Keep a close watch on IT system access These days, most businesses are subject to data protection laws or regulations of one kind or another. Violations often come with pretty stiff penalties. To help demonstrate you are compliant with access control requirements, you should have clear policies and procedures about who gets access to what,…
passwords
Don’t be a victim to a password hack. Be safe and choose proper passwords.
Do You Know Who Has Access to Your Systems?
When you took their keys back, did you cancel their passwords, too? The last time an employee left your business, did you revoke their access to your IT systems? Are you sure? Do you have a way to check? What kind of information could your former employees get if they still hold valid credentials?…
What is the Best Way to Change Your Passwords?
You change your clothes. You change your oil. Make sure you also change your passwords. An alert pops up on your computer: It is time to change your password again. Sigh. Fine. You will just change from password4! to password5! and― Not so fast. Regular password changes are meant to make sure that even if…
How Strong Are Your Passwords?
Strong Security Starts with Strong Passwords If you use the same password for multiple systems―online shopping, email, your company’s cloud bookkeeping solution, etc.―you are not alone. Even Facebook founder Mark Zuckerburg is guilty of this. In 2016 his LinkedIn credentials were compromised in a major breach, giving hackers access to his Twitter account, too,…
Heartbleed Bug, Password Security, and You
Two weeks ago computer security researchers notified the public of the Heartbleed Bug, a “serious vulnerability in the popular OpenSSL cryptographic software library” that is widely used around the web. Left unchecked, it left a lot of people’s data at at risk, where third-parties could potentially eavesdrop on sensitive data including passwords. In response, system…