What makes a password strong is the combination of different alphanumeric, special characters, and capitalization that you use, and of course the length of the password.

I don't know about you, but I don't want to remember and type an epistle when I fill out a password field. And, ideally, I don't want to use the same password on many sites, because if one is compromised then my entire life is unlocked.

I want to show you here how to choose very strong passwords for every website that you use, that are different for each website, and are each only 9 characters in length max.

A study found that an 8-character password that's constructed in the manner I'm going to show you has 7.2 quadrillion different combinations, and will take 83.5 days to crack if the hacker can try 1 billion different passwords per second.
Published in Best Practices
Thursday, 04 November 2010 06:43

Will You Find A Silver Lining In Your Cloud?

Cloud computing is one of the largest growing areas in the IT industry. The concept of “Cloud Computing” refers to the hosting of a server or an application by a third party in an offsite location accessed via the Internet. The premise is that the vendor will not only provide the client with a reliable experience, but one that will be resistant to downtime and data loss.

Personally, I know that the Insurance industry has been enjoying the benefits of cloud computing for many years. But what are the caveats and recent concerns garnered by those enrolled in these online services?

Published in Technology
Thursday, 04 November 2010 06:39

Quick Tech Productivity Pointers

Multitasking has become one of the buzzwords of the twenty-first century. Did you know that your browser lets you multitask, too? Most modern browsers (IE8, Firefox, and Safari) provide the user with a rich interface that allows for multiple windows to be open in the same browser at once. “How is this miracle performed?” you may ask. If you look at the tab shown in the image above, you will see on its right side is a smaller tab. If you place your mouse over it, you will see the option to open a new tab. Click on this tab and a new window will open within the current browser. By clicking on the tabs or pressing the TAB key while depressing the CTRL key, you may cycle through the existing opened windows in your browser. Do you want even more tricks? Once you have multiple windows opened in the browser, you may then notice a new icon to the left of the tabs with a down arrow. This button’s down arrow allows you to open any one window that you want without using the “cycle-thru” method. Click on the button itself and you will see your tabbed windows displayed all together on one screen. In that screen, you may close or activate any of the windows using your mouse. If you prefer to see your tabs in a particular order, you may drag them in order to rearrange them. Having multiple tabs may enhance your day. You can do the same with multiple Home Pages, but that may slow down the initial response of your browser.

Published in Best Practices
Thursday, 04 November 2010 06:32

Refining the Spamming Process For More Hits

Remember the vignette performed by Monty Python’s Flying Circus in which two diners float down into a dive filled with Vikings for a breakfast that doesn’t have much SPAM® in it? Back in the 1970’s, the word “spam” had a much different meaning than it does today

Published in Best Practices
Thursday, 04 November 2010 06:14

What Are The Signs Your PC Has Malware?

Your computer has been terrific—it opens files fast, connects to the Internet quickly, and gets onto the network lickety-split. But now, your machine will not connect to the Internet when you tell it to, it opens up porno websites and gives you pop-ups telling you that your machine has been infected. You don’t need to be Sherlock Holmes to see that something has infected your system. Now, what?

Published in Best Practices
Tuesday, 02 November 2010 06:09

Your Company's Social Media Policy

The time to implement a social media policy is now.

Your social media policy outlines for employees your companies guidelines or principles for communicating in the online world.  Your company should have a communications policy in place that spell out your expectations for phone and email, it’s important that you add social media and online site usage to this policy.

Published in Best Practices
Tuesday, 02 November 2010 06:04

Protect Yourself with Secure Passwords

Despite the increasingly vast trust we put into the Internet to keep our personal and business information safe and secure, many users take their passwords very lightly. In an analysis studying over 32 million passwords from RockYou, a company that develops software for social networks, it's been discovered just how little effort is put in to keep things secure. The results are shocking.

Published in Best Practices

Latest Blog Entry

Latest News

Backup and Disaster Recovery in the Cloud

We are very pleased to announce our new partnership with DOYENZ, a specialist cloud based backup and disaster recovery service!

Read more...

Contact Us

Learn more about what Rytech IT can do for your business.

callphone

Call us today    0800 798 324

7a Canterbury Arcade , 47 High Street ,
Auckland, New Zealand 1010

facebook twitter linkedin #