croom new

Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the New Jersey area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 4 Useful Tech Tips

Tip of the Week: 4 Useful Tech Tips

Certain technologies out there make you ask questions. For example, have you ever wondered why you need to restart your computer other than “because IT says to?” What about that task manager? What’s that for, anyway? We’re here to help you answer some questions about your business technology and why it’s important to keep them in mind during the workday.

0 Comments
Continue reading

Tip of the Week: NIST Password Guidelines

Tip of the Week: NIST Password Guidelines

Passwords have always been important to businesses, but they are priorities for organizations in certain industries. Government-based organizations in particular need to be concerned about using secure passwords. Of course, not all businesses are government-based, but there’s a thing or two your own can learn about some of their password practices.

0 Comments
Continue reading

Do Browser-Saved Passwords Stay Secure?

Do Browser-Saved Passwords Stay Secure?

One of the best things about computers is that there is always a new way to make something easier: automation decreases a workload, their processors can calculate much faster than the human brain can, collaboration with coworkers becomes almost effortless, and your web browser can even remember your passwords! However, you have to ask yourself: is the ability to save your passwords in your browser really a great idea?

0 Comments
Continue reading

Sexy Scam Relies on Your Belief that Someone Was Watching

Sexy Scam Relies on Your Belief that Someone Was Watching

Internet scams are major threats to individuals and business because all it takes is one wrong click of the mouse and a user is embroiled in an unenviable situation. One such scam that is happening today is designed to catch users with their pants down, so to speak.

0 Comments
Continue reading

Is Your Password Security Up to Par?

Is Your Password Security Up to Par?

Passwords are all over the place these days, whether they’re required to access an online account, or access the devices used to open these accounts. While both types of passwords can make for ideal security conditions, this is only the case if the passwords are strong. If your passwords can be guessed by just about anyone, can you really call it a security measure? New insights from SplashData show that passwords aren’t being considered as much as they need to be.

0 Comments
Continue reading

eBay Revamps Security Protocols. Should Your Business Follow Suit?

eBay Revamps Security Protocols. Should Your Business Follow Suit?

As technology advances and allows for common pain points to be corrected, many of today’s most well-known entities will adopt new solutions to ease the experience of their customers and clients. Take, for example, eBay. The famous reselling site has been taking steps to install an assortment of new features to improve its customers’ experience.

0 Comments
Continue reading

Tip of the Week: Why Routinely Changing Your Password May Be a Bad Idea

Tip of the Week: Why Routinely Changing Your Password May Be a Bad Idea

You’ve heard it said that it’s a best security practice to routinely change your passwords. The idea here is that, if a password were stolen, then it would lose its value when the user goes to change it. While this sounds like solid logic, new research shows that it may actually be better NOT to change your passwords.


This may be a hard pill to swallow for IT administrators who have always required users to change their passwords every few months or so. However, seeing as this practice could make accounts less secure, it’s worth considering.

The idea behind this theory is that, whenever a user goes to change their password, they’re often rushed or annoyed and end up creating a new password that’s less secure. The Washington Post puts it like this: “Forcing people to keep changing their passwords can result in workers coming up with, well, bad passwords.”

Think about it, how often have you changed your password, only to change it from a complex password to one that’s easier to remember? Or, have you ever kept the same password and just added a number at the end of your new password? This covert move will do little to deter a hacker. Carnegie Mellon University researched this topic and found that users who felt annoyed by having to change their password created new passwords that were 46 percent less secure.

Plus, let’s consider the hypothetical situation of a hacker actually stealing your password. Truth be told, once they’ve gotten a hold of your login credentials, they’ll try to exploit the password as soon as they can. If they’re successful, they’ll pose as you and change the account’s password, thus locking you out of it. In an all-too-common situation like this, the fact that you’re scheduled to change your password at the end of the month won’t change anything.

Additionally, ZDNet points out yet another way that regularly changing passwords can make matters worse: “Regularly changed passwords are more likely to be written down or forgotten.” Basically, having a password written down on a scrap piece of paper is a bad security move because it adds another way for the credentials to be lost or stolen.

Whether you do or don’t ask employees to change their passwords is your prerogative. However, moving forward it would be in everybody’s best interest to focus on additional ways to secure your network, instead of relying solely on passwords. This can be done by implementing multi-factor authentication, which can include SMS messaging, phone calls, emails, and even biometrics with passwords. With additional security measures like these in place, it won’t matter much if a hacker stole your password because they would need additional forms of identification to make it work.

To maximize your company’s network security efforts, contact Eclipse Integrated Systems at 800-340-0505.

