Blog

Archive for August, 2014

6 Password Tips to Protect Against Business and Identity Theft

Ah, those pesky passwords. If you work in the corporate world or in an office, you have one for your PC/Network and, unless there is a password synchronization application that combines them, you probably have more than one for other applications. Add those to the ones that you have for your home Internet, your banking and other websites that require passwords, and before you know it you have a nightmare on your hands in trying to manage them. How easy a target are you for business and identity theft?

Part of the frustration has to do with the different requirements for password formatting. Some systems only require four characters, some require eight. Some need a combination of alpha and numeric characters and others do the same with the addition of a few capital letters thrown in for extra security. It can be positively maddening.

The worst thing you can do with your passwords is to place them in a text document which can be accessed on the hard drive of your computer. Your files are vulnerable to business and identity theft- even if you think they are not. If someone is intent on finding them, they can. Even if you place them into a password protected document, those can be cracked, too.

Writing them down has its own vulnerabilities, too, and there are varying opinions on this practice. If you do write them down on a piece of paper, put the document in a locked location whether it is in your home or at work.

Here are 6 tips on how to handle your passwords to protect against business and identity theft:

1. Make them complex. People who use easy to remember or short passwords are inviting disaster. Use a little imagination and pick a password that is very difficult to attach to your life. Stay away from birth dates, phone numbers, house numbers, or any other number that is associated with your life.

2. Keep passwords unique. When you change your passwords, make them unique from each other. Do not use the same password on all of your sites. If you do, then you are open to having every site that you have a password to being vulnerable to hackers to log on and steal your identity, money or destroy your reputation.

3. Be obscure. Use a combination of letters, numbers, capital letters and special characters if possible. The more you do this, the more secure your passwords will become. Create an alphanumeric version of a term you can remember. Using this technique the word “Spaceship” becomes “Sp@ce5h!p”.

4. Change regularly. This is the singular tip that can save you if you do not heed any of the other tips. How often should you change your password? How secure do you want to be? The frequency with which you change your password will determine how secure you are from becoming a victim. The more often you change it, the better you are. The longer you leave it the same, the more vulnerable you become. Three months is a good cycle for a password, but certainly if you fear for the security of your identity, then a monthly change is not out of the question.

5. Password-protect your PC. Be sure to give your PC a password on power-up. This will help protect your files unrestricted access to your PC.

6. Password-protect your wireless home network. If you have a wireless home network, be sure to password protect it as well. Use the same principles above in order to secure your wireless network. This will prevent others from accessing your connection and using it maliciously to hack the personal or business PCs and laptops you and your family use at home.

Finally, there are password programs that can help with this important task, but the best advice is to start with the tips above right away. Password software can be useful as an organizational tool, but it is no match for using sound methods to manage and make your passwords difficult to crack.

Click here to learn how Virtual IT Managers, Inc. can help protect you against business and identity theft with our Network Security Services for your business in Miami, FL and surrounding cities.

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

Do You Allow Employees To Use Their Own Devices For Work?

The evolution of personal mobile devices and the rise of how necessary they are to business success these days are forcing many small business owners to make a choice – “Bring Your Own Device” (BYOD) vs. “Corporate Owned, Personally Enabled” (COPE).

The Typical Solution – BYOD. According to the CDW 2012 Small Business Mobility Report, 89% of small-business employees use their personal mobile devices for work. But the headache involved here is how do you support and secure all of these devices? The scary thing is that most small businesses don’t even try! The CDW survey found that only 1 in 5 small businesses have deployed (or plan to deploy) any systems for managing and securing employees’ personal devices.

The Alternative – Is COPE Any Better? A minority of small businesses have implemented a Corporate Owned, Personally Enabled (COPE) policy instead. They buy their employees’ mobile devices, secure them and then let employees load additional personal applications that they want or need. And the employers control what types of apps can be added too. The “personally enabled” aspect of COPE allows employees to choose the company-approved device they prefer while permitting them to use it both personally and professionally. COPE is certainly more controlled and secure, but for a business with a limited budget, buying devices for every employee can add up pretty quick. If you go the COPE route and are large enough to buy in volume, you can likely negotiate substantial discounts.

Security Concerns With BYOD. If you have client information that must be kept secure or other industry-specific regulations regarding the security of client data, then COPE is likely your best approach. It removes any gray area around whose data is whose. Plus there is a certain comfort level in being able to recover or confiscate any device for any reason at any time to protect your company without any worries about device ownership.

Struggling to figure out which option is best for your business? Our FREE Mobile Device Policy Consultation ($297 value) helps point you in the right direction for your business.

http://virtualitmanagers.com/mobile-computing/

Or Call Us Direct: 305-574-2169

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

Could Buying A Computer Actually INCREASE Your Cash Flow?

 

If you dread writing checks for a network upgrade because it hits your cash flow in a big way, then you’ll want to look into HaaS or “hardware as a service.”

HaaS is becoming a more common option for businesses because it allows you to pay for ALL your IT services – hardware, installation, security, backups, applications, Internet, etc. – as a flat-fee service, thereby eliminating the heavy cash-flow hit of upgrading or expanding a computer network and giving you the ability to write off 100% of your IT expenses without having to depreciate those assets over time. Additionally, your IT provider takes total responsibility for the maintenance of your network.

Like businesses that lease their equipment, HaaS customers pay monthly for their infrastructure. This allows them to keep more cash in their pocket and gives them the tax advantage of converting a typical capital expense into an operational expense. But unlike leasing, HaaS can also do the following:

     1) No More Expensive Surprise Upgrades. With HaaS, your computers are automatically replaced with new ones every 3-4 years, ensuring compatibility with almost any software refresh. No end-of-lease buyouts of outdated equipment or ever having to re-lease equipment again.

     2) Warranties Are A Thing Of The Past. With a HaaS program, you get your equipment AND the service included in the monthly cost. Anything that goes wrong with the computer (like the inevitable computer crash just days after your warranty expires) is our problem to resolve. Plus, since HaaS computers are replaced on a regular schedule, you don’t have to settle for refurbished parts or old computers for long.

     3) One Easy Invoice. Purchasing via a HaaS program is like having a condo. You get control of what goes in it, but don’t have to worry about maintenance, building-code issues or updating the facade. Everything in one low monthly fee!

     Looking to upgrade equipment while saving cash? Call us today at 305-574-2169 to find out if HaaS is right for you.

 

Call Us Today To Find Out If HaaS Is Right For Your Business!

Looking for a way to get new computers without the big up-front outlay of cash? Call us today to learn more about HaaS and find out if it’s a right fit for your business.

 

Enjoy these benefits with HaaS:

  • Avoid expensive computer and server hardware upgrades.
  • Free software licensing and upgrades.
  • Your warranty is covered by us.
  • Pay-as-you-go service.
  • Your full monthly expense is a tax write-off.

Call 305-574-2169 or go online: www.http://virtualitmanagers.com/it-solutions/hardware-as-a-service/ to start saving today!

 

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →