Search for anything.

Your search for: "" revealed the following:

Search...
The Computer Workshop Logo
  • Home
  • About
    • Our Team
    • Careers
  • Services
    • Phone & Internet
      • VoIP Services
      • NBN Plans
      • Wi-Sky Internet
    • Managed Services Provider
    • Business Relocations
    • Data Recovery
    • Workshop and On Site
    • Managed Print Services
    • Hosting
    • Data Cabling
    • Security
    • Mac Repairs
    • Remote Assistance
    • Recycle IT
  • Shop
  • Contact
    • Townsville
    • Clermont
    • Cloncurry
    • On The Road
      • Ayr
      • Charters Towers
      • Clermont.
      • Cloncurry
      • Hughenden
      • Julia Creek
      • Magnetic Island
      • Palm Island
      • Richmond
      • Winton
  • Remote Support
  • Info
    • Blog
    • Testimonials
    • Newsletters
    • Competitions
      • Winners List
      • Terms and Conditions

Have Any Questions?
1300 775 442
email us

TCWG Logo
1300 775 442support@thecomputerworkshop.com.au
FacebookLinkedInInstagram
The Computer Workshop Logo
  • Home
  • About
    • Our Team
    • Careers
  • Services
    • Phone & Internet
      • VoIP Services
      • NBN Plans
      • Wi-Sky Internet
    • Managed Services Provider
    • Business Relocations
    • Data Recovery
    • Workshop and On Site
    • Managed Print Services
    • Hosting
    • Data Cabling
    • Security
    • Mac Repairs
    • Remote Assistance
    • Recycle IT
  • Shop
  • Contact
    • Townsville
    • Clermont
    • Cloncurry
    • On The Road
      • Ayr
      • Charters Towers
      • Clermont.
      • Cloncurry
      • Hughenden
      • Julia Creek
      • Magnetic Island
      • Palm Island
      • Richmond
      • Winton
  • Remote Support
  • Info
    • Blog
    • Testimonials
    • Newsletters
    • Competitions
      • Winners List
      • Terms and Conditions
TCWG Logo
TCWG Logo
  • Home
  • About
    • Our Team
    • Careers
  • Services
    • Phone & Internet
      • VoIP Services
      • NBN Plans
      • Wi-Sky Internet
    • Managed Services Provider
    • Business Relocations
    • Data Recovery
    • Workshop and On Site
    • Managed Print Services
    • Hosting
    • Data Cabling
    • Security
    • Mac Repairs
    • Remote Assistance
    • Recycle IT
  • Shop
  • Contact
    • Townsville
    • Clermont
    • Cloncurry
    • On The Road
      • Ayr
      • Charters Towers
      • Clermont.
      • Cloncurry
      • Hughenden
      • Julia Creek
      • Magnetic Island
      • Palm Island
      • Richmond
      • Winton
  • Remote Support
  • Info
    • Blog
    • Testimonials
    • Newsletters
    • Competitions
      • Winners List
      • Terms and Conditions

Your search for: "" revealed the following:

Search...

Category: Informative

HomeArchive by Category "Informative"

Your search for: "" revealed the following:

Search...
Recent Posts
  • IT 101
    Jun 22 2022
  • Shortcuts on your keyboard
    Jun 13 2022
  • Cyber Security – Your next security breach
    May 30 2022
  • Tired of waiting for your internet to be connected?
    May 10 2022
Newsletter

Shortcuts on your keyboard

Have you ever wondered why we have a key on your keyboard with a WINDOW on it?  It’s a really handy key giving you shortcuts to all sorts of actions.

There’s lots of clever short cuts you can use if you know how to utilize the keys.

My favourite is “Windows Key + Period (.) or semicolon(;)” which opens the emoji panel.  This will brighten up emails especially to friends and family.

A colon “:” followed by a closing bracket “)” will give you a smiley face without having to use the emoji panel.

