About Adam

This author has not yet filled in any details.
So far Adam has created 269 blog entries.

Increase Your Productivity with Dual Monitors

Increase Your Productivity with Dual Monitors

Conventional wisdom states that cluttered workspaces lead to a disorganized mind. Mess prevents productivity and begins to hamper professionalism. Shouldn’t that apply to the computer desktop too? Let’s see how to Increase Your Productivity.

The simplest way to clean and organize your digital desktop is to add more space. Just adding a second screen doubles the available room and makes organization a breeze.

Getting work done with a single-monitor setup is a balance of poor compromises. There never seems to be enough space and the little space available is full of clutter and mess. Switching between windows or tabs wastes time and distracts from work to be done. Stacking windows together, side-by-side, or top and bottom wastes valuable screen real estate. The resulting clutter of windows makes it hard to focus on what is important.

While most tasks can be tackled feasibly with a single monitor; two makes the same tasks faster, simpler, and much more enjoyable.

Two Monitors, Many Uses

Data entry with two monitors is far easier than data entry with one. Having source data on one screen, laid out in large type, and the destination on another makes the job a breeze. By eliminating the need to scroll tiny windows or switch tabs, forget and repeat; the same job can be done in a fraction of the time.

Graphic design, image manipulation, and editing are key areas that make the most of a dual screen setup.

Stacking one image on each screen allows you to make quick comparisons to make sure your work is going in the right direction. Organizing your editing space is made simple too. Stacking your tools, menus, and options on one monitor with your image maximized on the other helps to stay focused and finish the task.

Beyond Just Two

Having more than a single screen helps you to track tasks you need to keep on the back burner. A team chat window to keep on top of collaboration, status updates for business-critical services, or the latest stock price. These windows and dialogues can remain open and serving updates on a secondary screen while you keep your work focused on your first.

It is not uncommon for stock traders or financial analysts to maintain 6 or more screens running from a single computer. Many uses this to track various stocks or indices so they don’t miss a beat.

Setup How You Like It

Multiple monitors can be arranged in almost any practical configuration imaginable. While traditionally positioned in landscape orientation, second, third, or fourth monitors are often rotated 90 degrees to portrait orientation.

This setup is used often by software engineers, editors, and users reviewing large amounts of text. The lengthwise orientation allows multiple pages to be read from the screen at any one time.

Multi-screen setups, no matter how they are arranged, behave the same as if all the monitors were just a single screen. Mouse input moves from one monitor to another as if there was no difference between them. From the user’s perspective, there is no difference to how they interact at all.

A Boost to Productivity

There is a scientific advantage to multi-monitor setups too. A survey by Jon Peddie research found that adding an extra monitor boosted a user’s output by as much as 20 to 30 percent.

A productivity advantage of even 10 percent is prized and very hard to come by in the business world. Receiving a productivity reward of over 20 percent for just the cost of adding a second monitor is something few firms can afford to pass up.

The satisfaction of decluttering your digital desktop and keeping your focus in the zone is worth it alone.

Give us a call at 319-227-7000 if you would like us to boost your setup by adding a second monitor.

2018-11-04T12:09:44+00:00November 6th, 2018|Uncategorized|0 Comments

Business Tools to Take Your Business Out of The Office

Business Tools to Take Your Business Out of The Officebusiness tools

Being engaged in business used to mean staying wired in at the office eight to twelve hours a day. In the modern day, this is completely untrue. Often the most efficient workplace is spread far and wide and always on the go.

Today you can completely unplug from your desk with just your laptop computer and 4G modem. The freedom to work out of the office and even on the move is a huge advantage gifted to modern businesses. A simple mobile phone tether is enough to work from anywhere in the world.

The Right Tools for the Job

The most important part of working on the go is ensuring you don’t lose touch with your team. Maintaining total collaboration between team members can be tricky. Luckily, there are tools that will help you to stay on top.

Microsoft Office 365 provides the traditional tools and support of Microsoft office, but adds remote team collaboration and cloud support too. Files can be saved into the cloud, worked on, and accessed anywhere for review. At one time, remote working meant taking a copy of a file somewhere else to work. Changes to the original weren’t reflected in the remote copy and at least one version was destined to be lost forever.

