Lower Your Password Vulnerability with Four Powerful Tactics

Possibly the easiest and most important measure you can take is to use strong passwords. The best ones have at least 12 characters, cannot be found in a dictionary, and include numbers, lower-case, and capital letters. Alphanumeric passwords can take weeks to crack (compared to the mere seconds it takes to nail a password that can be found in the dictionary), and by mixing upper and lower case letters this decoding time can expand to a year or two.

Steps to Ensure a Smooth Transition

It is recommended that companies should ensure all of their IT resources are corrected for this adjusted time in order for computers, PDAs, servers, or calendar events to be in sync. The following additional steps are also recommended between now and April 1st to reduce confusion:

When scheduling new events include time and Time Zone within subject or body;
From March 11 through April 1, reconfirm all calendar events to ensure they are not off by an hour;
Manually correct any calendar events should any communication or calendar devices not automatically be updated with the corrected time.

IT Talk – Choosing VISTA

Which version of VISTA is right for you?

Microsoft’s long-awaited Windows VISTA was released on January 30th. If you’re thinking of upgrading to VISTA, you have four choices. (There are actually five versions of VISTA, but VISTA Enterprise is only available to volume customers— typically large organizations with a global reach.

Cool Stuff – Apple iPod Touch: The Best iPod Yet!

In our previous newsletter, we featured the Apple iPhone; however, we still don't recommend it for your business due to its lack of Enterprise connectors to Microsoft Exchange and Lotus Domino.

In the meantime, if you want the breakthrough features of the iPhone, but you want to listen to music without buying new cell phone service, Apple's new iPod touch is your solution.

The Double Dangers of Open Wi-Fi

When it comes to secure Wi-Fi, the weakest link in your network chain could be an open and vulnerable home Wi-Fi network linked to the office. If this home user has remote access to your network, then your network is vulnerable. Once an intruder enters this open network, they can access your company information, steal passwords, or send viruses and spyware.