Information Technology News & Information Tech Tips
target-immediate-impact

10 Tips to Cut IT Costs – Target Immediate Impact

Hammett Technologies prides itself on its ability to offer businesses a cost-effective way to manage their IT department. Each of our technicians are trained professional who managed, assist, and guide you and your business on ways to increase security, functionality, and efficiency, without breaking the bank. We wanted to share with our readers ways that you can help your business cut down on IT costs. Over the next few weeks, will we outline ten (10) useful tips that will help you save money, without degrading the quality of the IT Department. Target Immediate Impact When it comes to cutting costs and saving money, the first thing CIOs should look for is unnecessary costs and subscriptions. It is relatively easy for businesses to overlook these small subscriptions, some of which may only come in at $100+ a month. However, when there are multiple subscriptions, the costs can be staggering, often without one realizing. Therefore, your first step to cutting down costs of your IT department should be to look for subscriptions or quarterly licenses that are no longer needed. While doing this it is important to not go overboard. If the removal of said subscription or license could result in weaker security or possible corruption of data, do not, under any circumstance, remove those programs from your expenses. If information were to become corrupted or stolen, the cost of having the data restored or dealing with the fallout of a lawsuit is far more expensive than keeping the software in the first place. Why Hammett Technologies Hammett Technologies prides itself on its ability to maintain a healthy, state-of-the-art, IT Department without cutting corners and without breaking your business’s bank. We ensure that your company is only spending what it needs to spend for its IT Department, with no hidden costs and complete transparency. We break down every payment and all your options so that you, not only know what you are paying for but also understand how it will impact and improve your business. Hammett Technologies is a team of dedicated individuals that want to help you, and your business, grow and thrive.

Information Technology News & Information Services Tech Tips
time-to-upgrade

It’s Time to Upgrade Your Cybersecurity Defense

As businesses become more and more connected to the internet, the threat of a data breach only increases. A study conducting by the University of Maryland in 2017 discovered that, on average, computers with internet access are attacked every 39 seconds. While this figure may be worrisome, this should come as no surprise to most. As technology continues to progress, becoming more and more a part of not only businesses but individual’s lives as well, criminals will try harder and faster to obtain access to confidential information. These attacks are not cheap either. A study conducted by IBM found that on average, a cyberattack can cost $3.86 million. This number does not just reflect the damage the breach cost, but it also factors in loss of business, time spent on recovering, and damage to reputation. Taking steps to prevent an attack from happening is imperative. One must have the proper equipment and policies set in place in order to counter cyberattacks. However, attackers are becoming smarter, more resourceful, faster, more aggressive. Many of them are also playing the long game as well. Lying dormant in a companies, or individual’s computers or server, waiting for the perfect moment to attack. While cyber security specialists are doing there best to stay 1-step ahead of criminals, there is only so much that can be done. Therefore, instead of playing a game of cat and mouse with attackers, cyber security specialists should be turning their attention towards using machine learning and AI to aid them in this constantly evolving battle. Why Machine Learning and AI Should Be Recruited Cybersecurity usually relies on methods of created static rules and policies that act as barriers to attackers. These barriers, regardless of how strongly built, are susceptible to cracks and leaks, allowing for unwanted guests to enter. This creates a constant game of catch up, rather than enforcing constant protection. This is especially true since cyber criminals are constantly evolving their viruses, making them stronger and harder to detect. If rules are not kept up to date, and scheduled maintenance is not regularly done, disaster can strike at any moment. Machine learning and AI can help level the playing field. Even though cyber security specialists will remain as the last line of defense against attacks, AI and machine learning can be used as the first line of defense. AI and machine learning are constantly updating and learning, feeding off information from databases about cybersecurity and networking, as well as information from its experiences while deployed. AI and machine learning add automation to your cybersecurity team, aiding them in evolving and keeping your data safe from criminals. Hammett Technologies is specialized in cybersecurity, using only the latest cybersecurity software and hardware to keep your data safe. When you partner with Hammett Technologies, you hire a partner who learns your employees, your business, and your process.