Software packages such as OneDrive allow the entire team to work on a single centralized file saved to the cloud. Whether you edit on a beach, plane, or train; your team in the office gets the same version you do, at the same time.

Collaborative Working

The key to remote working is the ability to collaborate in a digital space with everyone at once. Modern software such as Office 365 allows all team members to be working on a single document at the same time.

Whether the project calls for killer spreadsheets, expertly crafted documentation, or a knockout presentation; everyone can pull together and hit it out of the park.

Even when you’re not working out of the office or busy on the road, collaborative software can help to power your team working locally too.

Admin Done Remotely

Modern software has impacted the way in which we do bookkeeping and accounts too.

Similar to being tied to your desk in years gone past; accounting software was once stuck solidly in the desktop too. Previously, batch runs of calculations were required to provide reports on a weekly, bi-weekly, or monthly basis. Today, cloud computing has opened up ways to speed up business in ways we couldn’t have imagined.

Cloud-based accounting packages such as Xero or Quickbooks Online allow for your accounts to be done remotely. Moving the resource and strain out of your firm takes it out of sight and out of mind.

Security and maintenance of your accounts databases, for example, falls to cloud professionals instead of your business. Rather than waste company time on submitting documents and calculating taxes they are done in the cloud and submitted to you instead.

Make your Accounts Work for You

Maintaining your accounts is made as simple as logging into a single portal. This tool allows you to take both your admin and your work out of the office and keep it on the go.

By the time your accounts are due, your accountant simply has to log in remotely and pick up where you left off. By the time taxes are due the work is done and you can get on with the important things.

Getting work done out of the office and on the go is a huge boost to productivity. Modern technology enables you to keep team members up to speed, continue collaborating, and even stay on top of your accounts from anywhere in the world.

Give us a call today at 319-227-7000 to talk about how we can help you unwire from the office.

2018-11-04T11:30:50+00:00November 6th, 2018|Uncategorized|0 Comments

The Top 5 IT Security Problems for Businesses

The Top 5 IT Security Problems for BusinessesIT Security

Companies that suffer security breaches nearly always have one of these IT security problems. Is your company guilty of any of them?

No Backups

A shocking number of businesses are not backing up their data properly. According to market research company Clutch, 60 percent of businesses who suffer a data loss shut down within six months.

Not only should every business be fully backing up their data, but their backups should be regularly tested to work too. It’s a step that businesses miss surprisingly often. Many businesses don’t find out that their backup can’t be used until it’s already too late.

Reactive and not proactive

The world is constantly changing. The IT world doubly so. Attackers are always figuring out new ways to break into businesses, hardware evolves faster than most can keep up, and old systems fail due to wear and tear far quicker than we would like. A huge number of businesses wait until these issues impact them directly before they respond. The result is higher costs, longer downtime, and harder hitting impacts.

By responding to hardware warnings before it fails, fixing security holes before they’re exploited, and upgrading systems before they are out of date: IT can be done the right way. Being proactive about your IT needs means systems don’t have to break or compromised before they are fixed. The result for your business is less downtime, fewer losses, and lower IT costs.

Weak Passwords

A surprising number of people will use the password “password” to secure some of their most important accounts. Even more still will write their own password on a post-it note next to their computer. In some cases, many will even use no password at all. Strong passwords act, not only as a barrier to prevent unwanted entry, but as a vital accountability tool too. When system changes are made it’s often essential that the account that made changes is secured to the right person.

With an insecure password or worse; none at all, tracking the individual responsible for reports or accountability becomes impossible. This can result in both auditing disasters on top of technical ones.

Insufficient Staff Training

Humans in the system are commonly the weakest point in IT security. Great IT security can be a bit like having state-of-the-art locks on a door propped open with a milk crate. If staff aren’t trained to use the lock, it’s worth nothing at all.

Often times businesses can justify spending big on security for the latest and greatest IT defenses. The very same firms may exceed their budget and spend almost zero on training staff to use them. In this instance, a little goes a long way. Security training can help staff to identify a threat where it takes place, avoiding and mitigating damage, often completely.

