Choosing a Secure Password

Technology designHow to Choose a Secure Password

Thought you picked an unbreakable password? Never underestimate a hacker's ability to crack a password. As technology progresses, business owners and consumers must search for methods of password choosing that keep their data secured. The first tip is to choose passwords with higher character lengths. Experts recommend six or more characters, but approximately eight will yield the best results. An extra two characters mean the difference between a hacked account a safe one.

Avoid writing simple names and numbers, and the best method to create a random sequence would be through using a random password. Nevertheless, be certain to write it down somewhere so that you will not forget it.

Experts have also recommended that users add punctuation marks in their passwords. However, be certain to place it in the middle of the password to make it next to impossible for the best hackers to crack. You can use more than one punctuation mark to guarantee security. Some people have used up to three punctuation marks to throw hackers off the scent of an account. When considering a password, you want something that will be complicated enough to guarantee security yet simple enough to be remembered. Changing your password every once in a while guarantees further security because they will not be able to guess it outright.

Is Your Data Secure?

red concept email symbol security padlock on white backgroundHow to Secure Your Data

In the business world of today, stolen information has become commonplace. However, you do not have to become a victim because you can take steps of prevention. First, you should backup your database. Without the necessary data, you will not be able to operate a business smoothly. Once you have found a data backup method, test it to make sure that it works. You do not want to wait until you lose everything to discover that the information cannot be recovered. In addition, you will want to test your data backup method once per week.

Second, business owners can protect their data using a password protected folder. A folder that contains sensitive information will be protected further with a password. What folders need a password? You want a password on folders that include health, company or customer information. If you are looking for professional IT support, you should contact our IT company, MIS Solutions, based out of Atlanta. We have the expertise to guarantee positive results. You want to hire someone who cares about doing a great job in business, and we have years of experience to ensure that your data remains protected. Losing your data could become a costly mistake, but in hiring our company, you will be making an investment that keeps you protected.

FREE Report: How To Avoid The Top 4 Budget-Busting, Stress-Inducing Mistakes When Moving Your Office

MIS_officemove-reportMoving is always a pain in the rump, but it doesn’t have to be a horrific, expensive experience.

To make your move easy and effortless, here are the 4 most common mistakes to avoid:

  • Mistake #1: Not Using A Checklist
  • Mistake #2: Trying To Save Money By Moving Your Own Computer Network
  • Mistake #3: Not Hiring The RIGHT IT Firm To Move  Your Network
  • Mistake #4: Not Giving Your Phone, Internet, And Cable Vendors Enough Advance Warning


To Receive Your $500 Office Move Toolkit, Call Us At 678-745-5109 and Ask For Becky or Kary.


How To Know When An Employee Is About To Quit

   There’s nothing quite as devastating as losing a key employee, especially if they give you no warning or notice. Often they’ll give you subtle signs such as a lackadaisical approach to work, arriving and leaving on time, not a minute sooner or later, long lunches or suddenly having several appointments at the beginning or the end of the workday. But one of the biggest giveaways is their Internet behavior at work.facebook at work

   We already know that employees spend personal time at work on Facebook and other social media sites; but you know something’s going on if they’ve added, Craigslist, LinkedIn and other local job sites to the web pages they frequently visit.

   That’s ONE of the reasons we recommend our clients install an Internet monitoring software for their network. Not only will it reveal when employees are looking for work somewhere else, it will also alert you to employees who are wasting HOURS on social media, gambling, shopping and other non-work-related web sites. It will also prevent employees from accessing porn and file-sharing sites that could bring on a BIG lawsuit or nasty hacker attack.

   While some people fear this is too invasive, keep in mind that you are paying those employees to perform a job with company-owned devices and company-paid Internet. We’re not suggesting you monitor their personal devices or what they do after hours on their own time. But it’s perfectly reasonable to expect an employee to put in a full 8 hours if you’re paying them for their time.

   Of course, you should provide notice that their computers are being monitored and set the expectation that you want them working during company hours; you should also detail what employees can and cannot do with company-owned devices in your Acceptable Use Policy (AUP). If you want to give them the ability to check personal e-mail and social media sites during work hours, you can limit it to 30 minutes a day during their lunch hour or break. Again, we don’t recommend this since this can be an easy gateway for viruses and hackers—but these options are available.