One of the most important key combinations when it comes to security is “Windows + L” which will lock your device.  It’s most important when you are in a work environment where you have classified information on your computer.  If you walk away to get yourself a cup of coffee, anyone can come and see what you’ve been working on if it’s not locked.  When you come back, you just have to log in again with your password.

If you’re working on anything secretive and someone walks by who isn’t privy to that information, you can use “Windows key + D” to quickly hide the desktop and repeating the action with again bring it back.

It’s easy taking screenshots on a phone and tablet but did you know that you can do the same using the windows key on your computer?  “Windows key + PrtScn” will capture a full screenshot in the “Screenshots” folder but if you only want to capture a part of the screen use “Windows key + Shift + S” and then Snip & Sketch.  So convenient when writing proposals which need illustrations.  The more you use these actions, the easier they will become.

“Windows key + A” will open the Action centre and repeating it will close it.

When you need to get to your Settings quickly, “Windows key + I” will get you there in a flash. And “Windows key + E” will quickly open file explorer.

If you want to create a new file on your desktop or File Explorer you can use “CTRL + Shift + N”.  “F2” will rename a selected item.

Another key that has proven useful is the Ctrl key.  “Ctrl + C” will copy selected items and “Ctrl + V” will paste the content.  “Ctrl + X” will cut selected items to clipboard.

“Ctrl + Z” will undo an action and “Ctrl + Y” will redo the action.

“Alt + F4” will close an active window.  If no window is present, then a shutdown box will appear.

Have you ever had a file with lots of items in it that need to be deleted?  Rather the clicking “delete” multiple times, “Ctrl + A” will select all content and one “delete” will remove it all.

With all those scam emails coming through, “Shift + Delete” will get rid of them permanently, even skipping the recycle bin.

“Ctrl + D” will delete selected items from the Recycle Bin.

ESC, short for Escape, will close the current task.

I know this is a lot of information to digest but if you take the time to learn at least one a day, you will find working on your PC more efficient.

Gina Solano
June 13, 2022
0
Share:

Cyber Security – Your next security breach

Now here is a hot topic and I honestly don’t see it changing any time soon, if ever.

The biggest threat to your business is the threat of a cyberattack, every business is a target and with organized crime organisations driving the increasing events of cyber-attack it is not going to go away.

In a recent ACSC Survey, it is estimated that over $300 million is lost to cybercrime every year, the true figure is likely to be much higher as many crimes are not reported.

Someone is a victim of Cybercrime at least every 10 minutes.

So, who are these victims?

In the survey, it covers sole traders to businesses that employ up to 200 people, the attacks are across the board, and no one is too small or too big to be targeted, don’t think that we don’t turn over enough to be a target, regardless of your business income whether it is less than $50k a year or several million dollars you are still on the radar to be attacked.

That the facts and figures but it’s ok it won’t happen to me, sorry but if that is how you think it’s time to wake up.

Here are some common fallacies:

We have a good firewall, no one can get into our systems

It’s ok, all my programs are in the cloud I don’t have to worry

We don’t need to worry we are too small

My anti-virus will stop it

To these I would say, firewalls are great, but most cyberattacks are made against people, not systems (firewalls), the attackers know that firewalls are almost impossible to get through, but people are easy to trick and will often give access to systems without realizing the threat.

If all your programs are in the cloud all an attacker needs to get is your username and password, I know you are careful but again the person is the weakest link.

No one is too small, just look at the statistics, if you have something of value you are a target.

Your antivirus will not stop you from inadvertently giving away your details, email phishing attacks are used, and unfortunately, they work far too often.

Be aware that we are constantly being tested or attacked with phishing emails, these are trying to get you to give a threat agent your user name and password, so any email that you receive that is asking you to enter your user details needs to be treated with care if you don’t know the sender I would just delete it if it’s genuine the sender will be back in touch (so far this has never happened for me). Also, consider two-factor authentication for your emails, it just gives another layer of security.

Oh, and it’s not just the phishing emails, it’s the constant bombardment of phone calls, you know the ones “I’m ringing from Microsoft, there is a problem with your computer give me access to fix it” NO STOP, do not let them in, Microsoft will not call you unless you have called them first.

