needs.

Good Cloud Candidates:

  • A company that has remote employees, road warriors, mobile device users and business partners, who require access to critical applications, from wherever they are on multiple devices
  • A company that is experiencing rapid growth or retraction
  • A company that houses sensitive or proprietary information in its systems, but has weak physical security
  • A company that houses proprietary data but has concerns about the physical protection and security of their systems
  • A company that suffers frequent downtime and poor systems performance as a result of aging infrastructure
  • A company that would rather have a monthly operating expense rather than make a large capital investment

Poor Cloud Candidates:

  • A company who wants local control of their data and feels they lose that control in the cloud
  • A company with applications that have large files that need to be accessed with little or no latency
  • A company with limited options for Internet access
  • A company with limited remote access or mobile access needs
  • A company with proprietary software applications that must be hosted on-site
We are a premier IT services company who can help you make the determination whether a cloud implementation is right for you. Our team is MCSE-certified, experienced, and knowledgeable about many solutions. Our core value is to give you great customer care and communication while we take the worry out of your technology.
For more information, contact Jon Simms at  MountainViewCA@TeamLogicIT.com or visit  www.teamlogicit.com/MountainViewCA.