Information Technology News & Information
breach-confidentiality

How to Safeguard Your Company Against Ransomware Attacks

Ransomware is one of the most dangerous computer viruses in the computer world today. It would not be surprising if many of you, regardless of your background knowledge of computers, have heard of ransomware to some extent. Perhaps it has been through the numerous cities that have been hit, or maybe it was because of the few schools that have begun to be targeted by this disastrous virus. With ransomware on the rise, more and more businesses are being targeted. In order to keep your business’s sensitive information safe, taking preventative measures immediately is the best course of action to ensure your computer systems are not held for ransom. Setting up your Defenses Running Backups One of the most important steps, one often disregarded by many businesses, is ensuring that all computer systems are backed up daily. In the event that your network becomes infected with ransomware, having backups of critical information systems and configurations can save millions of dollars in lost revenue. Educate and Reinforce Basic Cybersecurity Awareness Ransomware needs a human element in order to infect a computer system or network. Therefore, proper and regular training of staff on how to spot phishing emails and suspicious files is essential to a business’s overall cybersecurity. Ensure that staff understands “think before click” and the dangers of downloading attachments from unknown senders. Make sure staff are browsing safely as well and know how to spot fake websites. Fake websites can look strikingly similar to the real ones but often have variations in their URL, which give away their true identities. Make sure employees are suspicious of anyone on the phone or email asking for sensitive information. Always ensure you are communicating with a trusted individual before divulging sensitive information. Have a Plan in Place in the Event of an Attack Make sure a clear plan is established in the event an attack does occur. Ensure response plans outline how to request outside assistance from cyber first responders (state agencies, CISA, and MS-ISAC). Update and Patch Systems Regularly updating and patching computer systems not only keeps the systems running smoothly, but it also protects against viruses such as ransomware. Additional Resources Once all the above is completed, consider reviewing the following articles: MS-ISAC Security Primer – Ransomware CISA Tip Sheet on Ransomware NGA Disruption Response Planning Memo NASCIO Cyber Disruption Planning Guide Each article outlines further steps you can take to protect yourself from ransomware. A Trusted Defense If any of the above worries you, consider calling Hammett Technologies. We are a trusted IT company and are well versed in the dangers of all computer viruses, not just ransomware. We use only the latest technology to ensure your business’s safety, regularly backup all your systems, and train your staff on safety procedures when handling information online. When you partner with Hammett Technologies you do not become just a partner, you become a priority. If you want more information as to what we can do to assist your company, click here!

Information Technology News & Information
employees-need-to-know-about-pishing-attack