Weak Data Controls

Some companies can take an ad-hoc, fast and loose approach to storing professional data. Often crucial parts can be spread across many devices, copied needlessly, and sometimes even left unsecured. Client data can be found regularly on employee laptops, mobile phones, and tablet devices. These are famously prone to being misplaced or stolen out in the field along with vital client and security data.

It can be easy for both employees and firms to focus on the costs of devices and hardware purchased for the business. The reality is that the data held on devices is almost always worth many times more than the device that holds it. For many firms, their approach to data hasn’t been changed since the firm was first founded. Critical data is often held on single machines that haven’t been updated precisely because they hold critical data. Such machines are clearly vulnerable, outdated, and prone to failure.

Common problems with simple solutions

Each of these common issues have simple solutions to secure against IT failure. With a professional eye and expertise in the field, every business should be defended against IT issues that risk the firm.

If you need help securing your IT to protect your business, give us a call at 319-227-7000.

2018-10-06T20:27:58+00:00October 30th, 2018|Security|0 Comments

Are Registry Cleaners a Good Idea?

Are Registry Cleaners a Good Idea?registry cleaner

You have likely been alerted by popups while browsing the web. These, often flashing, advertisements claim your computer has more than a thousand errors requiring urgent attention to fix. Perhaps helpfully, these popups offer a solution to cure your computer with a click of the mouse. Buttons marked “fix now” appear to offer a simple fix to all your computer troubles.

These advertisements are often described as Registry Cleaners, or by a few other names that attempt to convince the user they will somehow clean or improve their home PC. Within the IT industry they are known as “scareware”. They are software designed to convince you that your computer has problems it might not have.

Are they trustworthy?

Almost all popups and advertisements that use banners saying “Fix now for free” are not trustworthy at all. They are little more than a scam attempting to take your credit card details, PC data or both. At best these programs might claim to scan your computer and show a convincing list of plausible sounding computer problems. Using this, they will ask for payment to “fix” these problems to get your PC back in shape again.

At worst these advertisements can be downright malicious. Some may attempt to use fake warnings and scare tactics to trick customers into installing spyware on their own computers. When installed, spyware will attempt to steal information in the background. Attackers may use this technique to steal usernames, passwords, emails, and credit card details. Sometimes the first sign a user has that something is wrong is when a virus scan detects software doing something it shouldn’t be.

Do I need to clean the registry?

The Windows system and various applications installed on your PC do leave files on stored your computer. These files can stay behind or go out of date even after the application that initially made them has been removed. These files can use up a little space on the hard drive and generally cause minor clutter within the system.

Despite the large amount of “scareware” and fraudulent computer cleanup scans out there, legitimate applications designed to clean your system do exist. This can be something we cover and is often done as a single small part of a complete computer tune up. Keeping up with out of date files and freeing up unused space is worthwhile and can be considered “good housekeeping”. The vast speed boosts many online advertisements claim to unlock by simply moving files around are almost always false.

The home computer, however, is commonly upgraded and can be boosted by more conventional means. If the speed of your PC is no longer up to the task, there are ways in which we can unlock far greater gains than simple housekeeping chores.

PC Boosters

Relatively low-cost hardware components such as memory can often be added to boost the speed of even an older PC and unlock a new lease of life. Upgrading the computers RAM can double the working memory available to the operating system. With extra memory, many programs can keep more information available to work with. This upgrade reduces loading times and increases the computers ability to run more programs at once.

Another common speed boosting upgrade involves how we store and load data from the computer. Switching from an older style mechanical hard drive to a modern Solid State Disk (SSD) can bring down the startup and loading time of any PC.

Loading data from the hard drive is very often the slowest part of a computer, the bottleneck in an otherwise very fast system. Because an SSD does not use any mechanical components the time to access the disk is nearly instant when compared to older, mechanical hard disks.

Safe Speed Boosts

These upgrades offer boosts in speed to rival a modern system at only a fraction of the cost originally paid for the computer. Upgrading the RAM, swapping to an SSD, or doing both will provide an instant, dramatic, and safe improvement to the speed of your PC.

If your computer is running slow give us at a call at 319-227-7000 to arrange a real and professional cleanup.

