Bluetek IT Solutions Blog

Bluetek IT Solutions has been serving the Pennsylvania area since 2005, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

9 Rules for Strong Passwords: How to Create and Remember Your Login Credentials

The key to your online security is to have strong passwords, but the challenge is to create distinct passwords that you can actually remember -- or else you may fall into the bad habit of using the same login credentials for multiple accounts. According to LogMeIn, the company behind the LastPass password manager, you could very easily have 85 passwords for all your accounts once you count all of your social media, streaming, bank accounts and apps.

If your data is compromised, weak passwords can have serious consequences, like identity theft. Companies reported a staggering 5,183 data breaches in 2019 that exposed personal information such as home addresses and login credentials that could easily be used to steal your identify or commit fraud. And that pales in comparison with the more than 555 million stolen passwords that hackers on the dark web have published since 2017.

The identity protection of a post-password world isn't here for most of us. So in the meantime, try these best practices that can help minimize the risk of your data being exposed. Read on to learn how to create and manage the best passwords, how to be alerted if they're breached, and one crucial tip to make your logins even more secure. And here are three old password rules that wound up being dumb today.

0 Comments
Continue reading

How To Develop A Disaster Data Recovery Plan

Data is one of the most important assets for many organizations. A significant level of care should be given to prevent data security incidents. However, despite the best plans and intentions, both man-made and natural disasters can occur at any time. The best course of action is to prepare in advance, ensuring that your enterprise has a well-developed disaster recovery plan in place to deal with potential occurrences.

The best disaster recovery plans are prepared with a logical knowledge of your environment. An organization that thoroughly evaluates possible threats, vulnerabilities and probabilities of a disaster can help ensure a more cohesive and cost-effective recovery plan. 

To get started, you should identify the critical assets that you'll need to protect in the case of a disaster. The corresponding vulnerabilities and potential threats should be assessed and preferably quantified. Based on the probability of a disaster occurring, the risk can be quantified as well. Then, your organization can build a recovery plan that prioritizes assets that meet a calculated risk threshold. Note that data recovery is the primary asset for most information security disaster planning, so make it a priority. 

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

2021
January
February
March
April
May
June
July
August
2020
January
February
March
April
May
June
July
August
September
October
November
December
2019
January
February
March
April
May
June
July
August
September
October
November
December
2018
January
February
March
April
May
June
July
August
September
October
December