What Employees Need To Know About Phishing Attacks

Phishing is just one of many tools in a hacker’s repertoire and happens to be one of their most effective.  Through phishing, hackers dangle their bait in front of preoccupied employees who would never dream that their PC could provide an open door for a hacker.  That’s why it is so important that employees understand how phishing works, how costly it can be, and what they can do to avoid letting themselves become an unwitting accomplice to a hacker’s attack on their company.   The Nature of Phishing Phishing involves a malicious entity that sends out emails that look like they are from reputable, well-known companies (maybe even the employee’s own employer) – but these emails are not what they seem. Sometimes the purpose of a phishing email is to trick the recipient into revealing information such as logins, passwords, or personal information. Other times, phishing emails are used to install malware on the recipient’s computer. Once the hacker behind the phishing attack has succeeded in infiltrating the target system via login information or malware, the damage they cause quickly escalates. Phishing Can Be Very Costly So how expensive can phishing be?  Well, consider what happened to a bank in Virginia that fell victim to two phishing attacks in just eight months. Their disaster began when an employee received and opened a phishing email which succeeded in installing malware on company computers.  The malware was able to use the victim’s computer to access the STAR Network, a site used to handle debit card transactions.  Through the STAR Network, the hackers behind the malware were able to steal $569,000 in that one incident alone. But that wasn’t the end of the matter.  Eight months later, even after hiring a cybersecurity forensics firm and following their advice to better secure their system, the same bank was victimized again through another phishing email.  This time, the hackers again gained access to the STAR Network, but then used the bank’s Navigator system.  Through those systems combined, the hackers were able to credit money to various bank accounts and then withdraw the money using hundreds of different ATMs.  Losses from this incident amounted to almost $2 million. To make matters even worse, the bank’s cyber insurance provider denied coverage and the bank is now forced to pursue a lawsuit to recover their losses. The Very Real Dangers Of Phishing Attacks Phishing wouldn’t be so effective if it wasn’t so easy for busy employees to fall victim to seemingly legitimate emails or innocent-looking attachments.  The malware that was used to initiate the first attack on the bank discussed in this article was embedded in a Microsoft Word document.  Most of us have worked with thousands of Word documents during our careers and have never been victimized by one – but it only takes one time to cost a business millions of dollars. In this case, once that document was opened, the malware was installed and the group behind it had access to what they needed. The bank in question hired Verizon to investigate both incidents. It was finally determined that the same group of Russian hackers were likely responsible for both attacks. Common Sense Required Even the most powerful of cyber security systems is still susceptible to attacks that take the form of phishing or social engineering. As long as people continue to subscribe to the view that firewalls, anti-virus, and anti-malware systems provide all the protection against cyberattacks that a company needs, then successful phishing attacks will continue. Education is one of the forgotten keys to foiling phishing attacks. Employees need to be taught how to recognize a suspicious email and be given real-world examples of how convincing phishing emails can appear.  They need to be encouraged to view both emails and attachments with a critical eye.  Employees must also understand that, under no circumstances, is there a legitimate reason for someone to ask for their password. Another aspect of this type of education is making sure that people realize that the targets of phishing are not C-suite executives or IT technicians, but employees from all levels.  Through a connection to the company’s network, any employee’s computer could serve as a launching pad for an industrious hacker’s plan of attack. Conclusion Phishing attacks are a reality that must be addressed if a company wants to avoid becoming a victim.  These attacks often result in very expensive losses that may not be covered by insurance.  While the importance of a rigorous cyber security system is never to be overestimated, neither is the importance of employee education.  Too many employees have unwittingly become accomplices in costly cyberattacks because they didn’t recognize a phishing email and never thought they could be the target of one.  The first line of defense against phishing isn’t a network firewall, but a trained employee who knows how to recognize a suspicious email or a questionable attachment.

Information Technology News & Information Tech Tips
taking-a-screenshot-on-windows-10

Taking a Screenshot on Windows 10

On a Windows machine, there are multiple ways of taking a screenshot. However, there are plenty of users who are still unsure of how to do so. Today we will review a few ways Windows users can take a screenshot on their PC. Snipping Tool Since 2002, Microsoft has implemented the snipping tool into its Windows machines. The tool is simple to use and allows users to capture their screen! However, Microsoft hides this tool from plain sight, leaving the tool undetected to new users. Navigate to the Start Menu Type “Snipping Tool” Select “New” and begin capturing your screen! Once you have selected “New”, a white filter will appear over your screen. Click and drag your mouse across the area you wish to capture.   Microsoft has confirmed that in a future update, the Snipping Tool will be getting a new home! Snip & Sketch, very similar to the Snipping Tool, has an improved user interface (UI) and a built-in shortcut to activate it on Windows 10 machines (Windows Key + Shift + S). However, it is important to note that Snip & Sketch is still in development, therefore bugs may still be present in the software. To launch Snip & Sketch, either use the shortcut (Windows Key + Shift + S) or search for in the Start Menu (Figure 1).Figure 1Figure 2 Using the shortcut will allow you to immediately begin taking a screenshot. Searching for the program in the start menu will bring you to a home screen for Snip & Sketch (Figure 2). If you choose to search for Snip and Sketch in the Start Menu, the steps are the same. Simply choose “New” and begin to capture the desired area of your screen. Third-Party Apps While the built-in screen capture tools are nice, there are some third-party applications that I find to be much more reliable and easier to use. For example, Greenshot is a free, lightweight, program that is great for screenshots. In fact, its how I built this guide! Download Greenshot from their website: https://getgreenshot.org Once downloaded, either navigate to your system tray (“ ^ “ icon on the bottom right of your screen) and locate the Greenshot application. A shortcut is also available after installing Greenshot. Simply press the “PrntScr” key on your keyboard to enable immediate screen capture. You may have to press and hold the Function Key “Fn” on some keyboards in order to activate “PrntScr”. Once you have click on the Greenshot application in your system tray, a menu will appear with a list of options. Select “Capture region” to begin your screen capture. If any of the above confuses you, please do not hesitate to reach out to us with questions! We are more than happy to help! We have techs standing by to assist you with the day-to-day operations of your machine! If you are curious as to how we can assist your company to grow, click here!

