Password Security: Part One – Implementing a Passphrase Standard
While protecting an organization’s network from the threat of hackers is a complex task, doing so starts at a rudimentary level. By ensuring every employee is vigilant in implementing proper password security practices, an organization can greatly mitigate the risk of of a total network takeover.
Simply put, Rocket IT suggests that an organization’s leaders start by mandating a series of company-wide password security rules. Although, over the next few weeks, we’ll share some of these suggestions, it’s important to start by addressing the foundational cause of security breaches, a lack of password complexity.
Read MoreThe Threat of Phishing is Real – Proact With A Rocket IT System Test!
What Is Phishing (In Layman’s Terms)? By now, you’ve heard how major international organizations, local businesses and cities, and even your business associates have been hit by downtime, exorbitant costs, and data due to advanced phishing techniques. At Rocket IT, it is a goal to cast a brighter light on phishing, and the negative impact…
Read MoreYour Comprehensive Business Guide To BYOD (Bring Your Own Device) At Your
In recent years, Bring Your Own Device (BYOD) policies have become more common in many offices in all industries. From saving your company money to security management, there’s a lot to consider when you are contemplating whether to allow employees to use their own devices to complete their work. On the surface, it appears to be…
Read MoreBecoming Your Own Security Champion
In the age of ransomware, every position is now a security role. Every member of your team needs to be equipped to identify suspicious emails, know to be wary of unsolicited links, and be passionate stewards for the integrity of your network. Here’s how you can become your own security champion and how you can…
Read MoreHave You Changed Your Password Yet?
If you haven’t changed your password since 2016, then you could be in for trouble. With the amount of breaches surmounting every day, using the same old password could compromise your information… Especially if you use a weak password or reuse the same one between accounts. In December, SplashData released their annual list of the…
Read MorePreventing Identity Theft Through Your Devices
In a world rapidly filling with smart appliances, homes, and cars, staying connected and secure at the same time is becoming increasingly more difficult. The number of phishing campaigns and the latest breaches have made identity theft a top concern, especially after news of the Equifax breach, and smart homes are another opening for risk.…
Read MoreUnderstanding Patch Tuesday And How It Keeps Your Network Updated & Secure
What Is Patch Tuesday? Windows users may be familiar with the term “Patch Tuesday.” This casual phrase is used to describe Microsoft’s regular release of security and other major patches for its software on the second (and occasionally fourth) Tuesday of every month. What does this mean for the average end user? To run updates,…
Read MoreQuestions You Need to Ask Before Selecting a New Software Solution
So, you’ve identified a need for a new software solution. Whether you’re replacing an old one or adding to your technology stack, finding the right one can be a lengthy and arduous process. You want to make the right choice the first time. To help guide you along the journey, here are the questions you…
Read MoreWhat You Need to Know About Spectre and Meltdown
The tech world is buzzing with the news of the newly announced Spectre and Meltdown vulnerabilities, and tech companies are rushing to produce patches. So, what exactly does this mean for you? Spectre and Meltdown are both security risks affecting modern microprocessors. This means that most of the devices from the past 15-20 years are…
Read More