Yes, you have backups, but they are only useful if you can restore from them, if you back up to a drive connected to your computer this is there only to make you feel good, in reality, if your computer gets infected with a ransomware attack it will encrypt the backup drive too. Backups that are either on a network file store that requires authentication or some form of off-site solution are better.

The real secret is to trust no one, if you have an issue with your computers, you choose who helps you to fix the problem, make sure it is someone that you trust and has your best interests at heart.

Most businesses have little or no budget for Cyber Security, yet it is most probably the biggest threat to the future of your business. Make sure you are getting the correct advice on what you should be doing to protect your business, don’t just do what “old mate” at the pub reckons you should do.

If you suffer a cyberattack the likelihood, is you will suffer a financial loss that could end your business, if you survive the attack and can continue to trade you may have lost both business reputation and standing. You are also five times more likely to suffer another cyber-attack after you have suffered one.

David Halberg
May 30, 2022
0
Share:

Tired of waiting for your internet to be connected?

In my travels while talking to business owners, I am constantly surprised that they have been waiting for months for their internet to be connected. 

Without decent internet, the efficiency of your business is held hostage.  Even if they supply a nighthawk to tide you over, the speed is painfully slow and can cause unnecessary frustration.

Even phone systems are held to ransom as all phone lines are now VOIP (Voice Over Internet Protocol).  Gone are the days of copper wires connecting everyone.  Even if you do have copper, it’s purpose it to connect you to the internet which then provides your phone service.

I visited a business who complained bitterly that she’d been waiting 4 months for Telstra to connect her phones and internet.  I confidently told her we could help.  Unfortunately, she thought Telstra owned the lines and were the only provider she should trust.

It took a while to convince her that NBN was responsible for the lines and Telstra was just another wholesaler.  After 3 visits, she finally agreed to listen to what we had to offer.

When she realized we knew what we were talking about, she asked what she needed to do to have it all connected.  Since we never insist on contracts, we quoted an upfront investment in hardware and labour and, as a challenge, the boss told her it could be completed that day.

It was 3 o’clock in the afternoon.  It was all systems go!  Our technicians were on the move to organize the internet and configure her new phones.  By 5.30 that afternoon, she had fully functional phones and internet.

Don’t believe it?  Go talk to Tasha at Port City Roofing.

The big telcos are too cumbersome with so many departments, they don’t have the agility we have to make things happen quickly.

We have no obligation to any wholesaler leaving us free to use whoever will do the best job for our clients.  This means that rather than coming to see you with an agenda to sell a particular product, we come with the agenda to solve your phone and internet problems.

We’ll ask lots of questions and make suggestions to determine the best solution to your problem.

Once you’ve agreed to what we have to offer, it’s up to us to make IT happen.  The main hold up we experience is waiting for numbers to be ported from previous providers.  This can take anything from 2 weeks to 3 months.  As I said before, the big telcos can be slow on the uptake.

After we’ve taken over your phone carriage service, your bills will be coming directly from us.  And if you have a problem, you call us.  No waiting on hold for hours on end trying to find a real human being to talk to.

A perfect example of our after sales service is Townsville Gearbox and Reconditioning.  The called at 8.30 in the morning, frantic as they had no internet.  Jordon left immediately with a 4G failover to tide them over till we could figure out the problem.  Since we are such a big client of our wholesaler, their issue was immediately escalated so an NBN technician was onsite that day.  They’d discovered that a rat had chewed through the fiber.  Their internet was reconnected by 2 o’clock that afternoon.  Try and get that fast service from one of the big telcos!

We’re not perfect, no one is, but we’re very quick to attend to our clients if they ever have a problem.

Being a small business in town, we have to offer good service or we’d be out of business in no time.

Gina Solano
May 10, 2022
0
Share:

Why Sign it?

So you are starting out in business, you have had your business logo designed you start to brand your business, signage on your shopfront if you have one, you have your vehicle sign written, some nice workwear with your logo on, now you are looking very sharp.