0 Comments
Continue reading

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

Twitter recently experienced a major hack where it saw 33 million user login credentials stolen. What may be more alarming than the hack itself is what the stash of stolen credentials reveal about users’ password security habits. Or, to put it more accurately, the lack thereof.

0 Comments
Continue reading

What is your Identity Worth to You?

thumb identityYour identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Business Computing Cloud Network Security Google Hackers User Tips Internet Productivity Business Management Malware Microsoft Software Innovation Efficiency Tech Term Hosted Solutions Computer Backup Email Mobile Devices Business Windows 10 Browser Apps Cybersecurity Communication Smartphones Productivity Managed IT Services Hardware Saving Money Data Internet of Things Data Recovery Smartphone Collaboration Data Backup Passwords Windows Small Business communications VoIP Android Cybercrime Virtualization Data Security Holiday Mobile Device IT Support Workplace Tips IT Services Mobility Business Continuity Users Operating System Microsoft Office Law Enforcement Windows 10 Network Wireless Ransomware Disaster Recovery Outsourced IT IT Support Chrome Office 365 Miscellaneous Cloud Computing Money Password Gadgets Phishing Social Media Mobile Device Management Telephone Systems Wi-Fi Server BDR Update Quick Tips Upgrade Managed IT Services Best Practice Cost Management Google Drive Employer-Employee Relationship Facebook Social Government Health Application App Information Technology Unsupported Software Vulnerability Risk Management Marketing Hacking Politics Patch Management Data Management Managed IT Save Money Sports Work/Life Balance Two-factor Authentication Networking Spam Current Events Office tips Automation Managed Service Provider USB Personal Information Artificial Intelligence Antivirus Proactive IT Alert Streaming Media Shortcut Information Blockchain Computers Bandwidth User Error Identity Theft Managed Service Data Storage Television Business Intelligence Training Encryption Connectivity Router History Word Touchscreen VPN Data Protection Applications Maintenance Compliance End of Support Social Engineering Battery Audit Telephony Humor Company Culture Instant Messaging Save Time Outlook Private Cloud Remote Computing SaaS Commerce Meetings Computer Care iPhone Managing Stress Storage Going Green HaaS Recovery Excel Apple Devices Automobile BYOD Remote Monitoring and Management Gmail Cortana eWaste Tech Support Mobile Computing DDoS Access Control WiFi Legal Medical IT Transportation G Suite Office Mobile Security Search Internet Exlporer Analytics Samsung OneNote Wireless Technology Google Docs Cleaning The Internet of Things Wireless Charging Flexibility Fraud Hosted Solution Adobe Microsoft Word Identity Education Comparison Wireless Internet Hiring/Firing iOS Big Data Touchpad Websites Amazon Trending Microsoft Excel Identities Fax Server Cryptocurrency Authorization Windows 10s Data storage Data Breach Hybrid Cloud Employer Employee Relationship Root Cause Analysis Scalability Edge Value Dark Web PDF Lithium-ion battery Worker Commute Credit Cards Data Privacy Administrator Screen Mirroring Specifications Teamwork Unified Communications Help Desk Benefits Books Data Theft Virtual Assistant Settings File Sharing Language Paperless Office Downloads Solid State Drive Experience Evernote Managed IT Service Computer Accessories Augmented Reality How To Windows Ink Ciminal Healthcare Error Electronic Medical Records Text Messaging IT Management Operating Sysytem Licensing Device Security Wearable Technology Hard Drive Point of Sale Access Cast Sales RAM Certification Smart Technology Computer Fan Uninterrupted Power Supply Computing Plug-In Budget Trends Troubleshooting Hacker Hard Disk Drive Phone System Cables Google Maps Project Management E-Commerce Internet Explorer Microsoft Office 365 Safety Emails IT Solutions FAQ Video Games Avoiding Downtime Travel Chromebook Reporting Unified Threat Management Advertising Retail Microsoft Teams Security Cameras WannaCry Sync Workers App store Chromecast Time Management A.I. Profitability Keyboard Music Virus Voice over Internet Protocol Vendor Management Reputation Files Data Loss IT budget Payment Threat Webinar Charger Tablets Spyware Running Cable Printing Upgrades Conferencing Wearables Updates Analysis Virtual Reality Legislation SharePoint Chrome OS Movies Eliminating Downtime Laptop Proactive Black Market Bluetooth Vulnerabilities Distributed Denial of Service PowerPoint Authentication IT solutions Entertainment WIndows Server 2008 Scam Nanotechnology NFL Google Assistant GDPR Consultant Robot HBO Gifts Bring Your Own Device Worker Relocation Printers Twitter Regulation Cache Windows 7 Remote Monitoring CrashOverride Emergency Monitors Disaster

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login