Should You Use Two-Factor Authentication

What exactly is two-factor authentication and what started it? Two-Factor Authentication happens when you are required to use two types of identification to log into a web site or open your email. It was started because people were using weak passwords or no passwords at all.

Normally the first factor is a password. As a reminder, your passwords should use numbers, capital and small letters and symbols. They should not be any sort of dictionary word and be at least 12 characters long, the longer the better. You should never reuse a password. If used correctly, you will need a password manager to remember them all. Getting one it is well worth it.

The second factor can vary widely from fingerprint or facial recognition to the web site sending you a numeric code via text or email that you must enter into their web site as part of the log in process. Google, Microsoft and others are working on other methods of authentication that will be secure and make it easier for the end user.

The best type of security is the one that people will use. Two-Factor Authentication takes a little longer to log into a web site, it will add 15-30 seconds. That time would be time well spent to protect your security. Web sites; especially banks, financial and health care sites, want to be sure that when a user logs in it is in fact the correct person. This is very difficult to do with just a password. Think about all the passwords stolen last year due to hackers.

This is where your phone is used to confirm your identity. Say you log into your bank’s web site. If you use your phone for that login, your fingerprint or facial recognition can be used to ID you. If you use a desktop computer, they will usually send a numeric code to your phone that you use during the login process. In either case you gave the bank your mobile phone number, so they have at least some assurance that it is you. You also enter your password that matches what the bank has on file. This is how Two-Factor Authentication works, two types of identification.

As I stated earlier, web sites and companies are working to make this login process easier and more secure. This is a hard job as easier and more secure don’t always work together.

George Uliano is a security professional with years of law enforcement and security experience. He earned a Bachelors Degree in Criminal Justice and Business graduating with honors. George holds three U.S. patents on different locking principles. This combination gives George and His Company Locking Systems International Inc the unique ability to provide its customers with the correct security at an affordable price.

Contemplating Installing a WLAN? Welcome!

Let me start off by saying up front, this is NOT an ad for any particular device or company. I’m merely setting down my experiences and making some general recommendations. My first attempt at standing up a Wireless Local Area Network (WLAN) was just so I could have access to the Internet from anywhere in my three story townhouse. I hooked up my cable modem to a directional wireless router, and adjusted the antennae so that I had adequate coverage on all floors.

Then I made sure the LAN was secure by assigning a strong password to the router’s encryption feature. All went well. I could go anywhere I pleased in our home and access the Internet. Over time, I populated each floor with a smattering of various PCs, conveniently located so I could log in whenever the whim hit me. My family also liked the convenience of being able to reach the Internet with whatever portable device they happened to hold. Just for convenience, I placed a wireless printer on each floor and linked it to the WLAN. Everything was going on smoothly.

But one glaring problem was that I was still using each PC locally, and sharing files between computers was a nightmare.

Then I heard about the Western Digital’s “MyCloud”. Quick like a bunny, I bought a 2 Gb “MyCloud,” apprehensively attached it to my router via its Ethernet port and then linked it to each of my remote computers as a separate drive.

What a rush! This is amazing! Now I have remote access to all of my projects and files from anywhere in my house! I’m a believer!

When you’re setting up your home WLAN, you might also want to consider adding a Western Digital’s “MyCloud” or similar remote Wireless server as a remotely, fully controlled information repository. Linked to your home network, and behind your router’s firewall, it’s the perfect place to put all of your important (and in my case, almost all) files. Accessible from any place in your house, through any device connected to your LAN, it’s a perfect way to share information and to have access to that information.

Before I invested in my MyCloud, I had to remember on which machine I had saved files locally, Now, I can log in from any of my machines, and have immediate access.

You may find that some other company’s product fits your lifestyle better than Western Digital. That’s OK. The whole gist of my advice is to have you consider a remote data and information serve that is under your total control.

Now, I’m not completely paranoid about “Cloud Servers” that sit external to your router’s firewall, they do have their place, but I do abhor paying a fee to access my own personally created files.

Tips to Computer Maintenance to Keep the Device Functioning

A very few things can make your laptop or computer worse. Things that may take a day can result in frustration of weeks to get things working. This is because the operating systems also take time to recognize changes and there is a need to install the updates. Sometimes, disconnecting is really bad that there may be a need to nuke effectively and begin a clean install as fresh.

The common maintenance issues with the computer may be avoided with the maintenance computer tips. It is vital to keep the computer in top condition. There is a need for regular device maintenance and smooth running of node, so that unauthorized intrusions such as viruses may be kept away. Here are the tips to keep your laptop or computer running optimally:

Tips for Computer maintenance software includes:

Check regularly for updates from manufacturers and ensure proper installation. If you leave them ignored, you computer is available for hacks, especially as it is connected online. Set a monthly or weekly schedule to ascertain operating systems are up-to-date.
Run reports of network system to identify any data abnormal activity. Automate the system reports so that the backing up process also sends a report daily, telling you a recent file updates.
Update IT policies and office as the technologies keep changing and remind the coworkers to follow. Replacing or update of software is best done as a timely manner. Failure to update leaves the PC open to hackers and virus-writers to take advantage. Update the firewall and virus definitions to work with intrusions. Use the online backup tools for recovery and data preservation regularly.

Tips for Computer maintenance for hardware include:

Give regular cleaning by dusting the keyboards. Keep the dirt and dust away so that the power unit and the fan do not get stuck. Use a compressed air spray for dust cleaning.
Ensure proper hardware is used. Network slowdown may happen over time on using outdated equipment. Always keep your hardware in a dry, secure area to prevent data loss or damage disasters such as breach or flood.
Keep adequate free disk space. This is because if the disk space is full, the performance is slow or it may freeze, creating user interruptions. Free up space and move to cloud backup account the archived files. Disconnect unauthorized hardware and ensure necessary firewall protects the administration and enjoy unimpeded access to exposed network.