Information Technology News & Information
it-helps-dementia-patients

IT Helps Dementia Patients

Dementia and Alzheimer’s are scary for both patients and caregivers. Right now, there is no cure. Scientists are trying to find ways of prolonging patient’s lives and delaying the onset of the disease. IT Technicians are finding ways to make lives better and caring for patients easier. Some remarkable work is doing things for these individuals that has never been seen or done before. First, A Word About The Disease According to Alzheimer’s International, nearly 44 million people worldwide have Alzheimer’s or related dementia. More than 5 million American’s are living with it, and Between 2017 and 2025 every state is expected to see at least a 14% rise in the prevalence of Alzheimer’s. Those statistics are startling, especially since Alzheimer’s disease is irreversible. Accounting for around 70 perfect of dementia cases, Alzheimer’s Disease is the most common cause of dementia, a group of brain disorders that results in the loss of intellectual and social skills. These changes are severe enough to interfere with day-to-day life. It progressively destroys the brain and ruins memory and thinking skills, and eventually the ability to carry out the simplest tasks. A Few Other Statistics In 2017, Alzheimer’s cost the United States $259 billion. By 2050, costs associated with dementia could be as much as $1.1 trillion. The global cost of Alzheimer’s and dementia is estimated to be $605 billion. Alzheimer’s is the 6th leading cause of death in the United States. Between 2017 and 2025 every state is expected to see at least a 14% rise in the prevalence of Alzheimer’s. By 2050, it’s estimated there will be as many as 16 million Americans living with Alzheimer’s. Every 66 seconds someone in the United States develops Alzheimer’s. 1 in 3 seniors dies with some form of dementia. Technology at its Finest Because of these sad stats and high numbers, IT experts have come up with some amazing devices that use modern technology to aid in the care of people suffering from memory problems. Here’s a look at a few of the latest innovations. Clocks Clocks precisely intended for those with Alzheimer’s and dementia can help ease the stress associated with day to day life. Someone who has dementia may confuse night and day so an easy to read clock can help them to better tell the time. Medication Management Medication management technology created high tech automated pill dispensers which beep and open to remind caregivers and those with dementia to take their medicine. Vibrating alarms on a watch have also been fashioned to remind when it’s time for a pill. This technology serves the busy caregiver well by helping them not to forget medication time as well. Video Monitoring Video monitoring technology supports both care recipient and caregiver, by allowing both people more freedom. The patient doesn’t feel watched constantly because loved one can spend a little time away, and loved ones get the comfort of being able to see their family even when they’re not in the same house. GPS Location and Tracking Devices People with Alzheimer’s or dementia may wander. Tracking devices can be worn by the person in some way and have alert systems that let a caregiver know if their loved one has left a certain area. This type of technology can also alert emergency personnel to aid in a quick recovery. Picture Phones Picture phones are specifically designed for people who cannot remember phone numbers. These phones have large numbers and are pre-programmable with frequently called phone numbers. Some of the phones come with clear buttons where photos can be placed so that the person can just push the button associated with the photos to call their loved one quickly. Electrical Use Monitoring This device monitors a patient’s use of electrical appliances. It plugs into a wall outlet or power strip and will alert caregivers if their commonly used appliances have not been turned on or off. Wearable Cameras Wearable cameras and augmented reality glasses could be the next big thing in helping patients. These devices can take hundreds of pictures every day from the user’s point of view logging their lives in this way. A Village of Care In Kitchener, Ontario, something wonderful is happening. Facilities have been designed to be less institutional-looking, friendlier and homier. “Schlegel Villages” is one of the first of its kind and is improving the quality of life for the people that live there. One problem they deal with though is when at-risk seniors become confused and attempt to leave. According to Schlegel’s IT director, Chris Carde, “Some seniors with certain types of mental illness can remember the door-lock code to get out but can’t remember anything else. A confused senior wandering out into a southern Ontario winter can be a serious, even fatal, incident”. Schlegel Villages is also implementing an e-health system to replace paper charts at its care facilities. Carde states, “Nurses would have to write down a patient’s vital signs, then enter them into a desktop computer some distance away. The new system, which will use iPads and iPad minis to enter health information directly into the database, is being greeted warmly by clinicians”. Thinking Outside of the Box A German senior center applied the idea of using fake bus stops to keep Alzheimer’s disease patients from wandering off. Because their short-term memory is not intact, but their long-term memory works fine, they know what the bus stop sign means, and they stop. It is a huge success in Germany, now they want to bring it to several clinics in North America. A Final Word Thanks to these researchers and IT innovators, the future is much brighter for patients with memory diseases and their families and care providers. This is just the beginning when it comes to making life easier. Information Technology has only just begun to scratch the surface of what can be done to help in the fight against dementia and Alzheimer’s.

