• cloudservers

  • protectyourdata2

The Top Passwords of 2014 Are In!


2014 has been wrapped up – and with the end of the year comes a tallying of the year’s most popular passwords! Among these champions of defense against vicious thieves and scammers are:

12345678 in the number four slot!
And then there’s 12345 in the number three position!
In at number one is (drum roll) 123456!

But seriously…

While it’s true that ever more powerful systems chip away at the effectiveness of passwords it is important to utilize powerful passwords and avoid passwords such as those listed above.

If you are part of a network with access to critical data, it only takes one weak password, or careless behavior with email or online to compromise the entire network. Be sure that all of your employees are utilizing strong passwords and being smart online.

If you need help generating strong passwords you can try an online utility such as the ‘secure password generator':



To see the complete list of last year’s most popular passwords click below:



Your 2015 IT Plan

Computer Keyboard

  2015 is here! Have you begun the year’s IT planning?   Expiring licenses will need to be renewed. Old systems and technologies will need to be upgraded. Known vulnerabilities will need to be patched up. Unforseen threats will need to be anticipated.   Don’t lose sleep trying to handle it yourself, call the experts…

Bring Your Company to More Devices


Today your customers are freeing themselves from the desktop. More and more users are doing their business on tablets as well as mobile phones. Is your company’s website built to work smoothly on all of these devices? Now is the time to give your business’s website a modern look and modern functionality.     Let…

How Can You Protect Your Privacy?


Protecting your privacy in today’s connected world can be a full time job – at least. You may not be able to go completely dark to the data brokers and others who are out there in the jungle that is the internet, but you can take steps to protect yourself. CBS aired a great segment…

Merry Christmas from RHYNO Networks!


Passwords Are Closer to Being Dead


As reported by Dan Goodin on Ars Technica, Jeremi Gosney, the founder and CEO of Stricture Consulting Group has just unveiled a five server system that is capable of brute force cracking any strong eight character password in about five and a half hours. This is four times faster than previous capabilities. The cluster of…

How Did I Get a Computer Virus?


This question has been iterated more times than I can recall over the years from computer users.  The candid answer is simple.  By using your computer you, the computer operator, allowed the virus in.  Beyond the firewalls and antivirus software the best and last line of defense against a virus is you, the computer operator….

Yahoo Pays Big to Bug Hunters


TechCrunch has just reported that Yahoo has paid bug hunters $700,000 in rewards during the Bug Bounty Program’s first year. The program is a reaction to the security community’s complaints that the company was taking advantage of researchers by paying them a mere $12.50 in company vouchers for finding weaknesses in Yahoo’s products. In an attempt…

Uncertainty Just Before iPhone 6 Release


The theft of high profile celebrity selfies coupled with a feeling that Apple has become stagnant in the area of innovation has investers nervous just before the release of the iPhone 6. Apple has been taking steps to beef up the security of its iCloud service but confidence is still wobbly.   You can read…

Password Management


Keeping Your Accounts Secure It seems that each new week brings another alert about hackers stealing account information and a warning to change your passwords. Having a strong password is not enough, criminals can get to your account through weaknesses that are outside of your control. Constantly changing passwords makes managing those passwords challenging. There…