LTech Solutions Blog

LTech Solutions has been serving the Hudson area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Make Your Password Rhyme Every Time

b2ap3_thumbnail_security_for_your_passwords_400.jpgPassword security is quite the conundrum. We want our passwords to be easy to remember, but the problem is that passwords that are easy to remember are often simple and insecure. Therefore, it becomes a best practice to use complicated passwords with both upper and lower-case letters, numbers, and symbols to compensate. The “passpoem” might resolve this issue in the most obvious way.

Continue reading

Can “Spaced Repetition” Be the Key to Remembering Complex Passwords?

b2ap3_thumbnail_password_login_400.jpgIs the password an outdated type of security measure? This question seems to be getting asked around quite a bit, especially with more powerful threats loose all over the Internet. Unfortunately, the fault in passwords generally lies in the fact that humans generally don’t pick passwords that are secure enough. Thanks to a new method called “spaced repetition,” it seems there might be some hope left for the password after all.

Continue reading

What is your Identity Worth to You?

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

Recent Comments
Ella Petterd
As a person becomes an adult, he needs to register his identity in the Government system and i like this system very much. There a... Read More
Friday, 25 November 2016 15:50
William Son
Identity fraud is not so much uncommon in this modern world.But proper awareness and attention to detail could prevent to being th... Read More
Sunday, 06 May 2018 04:08
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Privacy Technology Productivity Hackers Google Cloud Workplace Tips Miscellaneous Mobile Devices Email Business Internet Efficiency Microsoft Backup Hosted Solutions Browser Windows 10 Malware User Tips Marketing Holiday Android Windows Save Money Small Business Business Computing Innovation Office Employer-Employee Relationship Automation VoIP Hardware Data Chrome Server Communication Mobile Computing Computer Upgrade WiFi Microsoft Office IT Services Hacking Social Media Remote Computing Business Continuity Application Disaster Recovery Software Smartphone IT Solutions Mouse Big Data IT Support Gadgets Network Health Managed Service Provider Mobile Device Management Gmail Passwords Retail Bandwidth Lithium-ion battery Business Management Going Green App Budget The Internet of Things Recovery Mobility Smartphones Virtualization Operating System Quick Tips communications Website Apple Environment Office Tips Entertainment Social Engineering Spam Memory Telephone Systems Fax Server Biometrics Networking DDoS History Saving Money PowerPoint Vendor Management Meetings Hard Drives Consultant Distributed Denial of Service Maintenance Human Resources Sports Virus Humor Office 365 Programming Best Available Phone System Collaboration Compliance Shortcut VPN Risk Management Streaming Media Remote Monitoring YouTube Analytics Worker Commute Wireless Analyitcs Encryption Ransomware NarrowBand SharePoint Social User Windows Media Player Notifications Online Currency Excel Wireless Technology eWaste iPhone Social Networking Bluetooth Data Management Computers Network Security Facebook Hacker Chromecast WIndows 7 User Error Robot USB Uninterrupted Power Supply Best Practice Twitter Science Bring Your Own Device Managing Stress Wearable Technology Privacey Virtual Reality Customer Relationship Management Cleaning BYOD Settings Avoiding Downtime Windows 8 Laptop Running Cable Bloatware Customer Service Tech Support Search People Tablet Touchpad Entrepreneur Save Time Shadow IT Unified Threat Management Safety Mobile Office Tablets Two-factor Authentication Internet Exlporer

Blog Archive