, ,

5 Password Management Tools and Why You Need to Use Them

Need a reminder of why strong passwords should be at the top of your technological priority list? Consider the story of Houston, TX, parents Marc and Lauren Gilbert, who on August 10th discovered a hacker had compromised their video baby monitor and was shouting lewd comments at their sleeping two-year-old daughter. 

 

How did it happen? According to the family’s Internet service provider, a weak or nonexistent password for their Wi-Fi connection was the main culprit. Other high-profile password breaches include the Syrian Electronic Army hacking into the Facebook and Twitter accounts of national news outlets like The New York Post and Washington Post, along with the recent proliferation of security researchers (or “ethical hackers”) pointing out the vulnerabilities of home automation systems.

 

What does this mean for you?  As RCS Technology Solutions  has pointed out before, creating strong and unique passwords at least eight characters long that mix upper- and lower-case numbers, letters, and symbols is a necessity for online security. But what do you do with all of those unique passwords once they’re created? Write them down on a “secure” piece of paper? Count on your browser to remember them all? Hope you can figure them out when you’re using a mobile device?

 

That’s where password management tools come in handy. Some are free, some charge a nominal fee, and some are capable of doing much more than just remembering that random string of characters you generated.


But remember,  passwords represent just one facet of robust technological health. If you’re concerned about the safety of cloud computing, the critical nature of data backup and disaster recovery, or the essential need for anti-spam software, call or email  RCS Technology Solutions today. We take your online security seriously!

 

,

Mobile Viruses

Mobile phones are the next target for hackers and virus writers. Malicious software (malware) for wireless devices is growing even faster than it did in the early days of the PC. Take preventive measures to secure your mobile device today.

,

Snow Storm Safety Steps

Power outages can certainly a cure doing storm like the one we have coming today and tomorrow. Please shut down your computers and lap tops to avoid damage doing a sudden loss of power or the surge when it returns.  This is also a great time to back up your system.  We are here to help you with any and all your residential or business technology needs.

Your personal safety is paramount. Have plenty of water, batteries, flashlights, a first aid kit, food you don’t have to cook, or cook it before the storm,  keep your cell phone fully charged, and stay home.

,

Small Business Security Breaches

32% of security breaches could be prevented with secure data backup. Do you have a sound data backup plan in place?

Here is an interesting article.  This applies to everyone, Businesses and Residential users.   http://acgo.eu/AED4EB.

We can help ensure you data, pictures, Music; personal information is safe and secure.

Please let me know what type of information you will find most useful and helpful and I will send information regarding it.  This Tips/Newsletter is for you.

,

BIOS Password

While most people understand the need for a password to access to your operating system, few know and understand the need for a BIOS password.  The password you use to access your computer, lap top, is a system password. Absolutely needed. The stronger the better.  HOWEVER, the strongest password means NOTHING, if you do not have BIOS password.  Without a BIOS password, anyone with physical access to your computer/laptop, can turn it on, and press F2, or F12, access and change your Boot Order. Changing it to the CD/DVD or USB and insert a CD/DVD or USB device, that is bootable.  Once up and on, your hard drive, and all your information, picture, music, etc., is fully accessible as a D Drive. Open it, and read or copy it. Close it and you will never know someone was in your system or has copied ALL your data.  When you turn your system on it will boot right up to your system like nothing happened