I guess the editor at MCP Magazine who fired me for talking about passphrases and ways to secure your passwords is looking rather foolish at this point. Years and years ago, I wrote an article on securing passwords – only to be told that I was out of touch with reality when I suggested that everyone needed to use more secure passwords. With the latest attack on the iCloud due to weak and pathetic passwords, you’d think that the attack’s victims would have appreciated learning the password strategies I was advocating 10 years ago! Apple now is saying that it is not their fault that the nude pictures of so many celebrities were obtained from their cloud storage . Does that mean that the weak questions for iCloud password recovery aren’t their responsibility either? I truly hope that this latest attack on the iCloud opens the eyes of everyone who uses social media, social networking, centralized cloud storage, and other online resources
Find your faulty corporate iPhone 5 devices in no time!
Recently, Apple launched an iPhone recall program for selected devices. According to a statement from Apple, some of the iPhone 5 devices that were sold between September 2012 and January 2013 may experience shorter battery life or may have to be charged frequently.
Remote Control Desktops and Provide Better Support
Ever wondered whether you can run a business without the aid of technology? If your answer is impossible , you’re definitely spot-on! Because, today, almost every business runs on technology. For this post, let’s confine ourselves to desktop support
Free Webinar: Active Directory Monitoring and Auditing Like Never Before!
Do you struggle with monitoring and tracking of Active Directory changes? Do you want to monitor Active Directory changes but have given up due to the complexity?
Code Spaces AWS Security Breach: A Sad Reminder of the Importance of Cloud Environment Password Management
In the recently concluded Black Hat USA, 2014, one of the topics that drew much attention was the session on the pitfalls in cloud environment security. Normally, such deliberations at security conferences are perceived as hypothetical or purely academic. However, it was different this year with security professionals becoming quite interested in this topic. The reason for this is quite obvious – just a while ago, CodeSpaces.com, a code-hosting and collaboration platform went out of business for a whole day because hackers gained access to their Amazon EC2 control panel and deleted data of hundreds of their customers
7 Questions to Ask Before Choosing the Best IT Help Desk
An IT help desk ensures seamless end-user experience by centralizing and automating service management processes. The right IT help desk improves productivity, guarantees end-user satisfaction, cuts costs, and aligns IT with business
10 Key Steps to Align IT with Your Business
Have you ever felt your car pull to the left or right when you wanted to go straight? You’d immediately know that the wheels must be realigned.
Got WiFi? Free App Helps You Meet Basic User Need
Did you hear the one about the teacher who asks a group of students to name something they need but can’t see or feel? The hip-hop loving, smart-gadgets sporting, what’s-apping generation answer in unison, “WiFi.” Increasingly, WiFi is becoming indispensable and, apparently, a candidate for inclusion in Maslow’s hierarchy of basic human needs . Mobility has altered the way we do business
Advanced System Tools from ServiceDesk Plus
Juggling between help desk and desktop management tools and pacing the length and breadth of your organization to troubleshoot could soon be a thing of the past! Because the latest add-on tool from ServiceDesk Plus will enable you to schedule planned maintenance tasks from a central location.
IT360: The Unified Monitoring Solution You Can Now Evaluate in the Cloud
Does this happen to you? We often hear a scenario like that from people like you who want to evaluate IT360 but are unable to procure a server to run it, which prevents them from evaluating the product in a timely manner