Phone passcodes are far from hacker-proof

Hackers have gotten increasingly clever when it comes to accessing the information stored on smart phones. And hackers are accomplishing this even when consumers protect their phones with lock-screen passcodes. As a current story on the Lifehacker technology Web site says, passcodes have never been a completely foolproof way to secure your smart phone. Thankfully, there are actions you can take to better secure your phone. And there are services you can enlist to protect yourself if you’ve lost your smart phone or someone has snatched it.

Passcode attacks

According to the Lifehacker story, recent passcode exploits work differently based upon whether hackers were targeting the iPhone or Samsung Galaxy phones. For the iPhone, the exploits permitted hackers to gain access to the Phone app, not the iPhone’s home screen. This meant that hackers could use other’s phones to make calls, see users’ contacts and access users’ photos, even though they didn’t gain total access to the phone. For the Galaxy, hackers succeeded only to flash phones’ home screens for about a second. This is a short period of time, but adequate to permit hackers to launch an app or start downloading one that could unlock your phone entirely.

Not foolproof

The Lifehacker story proves that passcodes are not a magic pill for stopping smart phone hackers. This shouldn’t be surprising. As the Lifehacker story says, passcodes have never been more robust than standard passwords in regards to protecting smart phones. Hackers have long been able to crack lock-screen passcodes. They’ve been capable to break into the hard drives of smart phones to gain access to the data and information stored there.

The protection you need

Lifehacker offers some suggestions for protecting your phone. First, make a passcode for your phone’s lock screen that is comprised of symbols, letters and numbers. These passcodes are far more difficult for thieves to crack. Next, encrypt your phone’s data. Lastly, subscribe to services like Find My iPhone from Apple or the third-party app Prey. These nifty apps allow you track your phone if it’s stolen or you’ve lost it. You can then remotely erase the data stored on it, protecting yourself from hackers.

Follow these tips to keep your eyes healthy at the office

Does your job demand that you stare at a computer screen for hours at a stretch? If so, eyestrain can become a serious problem. A newly released story by the everon small-business blog says that workers plugged into their computers can face a host of problems, from watery eyes to headaches, increased sensitivity to light and difficulty focusing. The good news? Avoiding eyestrain is actually quite easy, even if you have to stare at the computer screen for eight hours. The everon blog offered some simple strategies for reducing the negative effects of eyestrain.

20/20/20 Rule

First, you need to practice the 20/20/20 rule. Basically, this rule says that once every 20 minutes you need to take 20 seconds to look at an object that is 20 feet or more away from you. The reason? This forces your eyes to focus on something that’s not a computer screen. Additionally, it gives your eyes a bit of a workout. The everon blog suggests that every 20 minutes you walk take a 20-second break to walk 20 feet or more. This is not only good for your eyes, but for your wellbeing and mental state, too.

Workrave

But how do you remember to take these breaks? Fortuitously, everon lists several apps that can help. For example, there’s Workrave, which sends a message on your screen when it’s time to take your micro-break. Workrave also suggests specific exercises that can help keep your eyes healthy. If you don’t like this app, you can also try EyeLeo, where an animated leopard guides you through short exercises for your eyes. EyeLeo will blank out your computer screen when it’s time to take a break.

The Coffee Break App

There’s also the Coffee Break app, though it’s only available for Apple. This app will steadily darken your screen as a reminder your break is coming up. When the break arrives, your screen is totally dark, and it’s time to step away from the computer. Obviously, not even Coffee Break can force you to give your eyes a rest. That’s up to you. Here’s hoping you don’t skip those important eye breaks.

Sharing screens on a tablet no longer a hassle

Think you can’t use your tablet computer to share screens with your co-workers? Think again. There are several apps you can get today that allow you to share your reports, images, documents and videos with co-workers and friends. With one of these screen-sharing apps, you won’t even miss that heavier laptop. Whatever screen sharing it can do, your tablet is now able to do, too. But which screen-sharing apps for iOS should you download? Miguel Leiva-Gomez, a writer for the tech site smallbiz technology, recommends three that should handle all of your screen-sharing needs.

