croom new

Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the New Jersey area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do Browser-Saved Passwords Stay Secure?

Do Browser-Saved Passwords Stay Secure?

One of the best things about computers is that there is always a new way to make something easier: automation decreases a workload, their processors can calculate much faster than the human brain can, collaboration with coworkers becomes almost effortless, and your web browser can even remember your passwords! However, you have to ask yourself: is the ability to save your passwords in your browser really a great idea?

0 Comments
Continue reading

Sexy Scam Relies on Your Belief that Someone Was Watching

Sexy Scam Relies on Your Belief that Someone Was Watching

Internet scams are major threats to individuals and business because all it takes is one wrong click of the mouse and a user is embroiled in an unenviable situation. One such scam that is happening today is designed to catch users with their pants down, so to speak.

0 Comments
Continue reading

Is Your Password Security Up to Par?

Is Your Password Security Up to Par?

Passwords are all over the place these days, whether they’re required to access an online account, or access the devices used to open these accounts. While both types of passwords can make for ideal security conditions, this is only the case if the passwords are strong. If your passwords can be guessed by just about anyone, can you really call it a security measure? New insights from SplashData show that passwords aren’t being considered as much as they need to be.

0 Comments
Continue reading

eBay Revamps Security Protocols. Should Your Business Follow Suit?

eBay Revamps Security Protocols. Should Your Business Follow Suit?

As technology advances and allows for common pain points to be corrected, many of today’s most well-known entities will adopt new solutions to ease the experience of their customers and clients. Take, for example, eBay. The famous reselling site has been taking steps to install an assortment of new features to improve its customers’ experience.

0 Comments
Continue reading

Tip of the Week: Why Routinely Changing Your Password May Be a Bad Idea

Tip of the Week: Why Routinely Changing Your Password May Be a Bad Idea

You’ve heard it said that it’s a best security practice to routinely change your passwords. The idea here is that, if a password were stolen, then it would lose its value when the user goes to change it. While this sounds like solid logic, new research shows that it may actually be better NOT to change your passwords.


This may be a hard pill to swallow for IT administrators who have always required users to change their passwords every few months or so. However, seeing as this practice could make accounts less secure, it’s worth considering.

The idea behind this theory is that, whenever a user goes to change their password, they’re often rushed or annoyed and end up creating a new password that’s less secure. The Washington Post puts it like this: “Forcing people to keep changing their passwords can result in workers coming up with, well, bad passwords.”

Think about it, how often have you changed your password, only to change it from a complex password to one that’s easier to remember? Or, have you ever kept the same password and just added a number at the end of your new password? This covert move will do little to deter a hacker. Carnegie Mellon University researched this topic and found that users who felt annoyed by having to change their password created new passwords that were 46 percent less secure.

Plus, let’s consider the hypothetical situation of a hacker actually stealing your password. Truth be told, once they’ve gotten a hold of your login credentials, they’ll try to exploit the password as soon as they can. If they’re successful, they’ll pose as you and change the account’s password, thus locking you out of it. In an all-too-common situation like this, the fact that you’re scheduled to change your password at the end of the month won’t change anything.

Additionally, ZDNet points out yet another way that regularly changing passwords can make matters worse: “Regularly changed passwords are more likely to be written down or forgotten.” Basically, having a password written down on a scrap piece of paper is a bad security move because it adds another way for the credentials to be lost or stolen.

Whether you do or don’t ask employees to change their passwords is your prerogative. However, moving forward it would be in everybody’s best interest to focus on additional ways to secure your network, instead of relying solely on passwords. This can be done by implementing multi-factor authentication, which can include SMS messaging, phone calls, emails, and even biometrics with passwords. With additional security measures like these in place, it won’t matter much if a hacker stole your password because they would need additional forms of identification to make it work.

To maximize your company’s network security efforts, contact Eclipse Integrated Systems at 800-340-0505.

0 Comments
Continue reading

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

Twitter recently experienced a major hack where it saw 33 million user login credentials stolen. What may be more alarming than the hack itself is what the stash of stolen credentials reveal about users’ password security habits. Or, to put it more accurately, the lack thereof.