Four Ways To Get More Performance, Productivity And Profit From Your Team

  1. Your Team Needs To Learn Together

Rarely do teams learn together. Too often, increases in skill are confined to individuals. Sometimes that can become a barrier to teamwork: because there are dramatically different knowledge and skill levels, some team members aren’t able to keep up. When an individual attends a course or discovers a useful practice, he or she should be encouraged to share it with the team. And periodically putting the entire team into a learning environment is critical.

  1. Peer Recognition Is Powerful

If you’re a team leader, understand that despite your best efforts, you will be incapable of adequately recognizing every team member’s efforts and contributions. Good work will slip by and go unrecognized. If this happens often, the team member may well become disillusioned. Relieve yourself of the burden to be the sole dispenser of recognition: ask team members to recognize each other. Make it a team expectation to thank other team members for their assistance and to look for opportunities to catch each other doing something praiseworthy.

  1. To Win More Together, Think Together More

Have you ever held a team retreat? When was the last time your team came together for the express purpose of thinking about the work you do? Do you periodically pause as a group to reflect on what you’ve learned and internalize the lessons? Do you meet to consider opportunities, and not just to solve problems? The team that thinks more wins more.

  1. You’ve Got To Expect It And Not Tolerate It If You Don’t Get It

Some managers, knowing how difficult it can be to create great teamwork, undermine their efforts by making teamwork “optional.” That is, they appreciate the people who are good team players but they tolerate those who aren’t. As the old adage goes, what you allow, you condone. Those on the same team should know that figuring out how to get along and work with other teammates is their responsibility. Those who refuse to be team players should at the very least not enjoy the same benefits, and at worst, should be removed. It might sound harsh, but it is necessary if you want teamwork to work.

Mark Sanborn PhotoMark Sanborn, CSP, CPAE, is president of Sanborn & Associates, Inc., an idea studio dedicated to developing leaders in business and in life. Mark is an international best-selling author and noted authority on leadership, team-building, customer service and change. Mark is the author of 8 books, including the best seller The Fred Factor: How Passion in Your Work and Life Can Turn the Ordinary into the Extraordinary, which has sold more than 1.6 million copies internationally. Learn more about Mark at



How To Make Yourself “Invisible” To Hackers

There’s an old joke about two men hiking in the woods when they come across a big, grumpy black bear. Scared silly, one of the guys starts to run but notices his buddy stopped, bent-over, changing his shoes. He shouts to him, “Dude! What are you doing?!?! Why aren’t you running?” to which his friend replies, “I’m changing my shoes because I don’t need to outrun the bear – I only need to outrun YOU.”

  network locked This is a perfect analogy for what’s going on in small businesses: the “slow,” easy targets are getting nailed by fast-growing cybercrime rings that are getting more sophisticated and aggressive in attacking small businesses. Last year, the average cyber-attack cost a small business $20,752, a substantial increase from 2013, when the average was $8,699. That’s because most small businesses don’t have the security protocols in place or the manpower and budget to implement sophisticated security systems. While there’s absolutely no way to completely protect yourself other than disconnecting entirely from the Internet, there are several things you can do to avoid being easy pickings. Here’s how:

  1. Lock your network. While WIRED networks make you invisible to WiFi snoops because you have to access them by plugging into physical outlets or hacking modem ports, you can create a hidden or cloaked network on a wireless network. Simply disable the service set identifier (SSID) broadcasting function on the wireless router, and only users with the exact network name will have access. Small businesses like coffeehouses can also do this—just periodically change the network’s information and place a small sign near the register with the current network name and passcode.
  2. Encrypt your data. On your desktops, turn on the full-disk encryption tools that come standard on most operating systems: BitLocker on Windows-based PCs and FileVault on Macs. There is no noticeable performance lag; however, the encryption only applies when users are logged out of the system. So setting computers to automatically log out after 15 minutes without use is a good idea. And for mobile devices, use a VPN (virtual private network) to encrypt data traveling to and from your mobile devices and limit your employees’ access to only the company data that they must have to do their jobs.
  3. Install firewall and anti-malware applications on all of your equipment, including mobile devices.
  4. Disable features that automatically connect your mobile devices to any available network.
  5. Disable printer and file-sharing options on mobile devices before connecting to a hotspot.
  6. Check before connecting to hotspots. If there is an unusual variation in the logo or name on the login page, beware…this could mean it’s a fake hotspot designed to steal your data.

   Can you guarantee that the person across the hotel lobby isn’t looking at your data? Not really, but the chances of them being able to do that are greatly reduced if you take precautions to protect your business.

For More Information, Contact Us at 678-745-5109