Bad passwords make security worthless!

Bad passwords make security worthless!

You can have the most secure infrastructure in the world, but if someone gets your username and password, all that security is for nothing. We at SMIT do our best to prevent malicious breaches for all our clients’ IT infrastructure. Despite following the best IT practices for software security, monitoring for issues, and patching software, a hacker could have access to everything if they obtain your login credentials (username and password). Once that happens, there is little you can do until we (or your IT Support Service) change your user password. So, after managing a business’s IT infrastructure, we still need to make sure that users are vigilant of their login credential security. Over the past 5 years, academic security experts have written extensively about the importance and usefulness of strong end-user passwords. Nonetheless, IT administrators know all too well that end-users don’t want the extremely secure random 30 character password, such as r#Z2p$zv}V~LetZ^wH+q%vnMu”pzdh. However, security research suggests that the most important guidelines for password creation are as follows: Important login passwords should only be used once. The following online login credentials are most often considered important, but you may include more: work login (work computer, work accounts (e.g. RDP access)) email login (work email, Gmail, Yahoo Email, Hotmail) banking/credit login internet service provider login (e.g. Comcast, Century Link) Phone/cell phone service login (e.g. AT&T, Verizon, T-Mobile, Sprint, etc.) Passwords should not consist of only phrases among literature Passwords should not be among the top 25 most common passwords (or slight modifications thereof) see https://en.wikipedia.org/wiki/List_of_the_most_common_passwords Passwords should consist of 14 characters or more to reduce the chance of password...
Why Choose Windows 10 Enterprise?

Why Choose Windows 10 Enterprise?

There many differences between versions of Windows 10, and it’s important to learn what these differences are and what will best suit your business. Microsoft offers Home, Pro, Enterprise, Mobile, And Mobile Enterprise versions of Windows 10. All of these versions have the same basic functionality for home and personal uses, but there are some key security differences which make Enterprise the most attractive for businesses. To name a few, credential guard, increased hardware security, virtualization-based security, device guard and Long Term Servicing Branch. Credential guard gives you a few options when securing your system. Hardware Security – Credential guard uses platform security features such as Secure Boot and Virtualization. Virtualization-based security – This ensures that services that run with “secrets” such as domain credentials (your username and password) run in a protected environment that is isolated from the running operating system. This ensures that any malware that may be running on the operating system is not able to access these “secrets”. Device guard – Enterprise hardware and software features will lock a device down so it can ONLY run trusted applications. It uses the Enterprise controlled policy to determine if something is safe to run, or could cause damage to your system. What about Sharing? One concern people have about Windows 10 is how it uses their information. You may have heard of “Sharing” Wi-Fi passwords, and other “private” information. With Windows 10 Enterprise, it is up to your domain admin to delegate access to any of these “sharing services”. Microsoft also recently explained how it uses any data it takes from your PC. The information Microsoft collects...

Preview of Upcoming Office 2016 Release

Microsoft Office 2016 is on the horizon. In this post, we will let you know about all the new features you will receive by updating to the newest version of Office. A few main features that may be of interest to your business are: Co-Authoring (Word and PowerPoint) You can work with multiple people in real time on the same word document or PowerPoint presentation. Each user has a cursor that is displayed in real time, and all changes are instant. There is also a pane for IM chat on the side, and this incorporates Skype for Business. Simplified Sharing Just click the “share” button to share your documents with coworkers. This allows you to more easily transfer documents, and work together on projects. Office Themes Allows you to use new themes, or go back to classic themes that you are used to. This will reduce the amount of learning it will take to get used to the new User Interface, and increase how comfortable your employees are with the changes. Mail Triage The “Clutter” feature learns how you manage your mail, and can automatically assign a priority to mail items. (low, medium, high). It will help you keep your mailbox under control. Great for users with tons of email. Tell Me Tell Me allows you easier access to help, and how to tutorials within office itself. Simply type in what you want to know, and it will give you a guided tutorial. Great way to learn more about the new features, and expand your knowledge about the program you are using. As you can see, the new Office...