Information Technology News & Information
why-you-should-care-about-hipaa-compliance

Why You Should Care About HIPAA Compliance

If you are in the health care business, chances are you have heard the phrase “HIPAA Compliance” before. However, what you may not know is how truly important HIPAA Compliance is for your business, or even what HIPAA Compliance is. No need to worry; Hammett Technologies is here to help! What is HIPAA Compliance HIPAA or the Health Insurance Portability and Accountability Act was is a set of rules and restrictions established to outline the lawful use and disclosure of Protected Health Information (PHI). *a more complex outline of HIPAA can be found here: https://www.hammett-tech.com/how-we-protect-you/hippa-compliance/ Why Being HIPAA Compliant Is Important If you are in the healthcare business, there are numerous reason you should be HIPAA Compliant. From lawsuits to fines from the government, HIPAA Compliance is to be taken seriously and followed completely. Some of the most important reason to be HIPAA Complaint are: Fines Fines for not meetings HIPAA Compliance have increased substantially. These caps on these fines have increased from $25,000 per year to $1,500,000 per year. Furthermore, if you ignore HIPAA Compliance and encounter a breach or receive a complaint, your business can be investigated for breaches, compliance failures, and other issues which can lead to further fines. Other Organizations Other organizations that work with you are most likely HIPAA Compliant themselves, especially if they are a larger corporation. Each Business Associate or Covered Entity your healthcare business works with must following HIPAA Privacy and Security Rules. This, in turn, means that if your business if not HIPAA Compliant you will lose their assistance, as well as, lose business in general. Blacklisted If a breach does occur, and the breach results in more than 500 individual’s Protected Health Information being affected, your business is required by law to report it to the Health & Human Services Department, as well as, the public and media. Other companies will not hold back comparing their HIPAA Compliant organization to yours, stealing both business in the present and future. If you are fearful that you do not meet all the HIPAA guidelines and regulations or are having trouble understanding HIPAA Compliance and how to become compliant, call Hammett Technologies! We have a devoted, professional IT team that can help you meet all HIPAA requirements stress free! HIPAA Compliance is essential for any business that handles Protect Health Information. Hammett Technologies will ensure that your business meets every requirement.

Information Technology News & Information Tech Tips
upgrading-from-windows-7-to-windows-10