0 Comments
Continue reading

What is your Identity Worth to You?

thumb identityYour identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Network Security Internet Google Hackers User Tips Malware Productivity Business Management Software Microsoft Tech Term Efficiency Hosted Solutions Innovation Backup Computer Browser Windows 10 Business Apps Cybersecurity Email Smartphones Mobile Devices Productivity Managed IT Services Smartphone Internet of Things Saving Money Data Recovery Windows Data Backup Hardware Communication Small Business Cybercrime Virtualization VoIP Collaboration Holiday Android communications Operating System Law Enforcement Microsoft Office Data Security Wireless Ransomware Disaster Recovery Network Passwords Mobile Device IT Support Workplace Tips Business Continuity Mobility IT Support Data Users Cloud Computing Miscellaneous IT Services Outsourced IT Phishing Chrome Wi-Fi Social Media Server Office 365 Mobile Device Management Telephone Systems Windows 10 Update BDR Quick Tips Password Money Gadgets Social Facebook Cost Management Employer-Employee Relationship Application App Health Government Information Technology Vulnerability Upgrade Unsupported Software Best Practice Risk Management Google Drive Work/Life Balance Managed IT Networking Current Events Automation Office tips Proactive IT USB Spam Alert Artificial Intelligence Antivirus Managed Service Provider Information Computers Blockchain Shortcut Identity Theft Hacking Streaming Media Patch Management Data Management Bandwidth Politics User Error Save Money Marketing Managed IT Services Sports Two-factor Authentication Private Cloud Audit Save Time Excel Company Culture Recovery Storage iPhone Managing Stress HaaS BYOD Devices SaaS Commerce Meetings Remote Monitoring and Management Gmail Automobile Computer Care Tech Support Cortana Access Control Personal Information Going Green Apple Medical IT Transportation Legal Mobile Security Internet Exlporer eWaste Wireless Technology Wireless Charging Search The Internet of Things Google Docs Analytics WiFi Office Hosted Solution Fraud Mobile Computing DDoS Data Storage Flexibility Managed Service Business Intelligence Cleaning Connectivity Samsung OneNote Data Protection Encryption VPN Word Router History Compliance Social Engineering Applications Maintenance Telephony Humor Television Outlook End of Support Battery Training Touchscreen Remote Computing Cast Sales How To Hard Drive Benefits Access Licensing Device Security Text Messaging RAM Certification Uninterrupted Power Supply Operating Sysytem Teamwork Computing Plug-In Solid State Drive Budget Point of Sale Trends Troubleshooting Settings Electronic Medical Records IT Solutions FAQ Internet Explorer Microsoft Office 365 Computer Accessories Augmented Reality Google Maps Project Management Phone System Cables Avoiding Downtime Retail Chromebook Reporting Smart Technology Computer Fan Travel Microsoft Teams Security Cameras Video Games App store Hacker Hard Disk Drive Chromecast Sync Workers Advertising Wearable Technology A.I. Profitability Virus Voice over Internet Protocol Safety Emails Files Charger Threat Data Loss IT budget Music Conferencing Reputation Printing WannaCry Tablets Spyware G Suite Wearables Unified Threat Management Analysis Keyboard Updates Movies Eliminating Downtime Laptop Legislation Proactive Webinar WIndows Server 2008 Virtual Reality PowerPoint Authentication Vendor Management HBO Gifts Black Market Google Assistant GDPR Robot NFL Entertainment Bring Your Own Device Upgrades Comparison Identity Adobe Microsoft Word Running Cable Wireless Internet Touchpad Healthcare SharePoint Websites Amazon IT solutions Trending Data Breach Education Authorization Data storage Microsoft Excel Identities Big Data Credit Cards Value Dark Web Scam Nanotechnology Lithium-ion battery Edge Bluetooth Distributed Denial of Service Hybrid Cloud Consultant Screen Mirroring Specifications Scalability Data Privacy Hiring/Firing iOS Administrator PDF Worker Commute Unified Communications Help Desk Data Theft Virtual Assistant Windows 10s Evernote Downloads File Sharing Language Books IT Management Instant Messaging Error Employer Employee Relationship Root Cause Analysis Windows Ink Ciminal Experience Fax Server Managed IT Service Regulation Cache Remote Monitoring Emergency CrashOverride Disaster Monitors Worker Printers Relocation Twitter

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login