drop.io – Simple, Free File Sharing

Drop.io is a revolutionary file-sharing and communication service that allows you to do some pretty amazing things. With three VERY easy online steps, you can upload pictures, videos, documents, text, links and any other type of file to a private space and share them with anyone you would like.

Lower Your Password Vulnerability with Four Powerful Tactics

Possibly the easiest and most important measure you can take is to use strong passwords. The best ones have at least 12 characters, cannot be found in a dictionary, and include numbers, lower-case, and capital letters. Alphanumeric passwords can take weeks to crack (compared to the mere seconds it takes to nail a password that can be found in the dictionary), and by mixing upper and lower case letters this decoding time can expand to a year or two.

Steps to Ensure a Smooth Transition

It is recommended that companies should ensure all of their IT resources are corrected for this adjusted time in order for computers, PDAs, servers, or calendar events to be in sync. The following additional steps are also recommended between now and April 1st to reduce confusion:

When scheduling new events include time and Time Zone within subject or body;
From March 11 through April 1, reconfirm all calendar events to ensure they are not off by an hour;
Manually correct any calendar events should any communication or calendar devices not automatically be updated with the corrected time.

History of Daylight Time in the U.S.

Although standard time in time zones was instituted in the U.S. and Canada by the railroads in 1883, it was not established in U.S. law until the Act of March 19, 1918, sometimes called the Standard Time Act. The act also established daylight saving time, a contentious idea then.

Security Corner – Encrypt the Files on Your Hard Drive

According to the FBI, nearly 300,000 laptops are stolen each year. If you have sensitive data on your laptop, it's critical that you protect it.

There are products in the $100 range that can make this almost effortless. Two that we recommend are SecurStar Drive-Crypt Plus and PGP Whole Disk Encryption.

IT Talk – Choosing VISTA

Which version of VISTA is right for you?

Microsoft’s long-awaited Windows VISTA was released on January 30th. If you’re thinking of upgrading to VISTA, you have four choices. (There are actually five versions of VISTA, but VISTA Enterprise is only available to volume customers— typically large organizations with a global reach.

Cool Stuff – Apple iPod Touch: The Best iPod Yet!

In our previous newsletter, we featured the Apple iPhone; however, we still don't recommend it for your business due to its lack of Enterprise connectors to Microsoft Exchange and Lotus Domino.

In the meantime, if you want the breakthrough features of the iPhone, but you want to listen to music without buying new cell phone service, Apple's new iPod touch is your solution.

The Double Dangers of Open Wi-Fi

When it comes to secure Wi-Fi, the weakest link in your network chain could be an open and vulnerable home Wi-Fi network linked to the office. If this home user has remote access to your network, then your network is vulnerable. Once an intruder enters this open network, they can access your company information, steal passwords, or send viruses and spyware.