Office For Android – Passwords Problems

Office For Android Office for Android devices is now available Here are some details to assist you: Set Up Microsoft Office On Android 2 Factor Authentication Here are details of 2 factor authentication: Lifehacker Guide To 2 Factor  Password Issues I continually get calls from people re their accounts being compromised , whether they are their social media , email accounts and their are usually some common flaws in their passwords. Too short They have a word in it  It is just a poor password The graphic below will give you some tips  Source: WhoIsHostingThis.com

Continue Reading

iPhone Battery Tips – RAM – Do You Have Enough – Passwords – What Are The Worst

iPhone Battery Life Issues Here are some tips if you are having issues with your iPhone battery You may need a new battery , book in at the Genius bar Change the brightness on your phone , brightness drains the phone more than any other feature See whats training your battery:Settings > General > Usage > Battery Usage Turn off location services and turn off Share my location :Settings > Privacy > Location Services > Share My Location If you are not using wifi – turn it off Turn off notifications Settings > Notifications Manually check your email and turn off this feature by going to Settings > Mail, Contacts, Calendars > Fetch New Data. Restart / reset your device at least once a week RAM – random access memory Some computers – laptops / desktops – have been made with insufficient ram so when opening multiple programs or when starting and having to load all the programs at the beginning it will be a ” bit ” slow . 4Gb of ram for a Windows computer (32 bit system ) is about the minimum that you need with 8Gb of ram for a Windows 64bit being the “sweet spot”. To… Read More

Continue Reading

Embrace The Cloud – But Follow The Rules

Lets Put The Celebrity Photo “ hack “ Into Perspective Many media outlets blamed Apple and iCloud however it has been reported that the photos that were put on the internet came from Apple devices , Android devices and webcams.This was a targeted attack on the celebrities. So how did they do this? Email account – email address they found this out They knew the answers to the security questions used on these accounts – mothers name , favourite car , first job are not hard to find out  Weak password that was used on multiple accounts They could have clicked links in emails giving them access to their computers  Lets not confuse iCloud and “ the cloud The cloud is storing information and data at a separate location that you access via an internet connection. There are very few people that have not used the cloud whether you are aware of this or not – when you use a credit card you are using “ the cloud “ iCloud is Apples software to back up your settings , photos , contacts ,documents ( made on Apples devices ) and is secure if you follow the rules for security Turning… Read More

Continue Reading

What Did We Learn About Uploading To The Cloud This Week ?

At a time when we should be embracing the cloud we had the ” nude photo scandal ” this week where photos of celebrities were accessed and ” stolen” from their online accounts. First they came out and blamed Apple as it was supposedly an iCloud issue. Apple have addressed this : Tim Cook :iCloud security will be strengthened So how do we think they accessed these photos Poor passwords Same passwords for multiple accounts Poor answers to security questions ( mothers name for example can be found on Wikipedia) Failure to turn on 2 factor authentication Make no mistake this was a “targeted ” attack on these celebrities not your everyday user. Targeted attacks like this stretch the security on all services and the average home and business user would have little to nothing to worry about if they addressed the above issues. Remember every time you use the flexiteller at the bank you are using the cloud , embrace the cloud don’t shun it and if you have photos of yourself that you may not want the world to see , don’t save them to the internet.  

Continue Reading

FIVEaa Segment – Have Your Passwords Been Stolen ?

BACKGROUND A Russian crime ring based in a small city in south central Russia has amassed the largest known collection of stolen Internet credentials, including 1.2 billion user name and password combinations and more than 500 million email addresses The records include confidential material gathered from 420,000 websites from big companies (Fortune 500 companies) to small Internet sites and most of these sites are still vulnerable. Some big companies were aware that their records were among the stolen information but have not commented.- This is not good but expect to see companies comment as they try and patch this again. So far, the criminals appear to have not sold many of the records online.  They appear to be using the stolen information to send spam on social networks like Twitter at the behest of other groups, collecting fees for their work. Selling the records on the black market would be lucrative. THIS WILL BE ABOUT IDENTITY THEFT While a credit card can be easily canceled, personal credentials like an email address and or password can be used for identity theft. Because people tend to use the same passwords for different sites, criminals test stolen credentials on websites where valuable information… Read More

Continue Reading

2 Factor Authentication – Why You Should Turn It On

2 factor authentication is where you will give a company your mobile phone number so that they can issue you with a code that you enter to access their service on your computer , tablet or smartphone. Passwords are great , but 2 factor authentication means that they know it is you. “Google’s spam guru, Matt Cutts, put it best: two-factor authentication is a simple feature that asks for more than just your password. It requires both “something you know” (like a password) and “something you have” (like your phone). After you enter your password, you’ll get a second code sent to your phone, and only after you enter it will you get into your account. Think of it as entering a PIN number, then getting a retina scan, like you see in every spy movie ever made. It’s a lot more secure than a password (which is very hackable), and keeps unwanted snoopers out of your online accounts.” — http://lifehacker.com/5938565/heres-everywhere-you-should-enable-two-factor-authentication-right-now So where are some of the sites and services that you can turn it on: Google Microsoft Apple Facebook Dropbox Evernote  Activate it , turn it on and use it  More information can be found at this CNET Article   … Read More

Continue Reading

EBay Hack – What Do You Need To Do

The EBay hack where hackers stole email addresses, encrypted passwords, birth dates, mailing addresses and other information, though no financial data, nor PayPal databases were compromised is the second biggest of its kind. As with the recent Heartbleed security issue it does take time for companies to realise that this has occurred. What should you do  Change your password on EBay and on Paypal  If you use the same password elsewhere , change that password too  Turn on 2 factor authentication at Paypal so that your mobile number is registered and you receive a code when conducting transactions on that account  Be extra wary of phishing emails that spoof eBay and PayPal and ask you to click on some link or download some security tool; attackers are likely to capitalise on this incident to spread malware and to hijack accounts.

Continue Reading