2018-10-06T20:28:54+00:00October 23rd, 2018|Computer Repair|0 Comments

How Losing a Mobile Device Puts Your Entire Business at Risk

How Losing a Mobile Device Puts Your Entire Business at Riskmobile device

Losing a mobile device such as a phone or laptop is an experience that everyone dreads. The expense and inconvenience of buying a new device is unpleasant, but only represents a fraction of the damage done when a device is misplaced. The cost of data contained within every device can add up to many times more than the total value of the device itself.

Chances are, you already use automatic login on a large variety of online services. Each of these services are vulnerable to an attacker having possession of your device.

Usernames and passwords – An obvious place for an attacker to start is the likely long list of usernames and passwords saved for future use by your browser. This is often done to save time when logging into sites that you visit often. Almost universally, people opt to save login information so that they don’t have to attempt to remember it every time they return.

In only a short amount of time, a browser is trained to log in to your Facebook, cloud storage, and bank details just by visiting the page using your regular device. These details, called up by the browser, are saved in a single list accessible to anyone with access to the device. For an unscrupulous stranger with a found device, this list represents a goldmine of information. Simply by finding a phone misplaced in public they may gain access to a huge array of services.

The problem can be made many times worse where a single password or a combination of similar passwords have been used across several accounts. In some instances, an attacker need only gain access to a single one and reuse the same stolen credentials across many sites and services.

Email – Email accounts are a key target for attackers looking for access to your personal information. It is a service that many take for granted, logging in once the first time they set up the device and using automatic login every time after. It is a service that also unlocks a great deal more than just private messages. Of course, an attacker having free access to read your personal emails is bad news, but with email access a malicious user can gain access to many of the most commonly used web services online.

Using the “forgotten password” button on many sites triggers a response that emails a password reset link to the email address registered on file. An attacker may use this feature to reset account passwords to one of their choosing. Doing this both grants themselves access to your account and denies you access to rescue it.

Contacts – One of the best features of instant messaging is that your contacts know the messages come from you. When a message is sent from your device to someone you know it displays along with your name, details, and likely a photograph too. This can lead to identity theft, one of the biggest concerns of a lost or stolen device.

With contact information already programmed in an attacker has an opportunity to impersonate you when speaking to anyone in your contacts list. Using your identity, an attacker may attempt to steal yet more details about you and your contacts.

Social Media – Your social media accounts are often the face of your brand. They can be a primary way to reach out and contact customers. They are almost always the first point of contact a client has with your business. They are also extremely vulnerable to being hijacked from a stolen device.

Fraudulent social media access can allow attackers to harvest both client and business data. Even without profiting directly, posting privileges can be used to cause irreversible damage to a business.

Protecting your business – Services, accounts, and entire businesses can be put in great danger by something as simple as misplacing an unsecured mobile phone or laptop computer.

We can help you to stay secure and remain in control even in the face of losing a device. Give us a call at 319-227-7000 and let us help secure your business.

2018-10-06T20:30:19+00:00October 16th, 2018|Security|0 Comments

Storage Struggles? How to Keep Up with the Data Explosion

Storage Struggles? How to Keep Up with the Data ExplosionStorage Struggles

Many businesses have already embraced the benefits of going fully digital. It has allowed us to do more than ever before; saving us both time and money iterating over work drafts and emails. It has saved us a ton of space too, eliminating the need for stacks of file cabinets in every office.

The digital boom presents us with brand new problems too. By moving all our files into a digital space, the amount of storage we need to maintain has grown larger and larger just to keep up.

As digital technology has improved, the resolution, clarity, and size of the digital files we create has exploded. Items such as Xrays, which used to be printed on film are now digital files transferred by computer. As a result of the increase in both the number of digital files we use and their ever-growing size, the size of the data we need to store has exploded exponentially.

There are a number of ways in which we can tackle our ever-growing storage problem.

Local server or Network Attached Storage (NAS)

A local server is a machine physically located within your own office or building. These are typically designed to serve many files to multiple clients at one time from locally held storage.

The primary advantage that a local network server has is that all your vital data is available to all users in one central location. This means that employees across the network can access all the resources made available.

