• cloudservers

  • protectyourdata2

What if Your Fingerprint Gets Hacked?

biometrics-apple-pay-security

Of late there as been a bit of trash talking passwords. Some claim they are on life support and will soon be obsolete. But in a world without passwords how can we secure our accounts? One answer is biometrics. Some familiar examples of biometrics are fingerprints or retinal scans. It’s genius, no more forgetting passwords, getting them confused or worrying about thinking up a strong enough password.

But ultimately the only difference is the input method, so what do you do if someone hacks your fingerprint, or retina? What if your account is compromised?

There is no way to ‘reset’ your fingerprint. That is the password you were born with.

In spite of the beating that passwords have taken recently, they are still proving themselves to be a very compelling method of securing accounts.

Read the Yahoo Tech article on biometrics here.

The Top Passwords of 2014 Are In!

password

2014 has been wrapped up – and with the end of the year comes a tallying of the year’s most popular passwords! Among these champions of defense against vicious thieves and scammers are: 12345678 in the number four slot! And then there’s 12345 in the number three position! In at number one is (drum roll)…

Your 2015 IT Plan

Computer Keyboard

  2015 is here! Have you begun the year’s IT planning?   Expiring licenses will need to be renewed. Old systems and technologies will need to be upgraded. Known vulnerabilities will need to be patched up. Unforseen threats will need to be anticipated.   Don’t lose sleep trying to handle it yourself, call the experts…

Bring Your Company to More Devices

WebDesign

Today your customers are freeing themselves from the desktop. More and more users are doing their business on tablets as well as mobile phones. Is your company’s website built to work smoothly on all of these devices? Now is the time to give your business’s website a modern look and modern functionality.     Let…

How Can You Protect Your Privacy?

temp

Protecting your privacy in today’s connected world can be a full time job – at least. You may not be able to go completely dark to the data brokers and others who are out there in the jungle that is the internet, but you can take steps to protect yourself. CBS aired a great segment…

Merry Christmas from RHYNO Networks!

FBPost

Passwords Are Closer to Being Dead

PasswordCrack

As reported by Dan Goodin on Ars Technica, Jeremi Gosney, the founder and CEO of Stricture Consulting Group has just unveiled a five server system that is capable of brute force cracking any strong eight character password in about five and a half hours. This is four times faster than previous capabilities. The cluster of…

How Did I Get a Computer Virus?

Virus

This question has been iterated more times than I can recall over the years from computer users.  The candid answer is simple.  By using your computer you, the computer operator, allowed the virus in.  Beyond the firewalls and antivirus software the best and last line of defense against a virus is you, the computer operator….

Yahoo Pays Big to Bug Hunters

Yahoo

TechCrunch has just reported that Yahoo has paid bug hunters $700,000 in rewards during the Bug Bounty Program’s first year. The program is a reaction to the security community’s complaints that the company was taking advantage of researchers by paying them a mere $12.50 in company vouchers for finding weaknesses in Yahoo’s products. In an attempt…

Uncertainty Just Before iPhone 6 Release

iphone6-blanc-02

The theft of high profile celebrity selfies coupled with a feeling that Apple has become stagnant in the area of innovation has investers nervous just before the release of the iPhone 6. Apple has been taking steps to beef up the security of its iCloud service but confidence is still wobbly.   You can read…