Then you have spent money on a domain name to improve the look of your business, yes it looks very professional, well done.

So what have you done about your email signature?

This is one of those things that is often overlooked, let’s take that lovely branding that you have created and add it to your emails.

But why you ask?

Here are a few reasons that you should have an email signature:

Email signatures look professional, as opposed to an email signed off with just a name one with a signature including your business logo and your contact information, and all matching your branding gives a much better impression.

The information in the signature makes it so much easier for people to contact you, make sure you have included your telephone number, email address, street address, and website details.

You can also add links to your social media if you wish, the whole idea is to make it easy for someone to contact you, this could be an opportunity to gain extra followers on your social channels.

They are a good way to promote your brand, emails are often one of the first ways we contact people, having all your business information in one place not only makes it easy for the potential client to get back in touch with you but also helps them to identify with your brand.

Email signatures are to all intents and purposes digital business cards, they allow you to show some personality, you have the ability to design the signature however you want to allow your Business and Logo to stand out, some people like to have a headshot in the signature to help make it memorable.

The most important thing is to be creative with your signature but be consistent, when you settle on your design, apply it across all email accounts so you are giving a consistent message in all your digital communications.

In reality, email signatures are an easy addition to improving the professional look of your business, they also make it really easy for you to share your contact information in a way that most people will never loose, unlike a business card most people don’t throw out emails.

If you need help designing an email signature we are here to help, we can help with the design and show you how to add them to your mail program so whenever you send an email or reply to one your signature is included.

David Halberg
May 3, 2022
0
Share:

Have you Googled your business?

You have seen it before. When you Google a business, all of the information is sitting there on the screen.

With just one click you can call, email, visit the website, check the opening hours and even obtain directions to the shop.

Did you know you can do so much more with this incredible platform?

Google My Business has a variety of features that will assist you increasing your listing, and potentially rank you higher on Google itself.

What can this platform do?

  • Info: Present your business your way. Here you have the freedom upload all of your business details. Add your shop location, opening hours, services available, mission statement, website links, phone number, plus more. This is essentially your business card.
  • Insights: Much like Facebook / Instagram etc, you are able to track your page performance and insights. See first-hand how many customers search for your business, or simply track how many times customers call your business using the Google My Business feature.
  • Posts: A picture is worth a 1000 words. Upload your Offers / New Products or even upcoming Events of your business.
  • Reviews: Important to any business. This feature provides customers the opportunity to leave feedback of their experience, and also allows for potential clients to research, and understand the business before they make a purchase.
  • Messaging: Another way to obtain direct messages from clients. The message will come through Google My Business and send an alert to your email so you wont miss any enquiries.
  • Photos: Let your clients see what you have to offer, or even introduce your team. Your options are endless, and you have the freedom to stand out from the crowd.
  • Products: This feature is my personal favourite.Here you are able to upload a variety of Products and even put them in categories for easy viewing. This allows you to include a photo of the product, a detailed caption / description, PLUS a link to your website / additional pages.
  • Services: If you understand the importance of “Keywords” you will love this option. List in detail what products you offer and what brands you use so your customers can find you.

Here at The Computer Workshop Group we trial and test everything we do. With using our very own pages, we have been able to watch our platforms grow, thus increasing our reach and views.

This great platform is another way to help EVELVATE your business and potentially change your Google Ranking. Next time you yourself are searching for a business or service, take note of the Google My Business pages that pop up. You will find that there are many business not taking advantage of this FREE real estate! Once you start looking into the options you will understand just how much it can do.

We pride ourselves on our knowledge and understanding of this platform and we are able to help you manage this. Contact us today so you can get more customers tomorrow.

Michelle Blythe
April 20, 2022
0
Share:

So why do we do updates?

The question we often get is why should we do updates? it’s either that or we have that client that says I never do updates my machine works fine….

So those updates on your computer are usually either “Patches” or “Service Packs” to address issues with your software, sometimes they may be updated versions of your software.