These machines can serve files at the speed of the local network, transferring large projects, files, and documents from a central position within the network with ease.

A NAS has many of the same network properties, typically packaged as a smaller profile, low powered computer. A NAS is specifically designed to enable network file sharing in a more compact package. These can be available in units small enough to fit in a cupboard nook and yet still provide staggering storage capacity on only a small amount of power.

Both a local server and NAS device allow for large amounts of storage space to be added to the local network. These units are often expanded with more and more storage over time. As an organization grows over time, so do its data storage requirements.

Cloud Storage

Sometimes the best option for storage is to move your ever-expanding data outside of the business completely. Often, offloading the costs of hardware and IT management can work out to be an intelligent business decision. One that provides freedom and flexibility in your data storage needs.

The major advantage of cloud storage comes from the ability to expand and contract your services as needed without the unnecessary overhead of adding and maintaining new hardware.

By moving storage to the cloud, data can be accessed from anywhere in the world. The flexibility provided by cloud storage allows limitless expansion to any number of devices, locations, and offices. Being able to access data from many locations at a single time can often provide a valuables boost to productivity that can help to speed projects along.

Some of the drawbacks of cloud storage come from factors that may be outside of the control of the business. Not all internet connections are found to be up to the task of handling large amounts of data to and from the cloud. In some cases, the infrastructure is quite simply not in place yet to support it.

IT security regulations can prove to be a barrier to enabling storage in the cloud too. Some regulations either prohibit the feature entirely or enable only certain specific types for use.

The Right Choice for your data

Both cloud and local storage can provide further benefits to enhance your business. Audit logs, central backups, and version control can all be used to secure the way your firm handles data.

Whatever your situation, whether a small NAS can boost your office productivity, a local server can provide the connectivity missing from your firm, or cloud storage can switch on new resources, we can advise on the best choices for your business.

Give us a call at 319-227-7000 to allow us to use our expertise to make the right chose for your data.

2018-10-06T20:31:45+00:00October 16th, 2018|Storage|0 Comments

LogTransport2.exe This application was unable to start properly. (0xc0000142)

LogTransport2.exe This application was unable to start properly. (0xc0000142).

 

If you are getting this message when you logout, restart or shutdown your computer then try the following registry change to fix it.

    1. From the Start menu, type regedit.exe in the search box, and then press Enter. If you are prompted for an administrator password or for confirmation, type the password or provide confirmation.
    2. In Registry Editor, locate and click the registry key or subkey that you want to back up.
    3. Click File > Export.
    4. In the Export Registry File dialog box, select the location to which you want to save the backup copy, and then type a name for the backup file in the File name field.
    5. Click Save.
    6. Go to the following path:
      1. HKEY_CURRENT_USER\SOFTWARE\Adobe\CommonFiles\UsageCC\(user GUID). The GUID is a unique value the application assigns to the signed in user.
    7. On the Right Side Panel, create DWORD Key “optin”, if it is not already created.
    8. Set its value to 0 (zero).

It’s critical that you are familiar with making changes to the registry and have a backup in place before making these changes. If you need assistance with this contact us at 319-227-7000 or fill out our contact page.

2018-10-15T14:39:07+00:00October 15th, 2018|Computer Repair|0 Comments

How to Tell if You’ve Gotten Hacked

How to Tell if You’ve Gotten Hacked

Being hacked is the single biggest fear of most computer users. Many believe the first sign of strange behavior or errors on their PC is a sign hackers have taken control. But are hackers really inside your machine, stealing your information? Or should we be on the lookout for more subtle signs? What does being hacked really look like?

There is an important distinction to make between being hacked by a person and being infected with a virus or malware. Virus software and malware are automated processes designed to damage your system, steal your data, or both. There are of course ways that we can defeat these processes, but what if we are instead hacked by an individual?

Logins not working

One of the first steps a hacker might take would be to change the computers passwords. By doing so, not only do they ensure future access to the account, they prevent you from accessing the system to stop them. For the hacker, this is a crucial step that keeps them in control. With this in mind, we always want to make sure to keep on top of our own login details and how often we change them.

