443-992-7394

How Can I Create A Secure Password? Tips from Your Baltimore IT Company

Creating a secure password isn’t that difficult, but why do so many people have a hard time doing that? Simple, because they don’t want to have to remember the difficult password. This is why so many people use ‘password’ as their password. It is easy to remember.

However, if a website is asking you to create a password, it is important that you create a strong password; especially, if you want to keep your sensitive information private (Bank Account, Facebook, Twitter, etc.). Below, your Baltimore IT company has compiled a list of tips for having a secure password.

  • It should be at least eight characters long
  • Does not contain your name or the username
  • Is not a complete word, use a phrase instead
  • Is not the same as all of your other passwords
  • Contains:
    • One uppercase letter
    • One lowercase letter
    • A number
    • A unique symbol (!@#$%)

If you feel you must write down your password in order to remember it, make sure you don’t label it as your password, and keep it in a safe place. The last thing you want is to become the victim of your accounts being hacked. The more confusing your password is, the safer it is.

Welcome to Working Nets – your virtual IT Department in Baltimore!

At Working Nets in Baltimore, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Hackers Are At It Again – Their Target, Snapchat

Recently a major security flaw has been exposed in the picture messaging app, Snapchat. If you are unfamiliar, Snapchat is a mobile only app for sending pictures and videos that self-destruct after ten seconds. The point of the app is to be able to share images and videos without wondering who else will see them.

A group of hackers recently discovered a flaw in the app’s security and threatened to expose it if the founder of the app did not attempt to fix it. The app was not fixed and on December 31, 2013 SnapchatDB.info was born. On the site, there is a list of 4.6 million usernames and phone numbers of people that use Snapchat.

So you use Snapchat and you’re worried – now what?

Fortunately, the hackers don’t plan on doing anything malicious with the information they uncovered. But if you want to see if your personal information is safe. Head over to http://lookup.gibsonsec.org/ and type in your username. It will search the database to see if your username and phone number has been compromised.

If your information has been shared, the safest thing you can do is delete your account. Unfortunately, it will not remove your phone number from the website though.

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

http://techcrunch.com/2013/12/31/hackers-claim-to-publish-list-of-4-6m-snapchat-usernames-and-numbers/?utm_source=Daily+Skimm&utm_campaign=f5611fb713-daily_skimm&utm_medium=email&utm_term=0_74efee6205-f5611fb713-23660825

Acceptable Internet Use While At Work

Much concern has been raised by many business owners, about how to handle inappropriate Internet use at work. Frankly, business owners probably aren’t concerned enough. Let’s look at some interesting statistics. Now mind you. these statistics are from 2006, but I think we can safely presume the situation hasn’t gotten any better:

Stats are from the LocalTel Business Content Web Filter site.

  • 64% of employees admit to using the Internet for personal interest during working hours.
  • 70% of all pornography traffic occurs during the nine-to-five work day.
  • 60% of all online purchases are made during working hours.
  • 37% of at-work internet users in the US had visited an X-rated Web Site from work.
  • 37% of employees report searching for jobs online at work.
  • 27% of Fortune 500 companies have defended themselves from claims of sexual harassment stemming from inappropriate e-mails and Internet use.

All this results in an estimated 30% – 40% loss of productivity. And this doesn’t even consider the effect of the bandwidth spent on this and other things like streaming audio, which could impact even the performance of the users who are trying to use the Internet for business purposes.

In cases where employees download pirated software, music or videos, the businesses could be found liable – even if they didn’t know about it.

And that’s not even to mention the lawsuits that can be brought, particularly if the material is sexual in nature, against the company if a hostile workplace suit is brought.

Bottom line: You need to protect your business.

How? Well, there are a number of components to this, and technical solutions can play an important part of it. But the most important piece, and the one that most businesses – especially small businesses – don’t do, is to put an Internet Acceptable Use Policy in place. This is a policy that explains what is and is not acceptable, and the consequences of non-compliance. If the employees don’t have such a policy, they can always claim they didn’t know it wasn’t okay. Click here for some sample policies.

Once the policy is made available, there are technologies that can be put into place to help monitor and safeguard access. Systems can be as rigid or flexible as the company feels appropriate, while still being protected from inappropriate use.

Keep your business safe!

Disaster Recovery Services from Working Nets in Baltimore, Maryland

At Working Nets, we were founded to provide small businesses, like yours, with expert information technology support they needed. Our disaster recovery services help ensure your vital business data is kept safe and secure!

If you have any questions about Disaster Recovery, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today! You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Olympic-Themed Internet Phishing Scams :: Cybersecurity Tips

Every four years, the best athletes gather from around the globe to compete in the Olympics. Unfortunately, the Olympics also provide Internet scammers with a new outlet to try and phish information from unsuspecting and trustworthy individuals.

What is Phishing?

Phishing refers to attempting to acquire personal information – such as usernames, passwords, and credit card information – and money by masquerading as a trustworthy entity.

Olympic-Themed Phishing Scams

  • London 2012 Ticketing Team: This phishing scam sees scammers pose as ticketing officials offering unsuspecting individuals with an once-in-a-lifetime opportunity to purchase Olympic tickets that have been made available because of a previous bidder’s inability to pay for them. However, unlike the previous bidder, you are expected to pay upfront. This is why the original email is followed by a phone call asking for credit card information.
  • London Olympic Cash Officer: Unsuspecting individuals are sent an email from the “London Olympic Cash Officer” stating that the recipient has been randomly selected to receive a cash prize of 1.6 million GBP. However, to receive the payment the individual must provide personal information.
  • Dr. Beavis: Unsuspecting individuals are sent an email (signed by Dr. Beavis) stating that they, along with 6 other individuals, have been randomly selected as the winners of 7 million GBP. And, of course, they must provide personal information to claim their prize.
  • You are needed … Get Back to Us: Unsuspecting individuals are sent an email headed “You are needed … Get Back to Us.” It informs the recipient that they are needed to participate in the Olympics as a coordinator or event staffer. The individual is then directed to a site where they must input personal information and provide payment for the placement services.
  • Ring Steward: Unsuspecting individuals are sent an email (or letter) informing them that they have been selected to be a ring steward in the Olympics. Recipients are asked to call a phone number for additional details. And guess what? They are then asked to provide personal information.
  • Text Message Scams: Yep, phishing scams can include text messages, as well. This phishing scam involves a text message stating that the recipient has won 300,000 pounds in the London 2012 lottery. Recipients are then asked to call a phone number and provide personal information to claim their prize.

And this is just the beginning!

If you have any questions about Internet Phishing Scams and IT Security, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

10 Olympics-Themed Phishing Scams To Avoid At All Costs