Monthly Archives: February 2012

Beyond Passwords: Online Identity Standards

Virtually everyone’s been stuck one time or another trying to remember a online password and thought, “There has to be a better way.” A recent article in our newsletter talks about the problem and suggests tricks to make it a little easier to deal with. But although a lot of smart people have tried to figure out a safe, reliable, and more convenient system, nobody’s come up with one yet. Now, however, the US Government has decided to gently encourage efforts. In the spring of last year, the Obama Administration announced the National Strategy for Trusted Identities in Cyberspace, NSTIC. Like the National Broadband Plan, it’s not legislation or even regulation. Instead, NSTIC is a hopeful collection of idealistic principles and goals to promote development rather than a concrete plan with real funding and hard, measurable results. Nevertheless, many agencies and corporations are very interested. It’s easy to see why. Identity theft has become a major problem, costing millions each year, and passwords remain the weakest link in cybersecurity. Commerce might also be helped if you could buy books on Amazon with your Google account or download tax forms from iTunes. And public safety would benefit if your child could be automatically denied entrance to adult websites, or doctors could check in online to help provide medical services after a disaster. The dream is to build a safe method of sharing relevant sensitive information about users with online entities while … Continue reading

Posted in News, Security | Tagged , , , , | Comments Off

Don’t bother backing-up your computers
(unless you’ve actually tested recovery)

This post is from guest blogger Peter H. Mantos of Albuquerque business consultancy Mantos Consulting, Inc.  (Also a long-time SWCP customer) The business community is well aware of the need to backup critical computer systems. However, very few small businesses have actually tested their backup system by performing a recovery. Business managers operate under a false assumption that they are protected from the worst. This article explains some common reasons that “successful” backups fail to meet business continuity needs. It encourages business owners to ensure that information technology (I.T.) systems can be recovered through actual testing. 1. INTRODUCTION You’re smart. You know that while wise use of computers (information technology, or “I.T.”) offers competitive advantages, they have now become a requirement, a “necessary evil” to stay in business. You also know that I.T. sometimes fails and without it, you are dead in the water. So, being smart, you do your backups; perhaps even regularly and even automatically. Perhaps you don’t back up every computer in the office every day or every week, but at least you back-up your important data; maybe even using an offsite service or by taking copies offsite. Good for you! But have you ever tried to recover using those backups? If not, don’t be smug about being backed-up! Many people have been unpleasantly surprised when the fickle finger of computer fate strikes. Some find that the backups don’t really restore the data or the functionality they … Continue reading

Posted in How the Net Works, News | Tagged , , | Comments Off

February Portal is Out

The February, 2012 edition of our newsletter, The Portal, has been published. Pick up a copy here! This issue is dedicated to looking at Ebooks.

Posted in News | Comments Off