Join.me

Leiva-Gomez starts his review with join.me for good reason. To put it simply, it’s one of the best screen-sharing apps for iOS currently out there. You will, however, need to pay for the program’s “pro” version to use it. Once you pay out the monthly fee of just under $20, though, you’ll have the ability to share your screen with co-workers and friends with ease. The program also comes with such goodies as Internet calling, instant chat and file sharing.

Air Sketch

Air Sketch is a formidable challenger to join.me. This app is another that’s simple to operate, according to Leiva-Gomez. It will also change your tablet into a surprisingly effective whiteboard that comes with five different drawing tools. You’re able to use Air Sketch to display documents, images, videos and presentations in real time, creating a tasteful and simple collaborative workspace.

Conference Pad

The Conference Pad completes Leiva-Gomez’s screen-sharing all-stars, and with good reason. This is a no-frills screen-sharing app, but it’s also a solid one. The app is especially impressive when it comes to zoom. Users can zoom into any area of their documents or images without having to sacrifice an iota of image quality. And like the other screen-sharing apps that Leiva-Gomez highlights, it’s a simple one to understand and use, which means that tablet owners will be sharing their screens in no time.

Protecting your privacy is easier than you think

Smartphones, tablets and laptops are fantastic tools: They allow us to search the Internet, answer e-mail messages and watch video whether we’re sitting on the train or waiting for our flight at the airport. Yet these devices can be dangerous, too. Should they fall into the wrong hands, your information, from your online banks accounts to your e-mail messages to your Facebook pages, can fall victim to cyber thieves. And there’s little limit to the damage they can create. Luckily for us, there are steps that you can use to protect your privacy even in today’s age of mobile computing, and as Forbes says, these steps are incredibly easy.

Password Protect

We all depend on a host of electronic devices today, everything from smartphones to laptop computers to tablets. Imagine if you lose one of these devices? What happens if they’re stolen? How much information could the wrong people access, and just what damage might they do by using it? Fortunately, you can defend yourself by requiring users enter a password to unlock your device. That way, if someone steals your tablet, that person might not be able to break into your online bank account.

Google Alerts

To protect your privacy, you may want to know what people are writing about you online. To do this, set up a Google Alert in your name. You’ll then receive a message whenever someone says something with regards to you online. As Forbes says, there isn’t any easier way to track what’s being said about you.

Signing Out

Finally, Forbes reminds you to sign out of your accounts every time you’re finished with your online banking, Facebook updates or e-mail retrievals. After all, you don’t want someone else to stumble upon your computer and snoop around your private sites simply because you forgot to sign out. And if you’re using a public computer such as one at your local library or bookstore? Signing out is an even more important step.

Are you mourning the end of Google Reader?

Google Reader, the widely used RSS reader, is all but dead. Google declared that it would discontinue the service once July 1 rolls around. This has hit a number of the service’s biggest fans hard. The truth, though, is that there are other choices. Google made a decision to close the service because its user base was progressively falling. But the closure of Google Reader provides an valuable lesson to consumers: There’s no guarantee that your favorite, free cloud service won’t go away, as well.

The impermanence of the cloud

The cloud is a great service. It allows us to access programs without needing to store them on our computers. However the cloud also isn’t all that permanent. Writing for Slate, Farhad Manjoo says that the demise of Google Reader ought to provide a lesson to all computer users on the web: Nothing in the cloud is permanent. When Google introduced Reader in 2005, it marketed the service as one that would be around permanently. Obviously, it won’t be. And that’s a lesson that consumers need to always remember: Nothing in the cloud is certain.

The downside of the cloud

This can be regarded as a downside to the cloud. In the days when software came on discs and we downloaded it to our computers, there was more permanence. Sure, companies would close shop and manufacturers would discontinue software. But you still had access to software, even though the companies behind it terminated it. After all, it was saved on your computer and you still had the discs. This isn’t the situation with the cloud. When something is yanked from the cloud, it is gone.

A bleaker future for Google?

What does this mean, though, for Google? In a recent story, the Economist writes that canceling Google Reader may seem like a small decision. Google does have to make money, and it seems sensible that it wouldn’t devote resources to a service that is no longer growing. Nevertheless, the choice to kill Reader may make users distrustful the next time Google launches a new product and wants everyone to flock to it. Why, consumers might ask, should we? Since of course, there’s no guarantee that Google won’t kill that new product one day, too. This isn’t just an issue that Google faces; it’s one that every company that operates in the cloud might one day have to deal with.

