The Attivo Group will get your system implemented - on time and within budget. Realize increased efficiencies, lower costs and improve profits. As trusted advisors for distributors, manufacturers and service providers, we will help you improve and automate your business processes.
Subscribe By Email
05-09-2013 / The Who, What, Why and When of Standard Costing
05-06-2013 / Effects of Barcoding Felt Well Beyond the Warehouse
04-29-2013 / Macola in the Cloud: A Match Made in Heaven
04-15-2013 / Understanding the Hidden Savings of Cloud ERP is Key
04-09-2013 / Behind the Numbers: Why Smart Money is on ERP
03-28-2013 / EDI - Taking Your ERP to the Next Level
03-11-2013 / Moving to the Cloud in 4 Easy Steps
03-06-2013 / Looking Past the Shop Floor to Improve Lead Times
02-26-2013 / In the World of Cloud Computing, Speed Can Kill
02-13-2013 / What Exactly is a "Dedicated Cloud"
02-07-2013 / 3 Revenue Pitfalls To Avoid When Moving to the Cloud
01-30-2013 / Where is ERP Heading for 2013?
01-24-2013 / Why Cloud Hosted ERP is Set to Take Off in 2013
QuickBooks upgrade BQE Software small business manufacturing QuickBooks Manufacturing Consultants Conditional Scheduled Report Analytics Small Manufacturing Software Macola Progression SQL ISO 9001 Accounting System Support sales tax audit ACT! restoring contacts Exact Synergy Document Management Exact Macola Intuit Summit 2011 ERP systems webshops QuickBooks add on ISO 9001 consultant ERP software Process Manufacturing Manufacturing Software Business Strategy ERP Support quality management representative Business Consulting erequester taxes Great Plains 1099 tax forms Down Economy new business tax event management programming QuickBooks implementation WiSys Find SQL Data inventory valuation Glenn McPeak IT infrastructure Fishbowl Software Efficiency Gains Globe Enterprise Dynamics CRM The Attivo Group Technical Support Email productivity Affordable Accounting workflow filters Exact Reseller SQL Tools
Follow Len's Tweets...
Cloud Security: Don't Overlook Protecting Your Personal Devices
08-08-2012 / By:
Did you know that the most commonly used password online is “password”? If you’d like to take a few minutes to change your current password to something a bit more complicated we’ll wait.
Good. The second most common password online is "123456". Yes, we’ll wait again.
All kidding aside, and we really hope that none of you had to change your passwords just now, there was a great blog written by Wired’s Mat Honan that will scare you into changing the way you think of setting up online accounts and the passwords that you use. If you even had an inkling of a thought to move to the hills of Montana and swear off all technology, this blog might be the catalyst to start packing.
In the blog, Honan outlines how his entire life was hacked, how much worse it could have been had the hacker wanted to really do financial damage, and how anyone currently reading this blog could not only be a victim, but could also very easily pull off the same hacking feat by doing a basic internet search and having the nerve to pose as someone else when calling Apple or Amazon customer support.
It’s a scary thought that access to our phones, tablets, personal computers, and by extension our financial data, personal photos, social media accounts and e-mail can be accessed with so little effort.
So how did one of the leading technology bloggers get compromised so easily? He didn’t take the extra steps to protect himself. And most likely, very few of you have either.
How Safe is your Company Data?
Cloud security is only as good as your cloud provider. While a top of the line cloud hosting provider will offer security features like 24/7 live systems management, online security breach alarms, and double authentication passwords, its not industry standard, and only protects from hackers trying to directly break into your servers. But because of the nature of cloud computing, and the fact that people use personal mobile devices and home computers to work remotely, those become a gateway for hackers to crack your system. Unless of course you are doing the necessary things to protect yourself from potential threats.
What You Should Do to Protect Your Personal Devices
1) Change up your e-mail — Most people have multiple e-mail accounts. And most people use the same prefix for all of their e-mail accounts. The prefix being the identifying name before the @gmail or @me part of the e-mail address. Once a hacker knows the prefix for one of your e-mail accounts, odds are that they know all of them, putting them one step closer to accessing vital data.
2) Use 2 Step Authentication — Not all services provide this but it is a simple way to prevent hackers from getting into your e-mail. It’s pretty straight forward too. In addition to a regular password, in order to log into your account you need a second code that is sent to you via text message. This video from Google explains the process in more detail.
3) Don’t use the same password for everything — We’re all guilty of it. With all of the different online accounts that we all have, it can be hard to remember multiple passwords. So we get lazy. And we don’t change our passwords. Ever. If we want to truly protect ourselves, people need to not only have multiple passwords, but those passwords should be changed on a regular basis.
While these methods aren’t 100% foolproof, hackers generally
target the most vulnerable. Making their
lives a little more difficult can go a long way towards convincing a hacker to
move on to the next target rather than expending the energy needed to exploit
you and your company.
photo credit: Don Hankins via photo pin cc