Upgrading From Windows 7 to Windows 10

Microsoft is pulling the plug on its widely loved operating system (OS), Windows 7, in January 2020. Therefore, it is important that you know how to upgrade to their latest OS, Windows 10. Why should you upgrade? Well, when Windows 7 gets discontinued, Microsoft will no longer offer support or update the OS, leaving you vulnerable to exploits and other security risks.  Those of you that are worried that Windows 10 will have a steep learning curve, fret not! Windows 10 is very similar to its older brother Windows 7. I have to admit, there are a few differences between the two, such as Windows 10’s revamped settings panel, and the new start menu. However, if you are worried that Windows 7 and Windows 10 would be polar opposites like Windows 7 and Windows 8, rest easy, nothing could ever be that bad again. This guide aims to ease you through upgrading your OS. Once you finish with these steps, you’ll be well on your way to Windows 10! Check List Minimum Requirements for Windows 10 If you are worried you may be on this list, think about the following question. Did you purchase your computer after 2014? If you answered yes to this question, chances are your machine is more than capable of running Windows 10. For those of you running older machines, consider purchasing a new computer. Many of them come preloaded with Windows 10, and besides the upgraded OS, you will also be greeted with high speeds, better resolution, and overall better user experience. Processor 1GHz or Faster CPU or System on a Chip (SoC) RAM 1GB for 32-bit or 2GB for 64-bit Hard Drive Space Existing installations: 16GB for 32-bit or 20GB for 64-bit. Clean installation or new PC: 32GB or larger Graphics DirectX9 or later with WDDM 1.0 driver Display Resolution 800 x 600 Network Wi-Fi or Ethernet connection Before upgrading it is also important that you have the latest version of Windows 7 installed on your machine as well. Be sure to check for updates on your machine and to download the “Windows 7 Service Pack 1” if you do not have that already installed on your machine. Also, and it pains me to say this to you if you have waited this long to upgrade to Windows 10, it is no longer free. However, online retailer Newegg will make the upgrade expense less painful for you by offering both the Home edition and Pro edition of Windows 10 at a discounted price! The cost of a new Windows 10 license goes for $109.99 (Home) and $149.99 (Pro) on Newegg. Furthermore, make sure you have an up-to-date backup or system image of your computer before upgrading. Microsoft has certainly improved in its upgrade process, but it is better to be safe than sorry. Follow this guide on Bleeping Computer to learn how to create a backup of your Windows 7 computer! One last thing, I promise. Before you start, it is recommended that any anti-virus software you have installed be removed as this can sometimes cause interference with this upgrade. Make sure that all peripherals are also unplugged from the computer while it is updating, as these too can sometimes cause errors. Upgrading Download and Install the Media Creation Tool Make sure you have your Windows 10 license activation code ready Double-click on the MediaCreationTool.exe to begin the Windows 10 upgrade setup Accept the licensing agreement Select “Upgrade this PC now” option and the necessary files will begin downloading to begin the upgrade. Once finished, click Next Enter your valid Windows 10 product key (Home or Pro) Select Next Accept the licensing agreement Select “Keep personal files and apps” option Select Install Are you wondering what Hammett Technologies can do to continue to help your company grow? Our team of trained professionals works diligently to ensure that your network continues to run smoothly and securely! Click here to learn more about what we do!

Information Technology News & Information Tech Tips
creating-a-strong-password

Creating a Strong, Secure Password

If you are like many users, you visit many different sites and have a plethora of passwords between those sites. The idea of creating a strong password consisting of letters, numbers, special characters, symbols, etc., can be quite daunting. Not to mention it is recommended that you have a different password for each site your register an account on. With all of this considered, it is no wonder many become overwhelmed when trying to think of a secure password. I mean, who can remember “J%^dh@udS!@#$”? Because of this, you may have fallen victim to using the same password for most, if not all, of the websites you hold an account on. This is not only a safety hazard, it also spells disasters if one of these websites gets compromised. Or perhaps you use numerous passwords, but they consist of simple words and numbers that relate to your life. These kinds of passwords are easier to guess than you can imagine. Maybe you do have long, complicated passwords, but in an attempt to remember them you have written them down and placed them next to your computers. This is dangerous as well, especially if other use your computer as well! However, with this guide, we hope to guide you down the right path to making safe, secure, and easy to remember passwords! First, to understand what a strong password is, we must understand what makes a password strong. The key features of a strong password are its length, a variety of letters (using both upper and lower case), symbols, and numbers. Make sure you leave all personal information out of your password. However, what is the use of a complicated strong password, if you cannot remember it? Not to worry, we will arm you with advanced password creating techniques that will not only keep your online identity secure! Your first strategy in creating a strong password is to make it easy to remember but hard to guess. Avoid the pitfalls of making your password “password”.  This password is laughably weak. A password this simple is easily guessed by both humans and machines and will leave your online identity in shambles. Some of you may be asking, “Who on Earth is using “password” as a password?”. Well you would be surprised to know that it is one of the most commonly used passwords to date. There are also the passwords that use a persons last name and birth date. These kinds of passwords are also easy to crack by those who are close to you. I know your neighbor Bill seems like a nice guy, but maybe he’s too nice. However, perhaps you have been trying to make a strong password and have created “P0W3Rful”. First you must be aware of the length. Length of this password is far to short and the substitutions you have made are easily guessed by both human and machine as well. Now that we are aware of the numerous pitfalls, we can begin to discuss how to create a strong password! Here are a few examples of good passwords: G00D_2H4v3_$$: You could use this one for a bank account (Good to have money). 4sh00Ping_0NAMZ: This could be used for your Amazon account (4 shopping on amazon). Having now thought of a password that is perfect in length and randomness, you have begun your march down the correct path to internet safety.  However, you are not safe yet. You must remember to not reuse the password, write them down anywhere, or share them. After spending all that time thinking of a good password, last thing you want is for someone to crack it by seeing it written down next to your computer. Or if you are to get hacked, at least you can rest easy knowing your other accounts are still locked away because you used a different password for each site! The last rule is extremely important but can also be given some slack. If you are to share your password, make sure that you only do so with someone you trust 100%. If you have even a shred of doubt that they do not take internet security as seriously as you, do not share your password with them.  Another option for those who have too many accounts, or are too nervous to create their own passwords, is to use a password manager! Password managers like LastPass can generate completely random passwords up too 100 characters in length. All you must do is think of a super secure master password and you are ready to go! Now that you have been armed with the tools to create smarter, safer passwords, go forth and secure your defenses! If you have any questions about cyber security or want a partner that will take your businesses cyber security seriously, consider Hammett Technologies! At Hammett Technologies we put your online security as a top priority. Be with a team you can trust, become a Hammett Technologies Partner today!    

