Techies 4 U Blog

Go beyond the basics of authentication  There are, simply put, three generally accepted methods of authenticating identity: knowledge; possession; and inherence. The first is familiar to everyone in the form of the password, passphrase, PIN, or even the pattern drawn with a finger on some smartphone lock screens; this is also sadly the weakest form of authentication. The knowledge factor relies on something you know, and that's at once its biggest positive and negative.  On the plus side, a user can create (if the login process allows, and all enterprise strength ones should) a truly 'strong' password. I have placed strong within inverted commas for a reason; one person's strength is another's weakness. So, while the user may well think that transposing an “a” for an “@”, and throwing a couple of exclamation marks at their partner's name is strong, a hacker could crack it in less time than it took…

10 Surprising (and Disturbing) Trends Revealed by Google Searches       In the age of Google, it’s not at all surprising to realize that our greatest confidant and holder of our deepest secrets is a simple search bar with a flickering cursor. Free of others’ judgments, we can ask it any question we like, at any time during the day, and get an answer in a fraction of a second. From queries like “What is the meaning of life?” to “What is twerking?” the things we search for on Google speak volumes about the cultural zeitgeist of our times. While this collective consciousness was once the subject of hours of study by philosophers and novelists, today all you need is an Internet connection and a little tool called Google Trends to check our nation’s cultural pulse. At Visme, we got a little curious to see just how much our interests and concerns have…

5 Apps That Will Be Everywhere in 5 Years       So you’re minding your own business one day, talking to a buddy about going to the movies. “Ah, let’s take a cab,” he says. “Do you have Taxidrivr?” Next thing you know, he’s telling you all the marginal advantages it has over Lyft and Uber, how you can choose the preferred odor, talkativeness, and hair style of your driver. You’ve never even heard of it, but then he starts telling you about TixR4Kidz, which lets you buy movie tickets and popcorn before you walk in the theater and even guarantees you a seat not behind Andre the Giant. This app is maybe three weeks old but now your grandmother is using it. Staying hip today is a full-time job. Every month there’s a new app that you gotta have. Some of them fade away, some of them become…

While Vintage is great for the music industry, in IT, it's not the best plan. Lately, hackers have been using passwords stolen from social media accounts years ago to try and access other related social and business accounts. Recent password thefts from Myspace, LinkedIn, and Twitter informed/forced users to change their passwords on those accounts, but what about your other accounts that use the same password? If you were informed of a hack on your account in the past, and you used the same password elsewhere, it's probably a good idea to change that password sooner rather than later. The Best Hack Proof Strategy for your social media accounts is to use Two Factor Authentication (2FA). In its simplest form, 2FA sends a 4- or 6-digit code to your mobile device via SMS that must be entered in as a challenge on the login page after password credentials have been…

Your website is often customers’ first impression of your small business. Here’s how to make sure it’s a good one.       Your company’s website is like your digital calling card—it could be the first interaction a new customer has with your small business. That’s why it’s worth keeping your website up to date and ensuring it makes the best first impression on prospects. Even if you get some help with your website, here are some important do’s and don’ts for small business owners. Follow these guidelines to put your best foot forward and step up your digital marketing game. Do: Make Your Contact Info Easy to Find Make sure to list your address, phone number and operating hours right on the homepage of your website. The easier it is for customers to call and visit your business, the better. Don’t bury that information on another page of the site. Do:…

New EMV initiative results in stores taking on Fraud liability. Is your Store now liable for credit card fraud? Annual costs of card fraud in the US alone are estimated at $8.6 billion per year and is increasing. Fraud is expected to impact mobile payments as well. Prior to October 2015, for most counterfeit card fraud that occurred at retailers’ in-store locations, liability was with the card issuers. Since October 2015, that liability has shifted to the merchants, in certain cases, unless they have replaced or upgraded their card acceptance and processing systems to use chip-enabled devices and applications to process payment transactions.It’s estimated that 40 percent of the world’s cards and 70 percent of its terminals deployed outside the US are already using the EMV standard. Are you Protected?Find out if you are protected from fraudulent liability today! Call 888-953-9224 today for a free consultation.        …

     

Latest Blog Post

Our Location

Headquarters
9549 N. Royston rd.
Grand Ledge, MI 48837
Get Directions

Refer a friend

Help your friends get the best solution for their IT problems and needs and earn a discount on your next invoice!

Find out more