So I know they always want to be installed at the most inconvenient time, but there is good reasoning behind the necessity for them.

So here are four reasons to run updates

Help to Reduce Vulnerabilities.

This is most probably the most important one, security updates are critical to reducing the risk of cyberattacks, the updates are there to protect against known vulnerabilities and malicious attacks that have been identified by your software vendor, they want you to have the best experience using their software possible and therefore want to protect you.

Using your computer without applying these patches is a bit like leaving the front door open and your keys wallet on the table, it’s almost like giving an open invitation to the criminals to come and take your sensitive data or hold it for ransom.

Fix bugs in software.

Things that make your software crash or other glitches that can be frustrating and time-consuming, software providers recognize this and release these updates to get you on the most stable and current version of their software, they are also aware that if they look after you by doing this you will be a more loyal customer so for them it is also about giving you the best user experience.

Often it is where the software developers have uncovered issues with their software often from user reports or due to common issues, never be afraid to contact your software provider if you are having a problem with their product, they may have the solution.

Ensure compatibility

I heard this described as not being like a dinosaur in the technology age.

With the never-ending improvements in technology, we need to try and keep current so our systems are compatible with the organisations, businesses, and other individuals we interact with.

Keep the playing field level don’t insist on using an old, slow, and outdated computer that is struggling to perform the tasks you have to do, look at the benefits of upgrading.

Stay ahead of the Competition

Ok, so you are happy with all of the above, what else?

How about just staying ahead of the game (or the competition), why not be the innovator or market leader by keeping your systems at the top of their game, making your business the most efficient to deal with by leveraging the most up to date technology and systems.

So, updates are there for a reason, I know they can be a pain when there are installed and it’s true they can sometimes, very rarely break your system, but if they do there is always an easy fix.

The best advice we can give is Update, Update, Update, there is always a good reason.

David Halberg
April 11, 2022
0
Share:

What’s in a name (Domain Name)?

I am constantly amazed by the number of businesses that do not have their own domain name, they trade on free email accounts and have no real website, ok they may have a Facebook page but not much else.

So why should you have a domain name, what does it do for your business?

For years I have been working with small business owners helping them with their technology solutions so they can present a professional front for their business, one of the first things I always suggest is to register a domain for your business, it makes you look like a much bigger business than you may actually be and it does not cost a fortune. Using your Bigpond, Hotmail or Gmail email address just makes you look cheap, as a potential client I would be questioning how committed you are as a business owner.

To put it into perspective a domain name costs around $50.00 per year with maybe $150.00 a year for email hosting, ok you may have to pay someone to set it up for you so maybe another $200.00, so for around $400.00 a year you can go from that bloke down the road that’s doing things on the cheap to someone that looks professional and gives the impression of being a big business.

Take it a stage further add a simple website that shows what you do and you can add some testimonials from clients that you have carried out work for and you suddenly look like a big business, again the cost of this is not massive, $150.00 a year for website hosting, and for a simple Website a one of cost around $1000.00-$2000.00.

For a relatively small investment, you have now in your client’s eyes become a much bigger business, you will be viewed in a different light by your competitors and other people in your industry.

The most common objection to registering and using a domain name for emails is “I have been using this one for years and everyone knows it”, ok so you redirect the emails to the new account and send an email out to everyone to let them know about your new address, you could also announce your new website and maybe even include some other marketing to promote your business. I know you are already so busy you don’t need any more work, but it’s always good to reconnect with your old clients.

The other good thing about registering your domain name using the .com.au or the new .au domains is it identifies you as an Australian business and if you have a web page it will help you rank higher in web searches.

So I would urge you to think about registering a domain for your business, rob@robthetradie.com.au or rob@robthetradie.au look so much better than robthetradie@outlook.com

If you would like to discuss your options we are happy to sit down with you and look at how we can help, our aim is to help you be the best business you can be.

David Halberg
April 1, 2022
0
Share:

So what is “Digital Disruption” and how does it affect me?

