Two-Factor Authentication

Two-factor authentication is another security layer for remote access to websites and networks. With more and more web-based applications requiring more complex passwords, needing to enter some other information may seem like a royal pain. But it provides the protection you need to enhance your data safety.

Two-factor authentication is just what it says. It’s a second password, a reference to a graphic symbol or an answer to a question. While nothing is 100% foolproof, it’s a step to help the system you’re using verify you are you. And for now, it offers protection against hackers when you bank or purchase goods online or use a VPN (virtual private network) to access your work computer or corporate systems and data files over the Internet.

Getting up and running with two-part authentication for business and personal applications is quick and easy.

Many businesses are using mobile phones as the second part of two-factor authentication. When a user accesses a VPN from a laptop or tablet, just to use one example, you enter the normal username and password. Once the network identifies the user, it sends a numeric code to a designated telephone number. For most of us, this is usually a mobile phone. You then have 60 seconds to enter  the numeric code from the computer or tablet you are using.

For personal Internet applications, such as Facebook, LinkedIn and Twitter, you can go to “settings” to strengthen your security.

In Facebook, for example, you can go to settings and click the Security folder on the top left of your screen. You’ll have nine settings you can adjust. Some of them are two-factor authentication steps. You can also deactivate your account. Going down the left side of the screen, you can edit your privacy preferences and even block or restrict email addresses and invitations for apps.

In LinkedIn, you can access your settings from your picture in the upper right corner and use the drop-down menu to change your privacy and other settings. Twitter’s settings allow you to require having a verification code sent to a telephone number when you sign in.

We can answer your questions about setting up security programs for your business or for you and your family. Leave a comment or send us an email with your questions and concerns – or give us a call at 973-433-6676.

This article was published in Technology Update, the monthly newsletter from Sterling Rose LLC.

Google’s Revolving World

In the ever-changing world of online services and applications, Google is going through another round of transitions. Here are some of the key changes that may affect your business and home computing:

  • Google Reader, which lets you pull in articles from just about any blog or news site, is being discontinued as of July 1. The company says that with more people accessing news from smartphones and tablets in bits and bites (pun intended) throughout the day and night, it’s no longer needed. You may already rely on social media sites, such as Facebook and Twitter, to keep up with news instead of devoting a larger block of time to reading more in-depth articles online. If you want a replacement for Google Reader, Feedly is seen as a good place to start. It works with the most popular browsers, except Internet Explorer, and has an app for mobile devices.
  • Google Postini, which provides email security and archiving services for use with their existing email servers, will be transitioned to the Google Apps platform. Google will manage the transition for its customers, and they will not have to replace existing email servers with Gmail. Google says it will notify customers 60 to 90 days ahead of the transition to let them know who is eligible and how it will be done. Postini customers can learn more from the Postini transition page.
  • Google Cloud Print lets you send your file securely to your printer over the web from any connected phone, tablet laptop or desktop. It’s a new app, and it has a lot of exciting possibilities. You can learn more from Google’s Cloud Print page and contact us with specific questions about setting it up and using it.
  • Google Quickoffice is coming to the web. Google recently purchased the app, which allows users to read and edit Word, Excel and PowerPoint documents on the iPad, iPhone and Android without losing the document’s layout and other advanced features that Google Docs currently can’t handle. Google recently introduced Chrome Office Viewer for displaying Word, Excel and PowerPoint files in a browser. You will get Quickoffice as part of an automatic update. Likely to replace Google Docs, the new program will affect you if you use Dropbox. Google will not support it, and you’ll lose some functionality. Documents To Go may be an alternative to the new Quickoffice if you rely on Dropbox. We’re researching it, along with other possibilities, and we’ll let you know what we find.

Microsoft Office for iPhone

Microsoft last week released a version of Office for the iPhone. It’s available through iTunes or the device app store, but you must be an Office 365 subscriber to get it. The iPhone app has light (reduced capability) versions of Word, Excel and PowerPoint and syncs with Microsoft’s SkyDrive online storage service. You should be able to pick up a document exactly where you left off on another computer tied to the same account, while comments they add to a Word or Excel file should appear when you open it up on another machine. You should be able to preserve charts, animation, comments and other key properties. That’s not always the case with programs offered by Google and other companies to work with Office files on mobile devices.

We have a copy on our phone, and here’s our initial review: It does not have the option to sync with Dropbox or Google Drive. You can only sync with SkyDrive, which means you need to choose your platforms wisely.


The app platform changes all the time, and new providers are always entering the market to bring you new products and services or to replace the apps you’ve liked and want to keep using. We’re ready to answer your questions and help you install and set up the systems and apps that will enable to be more productive at work and at home. Just call us – 973-433-6676 – or email us.

This article was published in Technology Update, the monthly newsletter from Sterling Rose LLC.

Administrative Alert

Are you the owner or key manager of a business? Do you know the passwords for your network and the software packages that keep your business running? If you answered “yes” to the first question and “no” to the second, it’s time to take the necessary steps to get control of your lifeline.

We’ve been seeing a lot of this password problem lately when called in to take over a company’s IT services. Neither the owner nor a key manager has any idea of the administrative user name or password, and that means they have no access to their system.

The issue typically shows up when a business takes on a new IT company to manage or troubleshoot its data system. It creates a huge problem because you can’t switch ownership of your system back to you and your new IT provider. That, in turn, prevents you and the provider from being able to fix problems with your network and operating system or from being able to update or upgrade your software packages.

As you would suspect, no business changes its IT provider unless it’s unhappy with the service. When we start with a new account, we find a system has deteriorated from neglect for one reason or another. Sometimes, we can use special tools to unlock a password and get into a system and/or software package. It all depends on whether the set-up is simple or complex.

When hard feelings and money are involved, the break-up is pretty bad. At worst case, the old IT provider can withhold or threaten to withhold passwords. Even if a company owner can successfully sue a former IT provider for the password information, it still takes time and money.

One of our new clients was in the middle of installing new hardware and software. With only part of the system delivered over the course of six months and only partial payments being made, the company’s owner decided to scrap the whole project and order all new hardware and software.

That’s extreme. But key point to remember is that not having your passwords makes next to impossible – if not totally impossible – to service your system properly.

To protect yourself from impending disaster, you should follow these steps:

  1. Make a list of all the user names and passwords your business has for your operating system, email system, software packages, Internet access, etc. Put them in an electronic format and decide who has access to what. As the owner, you should have all the access. You can give all or partial access to other people in your business, but make sure they will always be there or be accessible to provide the access information when needed.
  2. When you install or upgrade any system, make sure you have all the user names and passwords and that you give the information to people as required.
  3. When you change IT providers or when someone with access information leaves, change user names and passwords immediately. We recommend a complete password reset because bad break-ups lead to security breaches.

If you’re not sure about all of your passwords and access information or not sure how to set it all up, we’d be more than happy to help you resolve any problems. Just call us – 973-433-6676 – or drop us an email to schedule a consultation.

This article was published in Technology Update, the monthly newsletter from Sterling Rose LLC.