Why you need to learn two-factor authentication

How much protection do you think passwords provide today to your company’s Web sites, mobile devices and desktop computers? The right answer? Probably not much. Cyber criminals have mastered the art of cracking passwords. And many times, employees trust in passwords that are easy to guess. This leaves your business vulnerable to cyber attacks. Luckily, there’s a solution: two-factor authentication. And, according to a recent story by Biztech Magazine, it’s the simplest way to immediately boost your company’s ability to protect itself from cyber crimes.

Two steps are better than one

As suggested by its name, two-factor authentication requires users to take two different steps to log onto a Web site or device. Usually, employees will have to still use a password but will also need to rely on a second device to gain access to their computers or to important Web sites. For instance, after entering a password, an employee may need to swipe a smart card, insert a token or use a biometric identifier in order to continue. This two-step process instantly upgrades a company’s online security, according to the Biztech story.

Getting started

Once you decide to employ two-factor authentication, you’ll need to take steps to make sure that the transition is an easy one for your employees. And, as Biztech Magazine says, this begins with choosing the right second factor. For instance, tokens might work well if most of your employees work in a central location. If your business depends on workers that are spread across the country, tokens are probably not the best choice. Same for smart cards: These cards generally don’t work with smartphones. If your employees rely on their smartphones to work, smart cards may be the wrong choice for a second factor.

Take your time

If you want your employees to be more comfortable with two-factor authentication, you’ll want to roll out your program slowly. This will give your workers a chance to adjust to the fact that their log-on procedures are going to be going through a fairly significant change. It also provides you with the opportunity to educate your employees about how two-factor authentication works and why it’s so crucial to the company’s security.

You can protect your business from a cyber attack

Think your small business is safe from cyber criminals? Rethink it. Most small businesses across the country are remarkably vulnerable to hackers. It’s relatively simple for savvy cyber criminals to hack into your business’ Wi-Fi account, for instance. From there, it’s an easy process for cyber criminals to steal your company’s data and funds. Thankfully, Entrepreneur Magazine recently ran an article offering tips for small business owners who want to protect their companies from hackers. The good news? Thwarting cyber crimes sometimes requires the easiest of steps.

Encryption

Make certain the full-disk encryption tools on your company’s computers are switched on. When they are, these tools encrypt every file or program stored on your computers’ drives. This is important mainly because hackers would prefer to go after easy targets. Once they realize that your company’s key data are encrypted, they will often move on searching for easier targets. On Macintosh computers, the encryption tool is labeled FileVault. On Windows-based machines, the tool is known as BitLocker.

Lockdown

According to the Entrepreneur story, many cyber criminals first physically break into businesses to steal their computer equipment, especially laptops. After they have these devices, they can often hack into a business’ computer systems. That’s why it’s important for your employees to take advantage of their computers’ Kensington lock port, the small metal loop installed on most computers and laptops. Users can run cables through these loops to secure their laptop computers to their desks. This sounds strange, but many criminals will spot secured laptops and move on. They don’t want to spend any extra time during their break-ins.

Wi-Fi Vulnerability

Wi-Fi networks are often vulnerable to hackers. That’s why Entrepreneur Magazine suggests that businesses rely on wired networks instead. If your business absolutely needs a Wi-Fi network, make sure to protect it using a difficult password. Entrepreneur Magazine recommends a password consisting of letters, numbers and symbols. Write down this password and hide it in a safe or other secure spot.

Bigger tax breaks coming to small businesses that invest in new tech

It’s a challenge to operate a successful small business today. You’re up against escalating costs, sometimes unreliable employees, and competition from name-brand businesses with far bigger budgets. But at least your business can take advantage of larger tax breaks for purchasing new technology. BizTech Magazine recently covered how new tax breaks created in the American Taxpayer Relief Act of 2012 could help your business improve its technology while paying less for it.

The tax break

The tech-spending tax break within the American Taxpayer Relief Act of 2012 is an important one. It allows businesses to write off up to $500,000 worth of technology and equipment expenditures in 2013. That’s a large amount, and it might motivate more business owners to spend money on new computers, energy efficient lighting, payroll software and analyzing tools. And these new tech purchases could help these small business owners grow their bottom lines.