Let’s start off with what is digital disruption, let’s not get confused we are not talking about something that is limited to information technology businesses or computer systems.

Digital disruption should not be considered a negative process, it is the process of transforming and evolving our business practices with the aid of digital and other emerging technologies, it allows us to re-evaluate how we do things and helps us to improve or redesign our business processes

Whilst talking to local motorcycle dealer I was interested to hear them describing the change from the mechanics having access to a computer to look up information on servicing bike’s in a central office to how they now have computers at every service bay because it is now an essential tool as not only do they look up service information but need to be able to run diagnostics and checks on the modern motorbikes.

Not only does this save the mechanics (or should we call them technicians) time but has ultimately made them more efficient and put them in a situation where all the tools they need to complete their job are easily at hand.

So what we traditionally look at as a non-tech business is being affected by what is referred to as digital disruption, being open to the possibilities that this disruption and opportunity has brought has given this business an advantage and enabled them to be more efficient.

We can look back at other examples where digital disruption has changed the way we work and live and look at the lessons to be learned.

A fantastic example is Kodak Cameras, they were leaders in bringing photographic cameras to the masses, unfortunately, they did not see the trend for digital cameras as a threat to their traditional market and viewed it as a gadget thing, this allowed other brands to develop this market to a point where film cameras became mostly redundant, by this time it was too late for Kodak to change, and they went the way of the Dodos.

Another example is the encyclopedia, the change that we can see in living memory is enormous, it used to be a status symbol to be able to say you owned a set of Encyclopaedia Britannica, the mass of volumes of books containing information and facts. Then in 1993 Microsoft released Encarta a digital version of the encyclopedia, this had a massive effect on printed versions of encyclopedia due to the ease of access and the fact it took up very little space, interestingly Encarta became a victim of its own success and was discontinued in 2009 due to the advent of easy access to the internet as a source of information and fact. It should be noted that Encyclopaedia Britannica transformed its business and is still available as an online digital resource.

Just because you don’t see yourself as a Tech company does not mean that Digital Disruption will not or cannot affect your business

Digital disruption is something that we need to embrace, it is not something to be afraid of, often it is consumer-driven and if embraced will help us to be more successful in the future.

David Halberg
March 24, 2022
0
Share:

Oh look its not Dory

I have just learned of the advantages of DORI.  No, I’m not talking about Nemo’s little blue friend but the special feature I’ve discovered in my CCTV cameras installed by the licenced cabling technicians and security advisors at The Computer Workshop.

After having suffered a break-in and attempted break-in, my husband and I decided to invest in a CCTV system for added security.  Little did I know how effective these cameras are.

The brazen thieves came back but this time, we had them on camera so I had the footage sent to the police.  Because of DORI, they were able to recognise one of the perpetrators and arrest him. 

Let me explain how it works.

DORI is a acronym used to define measurements for CCTV cameras.

You can select a certain camera for a job based on it’s DORI parameters.

DORI stands for Detection, Observation, Recognition and Identification.

The D (Detection) means that distance that you can reliably detect an object.  The distance that you can reliably detect that the object is a car or a ute or even a person.

The O (Observation) means the distance that you can reliably observe what the object is doing.  As this distance you should be able to observe the object was walking east, had a blue shirt on and seemed to be looking at cars in the street as an example.

The R (Recognition) means the distance that you can reliably recognise a person.  The person may have been seen before and you may be able to recognise them again or at this distance you may be able to recognise a neighbour.  You should be able to get good detail at this distance and a very good description of an offender or suspect for police.

The I (Identify) means the distance that without any doubt you could identify an individual.  This might also apply to a number plate.  This is also the distance that CCTV facial recognition will function reliably at.

When scoping an installation they look at boundaries and obstacles and general layout to select a camera with the correct DORI to perform for the site.  A site might have a boundary fence 30m from the camera, there is no point looking too far past this so a logical choice would be a camera with a D level of 40 to 50m.  Likewise if a camera is going to be 10m high, then an I level of 6m is not enough unless the offender is 4m off the ground.