Security Emails or SMS’s from online services

Many services track which device and location you logged into your account from last. If your account is accessed from a new device or a different country it might trigger an automated email or SMS to ask if this new login is your own.

If you have logged in using a new computer, tablet, or phone; an email that asks “hey, is this you?” need not be cause for alarm. If you haven’t, it may be time to investigate further. This service is an important part of information security. It may be a key first step to identify someone else gaining access to your account.

Bank accounts missing money or strange transactions

Most commonly today, hackers commit crimes to steal money. The end goal for hackers is typically to profit from their crimes by taking money from people online.

It always pays to keep a regular eye on your financial transactions to make sure you know what money is coming and going from your account.

You may see a large sum missing where hackers have attempted to take as much as they can in a single transaction.

Alternatively small, hard to notice transactions may appear. These often account for small purchases where attackers have tested the details they have to make sure they work.

Sudden loss of cellular connectivity

Network interruption is a symptom that few people expect but occurs commonly when hackers attack. Many banks and online services use a security feature known as Two-factor authentication. To do this they send a short code to your phone or app when you log in. Two-factor authentication is ideal in most cases and a great boost to security.

Hackers can try to work around this by calling your mobile service provider to report your phone as lost or stolen. During this call, they will request your phone number be transferred to a new sim card that they control. When your bank sends its regular two-factor authentication code to the number registered, it goes instead to the hacker who may be able to log in. From your perspective phone service will simply stop working.

Keeping vigilant and maintaining security

These are only some of the modern techniques that hackers can try to use to gain access to your accounts. It pays to be extra vigilant and pay close attention to the signs and signals that indicate you may have been hacked.

If you suspect that you might have been hacked, or would like help to prevent hackers in future, give us at 319-227-7000 call and we’ll improve your security.

2018-10-06T20:33:18+00:00October 9th, 2018|Security|0 Comments

Stay Ahead of the Curve with an IT Lifecycle Plan

Stay Ahead of the Curve with an IT Lifecycle PlanIT Lifecycle

All appliances have an effective lifespan. Computers are no different. In some cases, parts physically fail after years of service, in others they simply become too slow and too ineffective to keep doing the job. Hardware failures and IT issues can cost big in productivity losses, urgent fixes, and unintended downtime.

Improving productivity and lowering costs are the primary driving factors in why many modern businesses choose to adopt IT life cycles.

IT Life Cycle

The IT life cycle aims to make IT budgets predictable, manageable, and reduce costs across the company.

This process starts with a thorough plan outlining the demands of the business. By looking at how and where equipment is deployed we can make the most out of the resources throughout the business. The first step is to reduce equipment duplicated and underused within the firm.

With a big picture approach, equipment can be scheduled for upgrade or replacement at predictable intervals based on use. With a plan in place, the focus of the life cycle can shift to resource procurement. As equipment approaches the end of its effective lifespan it can be brought in for replacement, repair, and recycling.

By maintaining as many usable parts as possible we help lower costs of keeping efficient hardware in the front line business environment. This approach helps a huge number of businesses keep modern, up to date hardware in crucial roles where it can serve the biggest impact for the business.

Making the most of resources

Computers in a busy business environment will always need eventual replacement over time. It is important to plan and prepare for this end of service life to limit unplanned downtime, increasing costs and losses in productivity. Doing so helps to plan a regular, predictable IT budget, less prone to sudden financial spikes.

The IT life cycle additionally allows the business to stay on top of software licenses, upgrades and Operating System changes. By cycling old and out of date systems from the network, security vulnerabilities are dramatically reduced and easier to patch.

Additional financial security comes from manufacturer warranties for businesses that adopt the life cycle. As new equipment is purchased into the firm, manufacturer warranties provide guarantees about the handling of defects and hardware issues. This warranty may cover all, or most of the duration of the equipment’s intended life cycle.

The extra coverage provides an extra layer of financial protection from unpredictable IT issues.

In control with information

Tracking the life cycle of your own firm provides invaluable metrics about how equipment use and deployment within your own production environment. Armed with this unique knowledge, better purchasing decisions can be made to equip your business with the tools needed to succeed.

