Whether you’re activating new equipment or continuing to use equipment and websites, and whether you’re recycling old computers, peripherals and devices, there are a number of security steps you can take to avoid a variety of problems. Here’s how to cover your tracks.
Let’s start with passwords. Don’t raise your hands all at once. How many of you tape passwords to your monitor – at the office or at home? How many of you keep them in a file on your computer? How many write them on slips of paper? How many are frustrated by all the rules and by having to keep track of so many passwords?
Did anybody besides me not raise your hand?
Most security experts will tell you should have a separate, strong password for every place that requires one. In the real world, it’s a real pain and highly impractical.
Here’s what I recommend. Create one very secure password you really like and use it for everything. The same security experts will also tell that a very strong password will have three of the following characteristics:
- Upper case letters
- Lower case letters
- Symbols or special characters
My password has all four – and it’s long. According to the website How Secure Is My Password?, it will take 58 years for someone to crack my code. For perspective, if I would use just my name, it could be cracked immediately. If I add an exclamation point (!), it jumps to 48 seconds. If I add an initial capital letter to the exclamation point, it jumps to 25 minutes. Adding a number increases the time to an hour. Adding another symbol or number gets you up to 58 years.
To give you a better idea of passwords to avoid, SplashData, provider of the SplashID Safe line of password management applications, just released its annual list of the past year’s worst passwords. If you see something familiar in the list, you might want to make a change or two.
So, give your password some thought and some length, and you should be in good shape. Just be aware that some sites may have some special rules about password creation, but you get the idea. Some sites also have two-factor identification requirements, so make sure you follow the rules. If you use Dropbox to store or share files, we can help you set up a two-factor identification for your protection.
Another area of concern, which is largely out of our individual control, is the theft of information from major retailers’ systems. Target and Nordstrom are the ones that come to mind. I believe the biggest threat to systems such as those is somebody inside stealing information – just like somebody in a company embezzling money.
However, it does raise a question that we, as consumers, need to answer. How much convenience do we want? We’ve all returned products without a receipt, and it’s possible when the retailer retains the transaction and your credit card information. We are trading privacy for convenience.
The newer credit card technology, which is widely used in Europe, uses a chip that the retailer scans. On the backend, no information is stored once the transaction is completed.
Finally, let’s talk about protecting your data – or more accurately erasing and eradicating your data – when you recycle a computer, smartphone, tablet, fax machine, copier or printer. All of them can hold data.
When you go to a reputable recycler, you can be confident they will erase all hard drives and chips. It’s always a good idea to verify that. You can also remove a hard drive from a desktop or laptop computer, and with a laptop, it’s pretty effective to wreck the hard drive by hitting it with a hammer. Desktop hard drives have a steel undercarriage, which makes destruction more difficult.
There are ways to erase or eradicate the data, but we recommend you let us take care of it for you. We can make sure all the data and files you want to keep are backed up so you can restore them for use on other computers and devices. We also can use tools that wipe everything clean and can test to make sure we took off everything.
We are also happy to take any electronics you want to get rid of to GreenVision. State and local laws that affect most of our customers require recycling for all electronics to protect the environment. We take your old stuff there when we install new equipment. Please feel free to call us – 973-433-6676 – or email us to answer your questions, wipe out your data and/or help with your recycling. You can also call us or email us about your password and data security questions.
This article was published in Technology Update, the monthly newsletter from Sterling Rose LLC.