Retroactive

The American Taxpayer Relief Act also retroactively permits businesses to write off a greater amount of new tech and equipment expenditures from 2012. According to BizTech Magazine, small businesses can now deduct up to $500,000 of the new tech and equipment purchases that they made in 2012. It is an increase from the former limit of $139,000, and can provide an additional financial boost to small businesses.

What it means

It’s important for small business owners to take advantage of these tax breaks. They are, after all, important financial incentives meant to encourage companies to invest in the technology they need to flourish. Businesses must evolve if they hope to succeed today. One of the best ways to do this is to invest in new technology and equipment, and the taxpayer relief act makes carrying this out more affordable.

Does only one person have access to all your business’ online accounts? Uh-oh.

Only one key employee has access to all of your small business’ important online accounts: your cloud-based payroll software, Twitter account, Facebook account and bank account. That’s fine. But what happens if that employee should die suddenly? Do you know the passwords to your company’s online bank account? What about that cloud-based payroll service? And even if you did, are you legally be able to access the online accounts after this employee dies?

Too much power?

The Wall Street Journal recently highlighted this issue on its Web site. It might not feel like a problem that your business will suffer. But if your business has online accounts to which only one person has access, you might be tempting fate. If that person dies, will you be able to access your online bank account in order to pay your vendors or cut a rent check to your landlord? How about your payroll software? Will you be able to cut checks to your employees, all of whom want to get paid on their regular payday? And then there’s Twitter and Facebook. If your business relies on these tools to talk with customers, you’ll need to know the passwords that give you access.

False sense of security?

The Wall Street Journal story defines the issue as a matter of trust. Simply put, small business owners put an excessive amount of trust in the cloud. They erroneously feel that information they put in the cloud will stay protected forever. This isn’t true, though. The cloud doesn’t offer absolute protection from hackers. Plus it doesn’t guarantee that you’ll always be able to access your important business files, information and accounts. If you can’t access your online accounts because none of your surviving employees knows the passwords, having all of your important business matters stored online won’t be much help.

Solving the problem

Solving this problem, fortunately, isn’t difficult: You simply need to be sure that more than one employee knows the passwords for your online accounts. And you needs to be equally certain that your critical accounts are either registered to your company or more than one staff member. That way, should that key employee die, you’ll still be able to conduct business normally.

Boost your small business with these IT projects

Your New Year’s resolution was to grow your small business in 2013. How is that resolution going? If you’re struggling to boost your small business’ revenues so far this year, it might be time for you to check out your IT department. Yes it’s true: Your IT department boasts the technical expertise to make your business even more efficient. That, consequently, can raise your employees’ productivity and improve your business’ bottom line. Here are a few tech projects that Small Business Computing.com suggests for small business owners who wish to see their businesses grow in 2013.

OnsiteWi-Fi

The bring-your-device movement continues to grow. This makes sense: Employees often work more effectively when they can work on their own personal tablets, laptops and smartphones at the office. After all, they are more accustomed to these devices. Taking their own personal devices to work can also help when employees need to put the final touches on a report or presentation when they’re at home or on the road. But this policy only works if your office features a strong and reliable Wi-Fi network that employees are able to use to access the Web, send and receive e-mail messages and update your company’s Twitter and Facebook pages. Make acquiring a reliable Wi-Fi network a key goal of 2013.

Ultrabooks

Your employees are able to do more when they can tote laptops to meetings with clients. Traditional laptops, though, are too cumbersome. And small Netbooks are often too slow and limited. Ultrabooks, though, are a different animal. These laptops are both small and light enough to be portable, and powerful enough to enable staff members to display multimedia presentations and reports to prospective customers. A great way to watch your business grow is to give your employees more options for snagging new clients. Ultrabooks are one of these options.

Say farewell to Windows XP

Do you still have computers that run the Windows XP operating system? That’s a mistake. As Small Business Computing.com highlights, Microsoft will not provide technical support for this operating system as of early April 2014. The company will also no longer send out regular security updates for the software as of this time. Running Windows XP, then, means that not only will your workers be working on a decade-old operating system, but their computers may also be highly susceptible to virus attacks. Make the smart move and upgrade to a more recent Windows operating system.