Information Technology News & Information
our-national-cyber-security

Our National Cyber Security is at Risk but You Can Help

As the demand for experienced cyber security workers increases, our national security decreases. Some analysts believe that by as early as next year there could be a global shortage of cybersecurity professionals. With cyber-attacks becoming an increasing threat, enlisting and training a new generation of well-versed cyber security experts, as well as training current workers in the field, will aid in not only restoring the confidence of those who use the internet, but those who are just starting to experience the world wide web. Rebuilding our defenses online is the first step to a stronger, more confident nation. Some of you may be wondering what you can do to help, and the answer is simple! The National Cyber Security Alliance and the U.S. Department of Homeland Security both urge parents, teachers, and employers to motivate potential talent to pursue a career in cyber security. A cyber security professional needs an understanding that goes deeper than just math and technology. They need to be curious, passionate about learning, have a strong ethic and moral compass and be aware of the risks that come with the job. While all these ideas play an important role, at the end of the day, a profession in cyber security means having a passion in keeping our online world more secure and safer for all. To those who are worried about a boring job, fret not, for you will be at the front lines. While cyber security experts are behind the scenes, the roles they play impact our digital lives in big ways. Cyber security experts tackle catastrophic issues before they can detonate, causing massive issues for the internet. This profession is dedicated to protecting those online, keeping them more secure and safer from any threats they may face. A profession in cyber security builds important team-based skills and provides an environment for one to continue to learn and improve in skill. If you believe your student or child to be interesting in cyber security, there are steps you can take to aid them! You could volunteer at school or set up community workshops that help to teach children and adults about online safety and a career in cyber security. Try exposing students or your children to the opportunities in the field of cyber security by hosting an open house at your company to talk about what your cyber security department does. Inspire children to learn about cyber security by mentoring a team in a cyber challenge or hosting events and after school programs. Work with schools or community organizations to create an internship program for hands-on learning. For parents, become knowledgeable about the educational steps to a career in cyber security and about organizations that host events for cyber security. For those in college searching for a job in cyber security, get credentials. Four out of five cyber security jobs require a college degree. Do volunteer work and internships so that you can become more experienced in the field itself. Offer help to you IT professors at college or employer to gain more experience. Read about the latest advancements and breaches regarding cyber security. Pay attention to how these breaches occur and how they were fixed. If you are interested but not sure if cyber security is right for you, take a look at the National Initiative for Cyber security Careers and Studies (NICCS). NICCS has career resources for learning more about jobs in the field, as well as guides for learning about how to join a cyber security team! At Hammett Technologies we put your online security as a top priority. We treat your network as our own, with regular maintenance and updates to keep your company’s data secure. Be with a team you can trust, become a Hammett Technologies Partner today! Still curious as to what we can do to help your company grow? Click here to find out more!