The VIP Cameras they use have various DORI distances but the 4MP camera they use as our mainline camera has a DORI of D 56m, O 22m, R 11m and I of 6m.

So for a normal installation you would detect a person walking on the street in front of your business or home at 56m.  You may see them earlier, but the certified reliable detection distance is 56m.  If they keep walking closer you  would be able to reliably observe what the individual is doing at 22m.  You would then see detail of what they are up to and intentions of their actions (are they looking at your car for a way in for example).  If the individual now proceeds to 11m from the camera you would see enough facial features and physical attributes to reliably recognise this individual.  And if they proceed closer to 6m you would be without doubt able to identify them.

Given most suspects reported to police are in your front yard or inside your home, an I level of 6m is more than enough to achieve a good look at the individual.

More expensive cameras or different lens combinations allows for different DORI levels.  With the VIP cameras we can supply fixed lens cameras with a DORI up to D 187m, O 75m, R 37m and I of 19m.

Of course with PTZ cameras the DORI is variable with the zoom of the camera.

DORI is of course measured under daylight lighting conditions, at night time your DORI lengths will be affected by lighting.  Your Cameras will have an IR illumination system to assist with night time observation but most only cover to 20 to 30m from the camera.

If long range night time observation is a requirement then a camera with 50m IR illumination might give you a better result or installing additional IR floodlights to illuminate the observation area.

The DORI level is not just a ‘best guess’ put in place by the guy trying to sell you the camera system. The DORI level is put in place by an accredited lab under EN62676-4.

The difference between your ‘cheap’  no name cameras from your local hardware and professional cameras is a DORI level measurement.

I am yet to see a camera system from your local hardware or auto store that advises a DORI level meaning they have never been tested or certified to perform at any level.

Gina Solano
March 15, 2022
0
Share:

What’s in a password ?

I was chatting to a friend, and they were talking about how their email password for work had to be changed every 28 days and this was causing some of their colleague’s issues as they were shift workers and sometimes their shift pattern may mean they did not work for up to a two week period. The two issues were they may have forgotten the password because they had to change it so often or because they had been away for so long they were not able to reset the password when they logged in as there was a small window to do this and so had to contact IT support for a password change (sounded like a long call and wait)
Whilst I understand that some businesses like to have users change passwords on a regular basis and conform to a set of paraments like minimum length, a combination of upper case and lower case letters, numbers, symbols, and not repeating the last number of passwords used I wonder if this is the best path to take.

Having worked in this sort of environment you get used to people needing password resets as they cannot remember the last password after a weekend (must have been a good one). This in turn reduces productivity. It also encourages people to write their passwords down, often in the back of their desk diary or on sticky notes on their desk, where is the security there, I can remember having to look at a user’s PC and not knowing the password but being able to access by just checking around their desk or even under their keyboard in some cases.

For several years now, the big players in the market have been recommending that we create secure strong passwords for each account and not change them unless we think that they have been compromised.

The reason for this is they have recognized that users suffer from password fatigue, changing your password every 28 or even 60 days becomes an issue when you have to conform to rules like no repeat of the last six passwords, minimum of eight characters, etc.

So, if you make passwords strong, increase the time period between changes, or better still do not require the password to be changed unless it is believed to be compromised, add multi-factor authentication to the account, encourage people to use unique passwords for each website or service, using a password manager can help with this.

So what would I recommend?

A password of 12 characters long but longer is better

A mix of uppercase letters, lowercase letters, numbers, and symbols

Different from your other passwords

Something easy to remember whilst still being difficult for someone else to guess, a good way is to use a memorable phrase but adapt to suit the password requirements like “M4ryH4daL!ttleLam8”

Remember an eight-character password in lower case will be broken by a computer instantly, add an upper case and a number and it takes 1 hour, make it then characters and add a symbol and it will take 5 years

Makes you think !

David Halberg
March 8, 2022
0
Share:
1 2
TCWG Logo

Copyright © 2022 — All rights reserved.