When you run a company that users have an account with you, it is important to protect their data. Securing their email, password, and other personal data is crucial. Recently, it was reported that Facebook was storing 1.5 million Instagram passwords in plain text. This means that the storage of these passwords were basically the passwords in a word document. There was no encryption of the passwords, which means the password is encrypted into ciphertext (which takes the password and uses a method for turning into something that looks random). The way it is encrypted and decrypted is using a key. The only issue with this is if a hacker can get access to the key, they can decrypt it and have the passwords. So, what should businesses do?
First, they can use salt and hashing. What salt does is take the person’s password and adds to it. This is usually a few letters and numbers. Then, it hashes the password to make it random letters and numbers. The strength of this can also be a downside. Hashing is impossible or really difficult to reverse, so what are other options for businesses? One is to force stronger passwords. One way is to not allow common phrases, such as qwerty or 12345. Other ways are to require an uppercase, lowercase, a number and a character. This ensures the passwords are hard to crack. Furthermore, including 2FA, or Two-Factor Authentication, and restricting the use of old passwords ensures a stronger password and security.
Protecting your customers data is important and the right thing to do. Customers put their information in your hands and expect you to protect it. The lack of protection can cause serious issues. People’s passwords getting taken which could lead to their account being accessed by someone not authorized. Furthermore, it can lead to issues for your company. Lawsuits, fines loss of business and trust are all things that could happen. So being proactive and protecting their information is not onlt the smart thing to do, but the right thing to do.
Many companies are looking towards the future and are aiming at becoming sustainable. Konica Minolta is one of the companies that has been committed to that idea. Back in 2009, Konica Minolta announced Eco Vision 2050. This idea was to reduce CO2 emissions, promote recycling and restoration of the environment. As of 2013, Konica Minolta reduced their CO2 emissions by about 55% from their 2005. These goals have been furthered now with Konica Minolta joining RE100.
RE100 is a global initiative with the goal of having companies use 100% renewable energy. RE100 is led by the Climate Group in partnership with CDP. Over 150 companies have joined RE100 so far, including Apple, Coca-Cola, Nike, and many more. Joining RE100 will further Konica Minolta’s stance of sustainability and becoming environmentally conscious. Additionally, Konica Minolta’s medium and long-term policies will help accomplish this. They plan to begin with production plants outside of Japan.
In today’s business world, faxing is still a big part of how businesses communicate with each other and with their customers. Fax machines are older technology, and that means the security for faxes are older to. This means that while people view fax as a safe means of communication, they actually are very prone to attack. All it takes is a hacker to send a malicious fax to the fax machine, and then the hacker will have access to the network that the fax machine is on. So what is the solution?
There are multiple solutions for this issue. One way to fix it would be having your fax machine on a different network. So if a malicious fax is sent to the fax machine, then it would not have access to anything because the fax is isolated away from employee or personal computers. Additionally, Konica Minolta machines will block off any communication that is not a G3 protocol.
When reading this, you may have some questions. Those questions could be:
Can my fax machine be hacked into?
Is my network safe?
What steps can I take to prevent this?
Should I be worried?
It is always a good idea to make sure your business’ and client’s information are safe. If you have any other questions, then give us a call and see how PDP can help you.
It happens all too often that small businesses, large corporations, and even government offices overlook gaps in security measures or even ignore them entirely.
A recent audit of Nevada’s Department of Administration’s Human Resource Management division revealed that the state office had personal records and information such as the Social Security numbers of over 145,000 current and former employees stored on unencrypted databases. Former employee computer user accounts had not been disabled, computer operating system security updates had not been performed, and copy machine hard drives were not routinely erased, leaving this information to be relatively open to outside threats. Much of this stems from poor communication between the state office and their IT provider, Enterprise Information Technology Services, who claimed they were unaware of the need for security measures to be enforced as well as a data encryption and erasure routine to be followed. This goes to show how crucial it is to effectively consider and communicate the needs of your business when putting its well-being in the hands of someone else.
As a business grows and changes, the concept of security tends to grow along with it. It is important to take a moment and ask what security means for your business:
Check out the Review Journal’s article here.
All of us who live in this interconnected world are familiar with the password polka. We have files or black books filled with the myriad passwords required for our activities from banking to fulfilling our pets’ medications. We attempt to log into sites which have inevitably required a password change two weeks ago. We try to change our passwords per the requirements of our benevolent policy overlords only to discover that we have already used that password, or we are required to use the special characters !@#&@ and one UPPERCASE.
!@$& is right.
One of the biggest frustrations we experience as both consumers and IT professionals has to do with this !@$&-ing dance. In fact, according to the Gartner Group, password resets consume 30% of all IT call volume. And at an estimated 25$ per call (Gartner estimates this amount to be higher at $70 per call) with an average of 1.75 calls per month per person (META Group), this places the cost to a company of 50 employees for password resets alone to nearly $8,000!
And this is where the frustration for the benevolent policy overlords begins. An aggressive password reset policy will undoubtedly increase this number, but $8,000 is small price to pay for the risk mitigation that comes with strong password rules. In fact the risk of exposure, data loss or other more nefarious problems is more or less limitless.
Using this logic, we as IT administrators should increase the strength of our password policies and consider the cost on the support end just the cost of doing business. I have personally run into sys admins who require insanely complex passwords that reset on very short schedules. These security minded individuals believe that the cost of a breach is so severe that end user frustration and support costs are not worthy of consideration.
–And, they would be right…If it weren’t for a couple of big problems.
The first that we incorrectly assess password strength based on our own fleshy weaknesses. Consider the following “complex” password: 1Dr@g0n!
This passes some of the most complex rule systems out there, but could be cracked by a bot running on a low-grade PC in about 3 days…more sophisticated attacks would demolish this password.
This problem is summed up beautifully by the folks at xkcd.com (a wonderfully nerdy web comic).
The other problem with using what we consider to be complex password policies is, as the comic so elegantly shows: we forget them. And when we forget them, we put them in our little black book, save them in a password file…with a password, probably, or simply write them down on a sticky and put it under our keyboard or on our monitor.
The last offense is obviously an unacceptable breach of password protection, but the sys admin would have no one to blame but herself. She created a password policy that broke the end-user thus leaving a huge hole in their security.
How do we get around this as both consumers and IT professionals? Well, here are a few suggestions:
There are many other authentication solutions to fit many applications, but they don’t all belong in the conversation about our some-time friend the password, so please forgive me if I have left your favorites out of the list. I hope this helps all of you dancing the password polka!
With the Clean Power Plan announced, I thought it might be interesting to see the current state of power generation throughout each part of the country. Check out these interactive charts and maps of the US’s sources of electricity.
Tired of waiting in long lines? Google recently added a feature that shows searchers the peak activity hours for millions of businesses.
This feature could definitely benefit those of us looking to avoid crazy grocery shopping hours or dining times at our favorite restaurants.