Budgets can be put to better use, getting the important high-value resources to the places in the businesses that need it most. The ones where they will generate the most value for the firm.

A key factor in getting the most from your firms IT is making sure the resources put into the company don’t sit idly on a shelf after purchase. The insight gained from metrics related to the life cycle ensure that management stay fully informed.

A complete picture puts your business back in control of its IT by allowing you to choose the best, most efficient, and most cost-effective time to replace critical IT. Firms can plan replacements and servicing outside of busy periods so they can operate without interruption and know their IT is fully serviced when they need it most.

Planning for the future

With a fully planned, fully prepared life cycle, IT budgets can be planned in detail for years to come. Everything from printers to operating systems can be prepared on a tightly controlled schedule.

Businesses worldwide have adopted IT life cycles as a way to eliminate unwanted surprises, lessen productivity losses, and make the most out of IT budgets. Implementing or redesigning your own IT life cycle can greatly improve the way your business operates.

 Give us a call at 319-227-7000  or start a ticket to get your IT lifecycle plan started.

2018-10-06T20:35:50+00:00October 2nd, 2018|Managed Services|0 Comments

Why 2-Factor Authentication is Important

Why 2-Factor Authentication is Important2-Factor Authentication

You hear about hacks all the time. The news covers major websites who have had data leaks containing your email and password. Computers get infected and capture your login details for bank accounts and credit cards. In the worst cases, identity theft occurs because it is an easy crime to commit with a high reward.

In 2018, the passwords you used to trust to keep the bad guys out of your accounts are not enough anymore. Cyber attackers now use methods such as phishing, pharming, and keylogging to steal your password. Some have the power to test billions of password combinations.

If you’re like the majority of people, you use the same password for several websites. That means anybody who has figured out that password has access to everything you’ve logged into with it. In a time when it is extremely easy to look up what a person named their first pet or high school mascot, security questions aren’t much help.

Consider how a jewelry store operates. They don’t simply keep their valuables locked away with one key. There are alarms ready to be triggered, motion detectors, and sometimes even bars on the windows. Your data is valuable, just like jewelry. You need more than one line of defense to protect it.

In the computer world, your second line of defense (after your username and password combination) is called “2-factor authentication.” Sometimes referred to as multiple-step or multi-factor verification, 2-factor authentication is a way to double check a person’s identity. This can be enabled every time a person logs in or just under certain circumstances. For example, signing in from a new device or different country might trigger 2-factor authentication.

Many of the services you may already use, such as Facebook, Gmail, Xero Accounting, and more, have 2-factor authentication options. If your bank has ever sent you a special code through text or email to enter before logging in, you’ve already used a type of 2-factor authentication. They can also be in the form of a smartphone app or a physical electronic dongle.

2-factor authentication is absolutely crucial for online banking, email, and online shopping such as Amazon or PayPal. It’s also a must-have for cloud storage accounts (like Dropbox or Sync), password managers, communications apps, and productivity apps. This is especially true if you frequently use the same passwords for different websites and apps.

Some may consider 2-factor authentication unnecessary for social networks, but these are actually very important to keep safe. For ease, a lot of websites and apps allow you to sign up through your Facebook or Twitter account. You need to keep these networks safe so that somebody with your password can’t suddenly get into every account you have linked.

The point of using 2-factor authentication is to make hackers’ lives harder and prevent them from getting into your accounts. If they have captured your login username and password, they still need a second device to get in, especially when the computer or phone they are using has never logged into your account before. This makes it significantly more difficult for anybody to breach your account.

Plus, if you receive a notification with a special code to enter for logging in, and you weren’t trying to log into that account, you have a good signal that somebody else was trying to get in. That means it’s time to change that password and be grateful you had 2-factor authentication.

It’s unfortunate that there is currently an abundance of skilled hackers ready to take advantage of those unprepared. Luckily, you can still stop them even if they have your login information at hand. 2-factor authentication is one of the easiest methods to keep your accounts safe.

Give us a call at 319-227-7000 to help secure your business and accounts.

2018-10-06T20:37:07+00:00September 18th, 2018|Security|0 Comments
This website uses cookies and third party services. Ok