ITS Twitter and News


The latest in Technology News

January 31, 2021

Strong Passwords


Our CEO, Ryan, cannot stress enough how important it is to use strong passwords. "12-15 characters is becoming the new standard for strength. 15 is regarded as not brute-forceable," which means "the length of time it would take to try and break the password exceeds what it would be worth to get it." 

Separating passwords by groups or functions (work, financial, retail, entertainment, subscriptions) will help you remember your login information without having to write it down. For example, take a section of the password as the core that doesn't change, but make the first three and last four characters different.

Ryan continues, "Excel spreadsheets are one of the easiest ways hackers gain access to all of your credentials, even with password protection on the document. There are better options."

Finally, from our VP Of Business Development, Jay: Don't give your password to anyone, especially not to companies or emails requesting it. Also, never send passwords through email. It is open to view, and un-encrypted to the world, giving easy access to hackers and spammers.

October 1, 2021



Here are 5 Ways to be cyber secure at work:
1. Treat Business Information as Personal Information.
Business information also includes employee personally identifiable information (PII) through tax forms and payroll accounts. Do not share PII with unknown parties over unsecured networks.

2. Don’t make passwords easy to guess. Ensure you are using difficult to crack passwords for your computers/accounts/website logins. Don’t use personal information, don’t use real words, create
longer passwords, use characters, upper- and lower-case letters. All of this will help keep you more secure. Also, don’t automatically save the passwords if you use a public or shared computer.

3. Be up to date. Keep your software updated to the latest version available. Maintain your security settings to keeping your information safe by turning on automatic updates and set your security software to
run regular scans. A friendly reminder that if you use a computer with Windows 7, you are more vulnerable now, since there are no more security updates for that OS. Call us to upgrade your computer to Windows 10.

4. Social media is part of the fraud toolset. By searching Google and scanning your organization's social media sites, cybercriminals can gather information about your partners and vendors, as well as human resources and financial departments. Employees should avoid oversharing on social media and should not conduct official business or share PII on those platforms.

5. It only takes one time. Data breaches do not typically happen when a cybercriminal has hacked into an organization’s infrastructure. Many data breaches can be traced back to a single security vulnerability, phishing attempt or instance of accidental exposure. Be
wary of unusual sources, do not click on unknown links, and delete suspicious messages immediately.

More information can be found at CISA’s website: