We Define IT
  • Home
  • Plans
  • Testimonials
  • Professional Services
  • Blog
  • Contact
  • Login

What You Need to Know About Desk Ergonomics

7/1/2023

0 Comments

 

Getting the job done is the focus. Many of us don’t spend much time thinking about how we’re setting up our workspace to do our tasks, yet desk ergonomics can increase productivity, lessen muscle fatigue, and cut work-related aches.

In a typical office setting someone has thought about ergonomics. Most people have a chair at a desk where they can sit with a posture that reduces the risk of pain. Good workspace positioning will see your:

feet flat on the floor, thighs parallel, and knees bent to 90 degrees;
elbows comfortably below shoulders, bent at 90 degrees, and close to the body (without being jammed against you);
shoulders relaxed and back;
back against the chair with your body aligned so that your shoulders are over your hips, and your head, over your shoulders;
Eyes looking at the top of the screen (rather than up or down at it).
Anything else risks putting your body out of alignment, which can stress your body and lead to painful issues. For example, carpal tunnel syndrome, muscle strain, and lower-back injury.

Rethinking your work-from-home posture
Sorry. Working from bed or lounging in a cushioned chair isn’t going to put you in the right ergonomic position.

It’s best to replicate a traditional workstation. Start with how you sit: Get a desk and office chair, or at least sit at a table. If your feet don’t touch the ground, get a footrest (or even use a stack of books). This helps get your thighs parallel and knees at 90 degrees.

Now, place your computer where you can keep your elbows bent and shoulders back. You want to hover your palms slightly over the keyboard as you type. If you have armrests, this can help you avoid slouching.

Your lower back is the next consideration. Having your back against the backrest can help your alignment. Office chairs are often designed with lower back support. If you don’t have that, you could get a lumbar pillow to help. Otherwise, you might roll up a towel to put against the small of your back while sitting.

Also, consider your screen placement. You might need to raise or lower your monitor so that your eyes are in line with the top of the screen. Laptop users could need to get a separate screen or keyboard so that they can achieve the right angles at once.

Next steps
If you’re a two-screen user, you can put the one you use most directly in front of you. If you work on both regularly, place them side by side, and angle them towards your seat. Tablet users may want to get a stand that puts it at eye level. Otherwise, switch up which hand you’re using to hold it. Plus, if you’re on the phone a lot, use hands-free or a headset to avoid a stiff neck.

You can also take advantage of a standing desk. In that case, you’ll want to make sure your feet are hip distance apart. Then, stack your hips above your feet, followed by your shoulders, neck, and head. Keep even weight distribution in mind too.

Every 20 minutes or so plan to check in on your posture. Also, take 20 seconds to look at something 20 feet away from you to give your eyes a rest. Moving and stretching can give both your body and mind a break.

Reconfiguring your desk ergonomics can help reduce muscle strain and improve productivity. It’s up to you to sit correctly to take away workplace pain, but we can help you with the pain of problematic IT. Contact us today at (888) 234-WDIT(9348).

Picture
0 Comments

Is Your Data Breached? What To Do

2/1/2023

0 Comments

 

News of data breaches is all too common. This company apologizes for six million accounts breached. That company acknowledges hackers accessed 35,000 users’ personal identifiable information. But the question that probably matters most: Is your data breached, too?

The company should contact you if your information is in a data leak, but you can’t rely on that. You can also find out if your phone number or email address has been leaked by visiting https://haveibeenpwned.com/.

HaveIBeenPwned has uploaded various breaches and consolidated the information to make searching easy. Enter your address and get a list of breaches that compromised that email. You’ll get a summary paragraph as well as a description of data compromised in each breach.

It is not uplifting reading!

Next, the question is what to do about your breached information.

Steps to Better Security
First, change your passwords for those breached accounts. If you use that same password to access other accounts, change those passwords, as well, even if they are not listed as leaked.

Always avoid reusing passwords. Yes, it can be a hassle to remember many different access credentials, but you risk exposing many accounts if you keep reusing one email address and password combo over and again.

Make using unique passwords for all accounts easier by using a password manager. A manager can store your many passwords in one place and generate strong ones to use. You can often download an app to your mobile device, which gives you the convenience of filling in your credentials when you’re on the go, too.

The next step is to use two-factor authentication (2FA).

Understanding 2FA
This adds a layer of difficulty for hackers trying to access your accounts. Even if they had your username and password, they would need a second way to verify your identity.

Using 2FA requires you to provide one of the following before you can gain access:
  • something you know (e.g. the answer to a secret question);
  • something you have (e.g. your smartphone);
  • something you are (e.g. your fingerprint).

A bad actor would need to have not only your leaked credentials but also your other "something."

A common approach to FA is an SMS text message or voice-based authentication. You enter your credentials, then the site follows up with a text or phone call providing a separate code you must then enter. This is not the best method, however. Scammers can hack the SIM card associated with your device, and then use your number to make and receive calls and texts.

Software tokens for 2FA are a safer solution. You’ll download and install an application on your phone (e.g. Authy or Okta Verify). It can generate a unique verification code that is valid only for 30–60 seconds.

Want to learn more about password management and soft-token 2FA. We’re here to help. Contact us today at (888) 234-WDIT(9348).

Picture
0 Comments

Say Goodbye to 100 Passwords with Passkey Sign-on

7/1/2022

0 Comments

 

The average individual has 100 passwords to remember, according to a NordPass study. Apparently, no one has studied how many we actually remember versus how many we reset over and over. No matter. New developments could save us from having to remember passwords altogether, as major players are moving to a single passkey sign-on approach.

What is passkey sign-on?Apple, Google, and Microsoft have joined forces to support “passwordless” sign-in across all their mobile, desktop, and browser platforms. The initiative, announced in May to coincide with World Password Day, is expected to roll out in 2022/23.

What does passkey login involve? Users choose a physical device to use to authenticate them on apps, websites, and other digital services. For many of us, this would be a mobile phone. You’d unlock the phone as you normally do. Then, you could enter a PIN, draw a pattern, or use your fingerprint to sign into the digital services you need.

To put it simply, it’s a four-stage process:
  1. You navigate to the site or app or service you want to use.
  2. You approve access using your passkey device.
  3. A public passkey (mirroring the private one on your device) is shared.
  4. Login is completed.

You don’t need a password, because the login is done using a cryptographic token (the passkey). Your selected device shares that passkey with the website, app, or other online services.

Advantages of the passkeyUsing a passkey means you need to remember only the one PIN or pattern to unlock access … or have fingertips! And you don’t have to come up with a complicated passphrase either, which means no more frustrating upper and lowercase character, number, and symbol combo.

The passkey sign-in method is touted as more secure. Passwordless authentication makes it more difficult for hackers to compromise login details. After all, they would need access to the physical device you use to access digital services, apps, and websites.

You keep personal information safe and cut password vulnerabilities that plague us today:
  • Phishing attacks, which use fake websites to capture login details, won’t work.
  • Brute-force attacks, which use trial and error to guess credentials, won’t get anywhere.
  • Spoofing your device will no longer work, as the passkey device must be near the computer.

Another plus? Passkey security is being set up to offer multi-device authentication. You’ll be able to sign in to an app or service from almost any device, and it won’t matter what platform or browser you’re using. So, you could sign in to Google Chrome and run Microsoft Teams using your iPhone, for instance.

Making the most of multi-factor authenticationPasskey security will use a FIDO standard to authenticate you in different contexts. This is a passkey protocol already supported in some online environments, but major players are now coming together to make it more widespread.

With a passkey that is unique to you, you’ll no longer have to worry about keeping track of multiple passwords.
​
Still, until this technology is available, you’ll want to protect your online activity. Our experts can help secure your home networks and set you up with a password wallet. Contact us today at (888) 234-WDIT(9348).

Picture
0 Comments

Psst … What’s Your Master Password?

4/15/2022

0 Comments

 
Picture


​All of us like to think we are unique. That thinking extends to our passwords too, right? We’re special and distinct, so no one could guess our chosen collection of letters, numbers and symbols. Well, it’s surprisingly easy for algorithms to determine passwords and to do so extremely quickly. So, a password manager is a smart move, as you’ll have more complex, different passwords stored. Still, it’s important that your master password for that manager be 100 percent original.

Sure, your password may be difficult for a human to guess – it would take forever. But, computers can run through the possible combinations in seconds. Password Depot found that a password consisting of five characters (three lowercase letters and two numbers) can be hacked in 0.03 seconds.

Add characters and the volume of possible configurations increases, and that adds time. A seven-character password (one capital letter, six lowercase letters) will take approximately nine minutes. At eight characters (four lowercase letters, two special characters, and two numbers) things get more complicated. Trying all the possible permutations will take 2.6 days.

That’s a data-driven argument for complex passwords with many letters and numbers. But the problem is that they are so much more difficult to remember, and that’s why it’s a good idea to use a password manager.

The power of a password manager

A password manager offers top-notch encryption to protect passwords. You can use a password manager as a vault for all your passwords. When you want to log in online from your desktop, it can prefill your username and password. Often, there is also an app that allows you to do the same on mobile devices.

Industry-leading password managers also notify you if credentials are weak or get compromised. They may also flag that you are repeating access credentials, which is not a good idea.

Don’t forget your master password

Part of the appeal of a password manager is its zero-knowledge approach. They are set up so that they can’t see your stored passwords. The password is encrypted before it reaches the manager’s server and can’t be deciphered.

This means you have to be careful not to forget your master password. The master password is the one you use to access the password manager. Without it, you’ll have to try to recover your account using several stages of authentication.

Make your master password unique, and don’t use it anywhere else. Repeating passwords, as mentioned above, increases your risk of getting hacked. If the other site is hacked, the bad guys could try that same password on other sites, too. It’s low-hanging fruit for them.

The current best practice as far as passwords go is to use a passphrase with a mix of alpha-numeric symbols. This gives you a length of between 20 and 30 characters. You can use a variety of uppercase and lowercase letters, numbers, and symbols. Some examples of passphrases include:
  • My_Fave_Person_is_My_Fish_761
  • Mytrip-2-Paris-Was-Magnifique
  • YouRemindMeoftheBabe!!

The passphrase means something to you, so it is more memorable. Yet it isn’t easy for hackers to crack. Also, you’re not using specific personal details that you may reveal on social media (unless you are constantly posting pics of your fish, and its name is actually 761).

Protecting your online identity
​

Want to know more about protecting your online identity? Need help with setting up security procedures for your home computer and network? Our tech experts are available to help. Call us today at (888) 234-WDIT(9348)!

0 Comments

The Unexpected Benefits of Password Managers

1/1/2022

0 Comments

 
Picture

The main advantage of a password manager is obvious to anyone with more than one account online (i.e. everyone). Instead of remembering all 100 usernames and passwords, the password manager autofills them. It’s a boon. But it’s not the only reason to use a password manager. This article shares several more unexpected benefits.

Password manager programs generate, manage, and store many different passwords. You may be concerned about whether a password manager is safe to use. But, the cybersecurity industry consensus is “yes, it is.”

A password manager uses top-notch encryption to protect passwords. Plus, they take a zero-knowledge approach. They can’t actually see the passwords they store and prefill on sites. The password is encrypted before it reaches the manager’s server and can’t be deciphered. This is why you need to be so careful not to forget your master password!

That said, the password manager offers more than a vault for encrypted credentials.

More Benefits of Password Managers

For one thing, many password managers have apps for download onto mobile devices. Then, you can use the password manager to prefill forms on those, too. This gives you the advantage of convenience not only on your desktop computer but also on the go.

Some password managers offer added security benefits, as well. They might:
  • warn you of weak password and login credentials;
  • remind you to change your passwords;
  • notify you if your passwords may have been compromised in a breach;
  • advise you against repeating access credentials if you’re about to do so.

Another advantage is that you can conveniently share passwords with others. Maybe you want to give family members shared access to streaming accounts or allow a work colleague access to applications you’re using remotely. A managed password sharing feature can allow them to see selected passwords. You aren’t showing everything: you can pick what you make available. Plus, when you change your credentials, the password will change on their end, too. This doesn’t need to be permanent either. You can easily revoke password sharing.

You can also use a password manager to secure other important information. You might store things such as credit card numbers or other personal identifying information. Keeping that kind of data in an unencrypted note on your desktop or mobile device is unsafe, but you can take advantage of password manager encryption to safely store those precious details.

Secure your passwords with a manager
​

You can’t expect to remember all your unique passwords. Yet the days of writing down passwords on Post-it notes are over. Use cloud-based password management to secure your passwords and do more.

Contact our IT experts today to find out more about password management. We’re happy to suggest the best solution for your needs and set it up, too.

Call us now at (888) 234-WDIT(9348)!
0 Comments

How Hackers Get Around SMS Two-Factor Authentication

9/15/2021

0 Comments

 
Every time you’re online and a site sends a separate code to check your identity, you’re using two-factor authentication. It’s become the norm. So, of course, hackers have figured out how to get around this, too. This article shows you how they do it and how to stay safe.

With billions of usernames and passwords leaked, access credentials everywhere are at risk, especially if you are reusing your log-in information on more than one site (don’t do it!).

Business websites want to offer a secure user experience, so two-factor authentication (2FA) has become the norm. It’s meant to help stop automated attacks in which bad actors use the leaked usernames and passwords.

Still, if the site you’re visiting uses short message service (SMS) to send a one-time code to your phone, you could still be at risk.

Hackers, using information they have from a data leak, can call your telephone company. They use your name, date of birth, and other identifiers available on the Dark Web, to impersonate you. Then, say you’ve lost your phone, they transfer your phone number to a device with a different SIM card.

That means when the one-time SMS code gets sent your phone number, the message will instead go to their device.

Android Users Also Beware
On Android devices, hackers have an easier time getting access to text messages. If they have access to your leaked Google credentials, they can log into your Google Play account. From there, it’s simply a matter of installing a message-mirroring app on your smartphone.

The app synchronizes notifications across your different devices. It’s for when you really need to be connected, and you’ll be able to see your phone’s SMS alerts on your tablet!

The app won’t work unless you give it permission when prompted to do so, but too many people don’t stop to read alerts from their own accounts: they assume it’s another necessary update and go on with their day. Otherwise, the hacker might call you in a social engineering ploy pretending to be a legit service provider. They’ll be familiar to you, so you’re more likely to listen when they ask you to give permission.

Again, when the one-time SMS code gets sent to your phone, because of the message-mirroring app, the hacker's device will also receive the code.

What Can You Do to Protect Yourself?
It starts with using unique passwords for all sites you visit. Worried you’ll forget them? A password manager can keep all your access credentials in one secure place for you.

You should also confirm that your credentials haven’t been compromised. If you use Google’s password service, you can head to the password manager site and tap “check passwords” to see if there are any issues. On Firefox, head to the Firefox Monitor page and “Check for Breaches.” On Safari, click on Preferences, and then on Passwords to see what recommendations they have for your security.
Change any passwords that have been involved in a leak!

To avoid the SMS concern specifically, avoid using one-time SMS codes to verify your identity. Instead, you can use a non-SMS authentication tool such as Google authenticator, which provides two-step verification services within the app itself.
​
Need help learning if your credentials have been leaked? Or want assistance setting up more security for your online activity? We can help. Contact our IT experts today at (888) 234-WDIT(9348).

Picture
0 Comments

Is Your Instagram Account Secure?

5/15/2021

0 Comments

 
Why would someone want to target your Instagram account? You share what you ate, maybe the books you read, the shoes you bought, or that really cool image of the sky above. How is that going to help a hacker? Read on to learn more.

OK. Your obvious love of chicken and waffles isn’t going to mean a lot to a cybercriminal, not unless your password is “chicknwaffles.” But there are people who make a living from Instagram. Influencers can make millions by posting a pic of their latest smoothie or the new pair of socks they love. Their IG accounts are their business. A hacker gaining access could destroy an influencer’s reputation, their livelihood.

Businesses, too, are moving to IG as a way to reach a targeted audience with vibrant visuals. They can’t afford to have their accounts taken over by an ill-intentioned hacker. That could lead to lost customers and brand damage.

Then, there’s you, the “average” IG user. Yes, the cybercriminal might still target your Instagram account. For one, they might use your IG handle to reach out to your friends and say, “I’m stuck overseas. I need some money.” Caring friends, not knowing it’s not you, could end up a victim of a scam.

How to Protect Your Instagram Account

#1 Go Private

Instagram lets individuals, influencers, and businesses show creativity. However, you want to control who sees what you post. You may not want everyone to see your photos. Limit your content visibility to friends and family in the Instagram profile window:
  • Click on the three dots in the right corner.
  • Scroll to the bottom of the options.
  • Turn on the Private account setting (the button should turn blue).

You can also block followers you don’t know. Click on your Followers list, and tap on the users you don’t recognize. Tap on the menu button and choose “Block User.”

#2 Disable cross-app sign-ins

Using your IG account to sign in to other applications is convenient, because you have to remember only your IG access credentials. Still, by streamlining your sign-in you are also making it easier for a hacker to compromise your accounts. Now, they can get access to one account and use that as a way into the other connected accounts.

Log in to your account and review all connected applications. You can do this by visiting the Authorized Applications tap under the Edit Profile tab.

#3 Don’t overshare

Sure, that’s the golden rule of social media. Still, we’re talking here about reviewing personal information you share on Instagram. Take a look at your profile information and review whether all those details really need to be there. A hacker could use anything specific you write in your Bio to verify your identity elsewhere. Reconsider posting your birth date, alma mater, anniversary, favorite sports team, etc.

#4 Turn off location services

Instagram’s location services can let you check in at a particular place. But by doing this, you’re giving thieves extra information they can use against you. Instead, go into your phone’s Privacy settings and turn off location services for IG.

You also don’t want to cue criminals that you’re away for a vacation with posts from the beach. You might want to share that sunny sand pic. Then, you regret it when you come home to a burgled home.

#5 Enable two-factor authentication

Of course, the starting point is to pick a strong, unique password for your Instagram account, but Instagram has added two-factor authentication for an added layer of security.

In Instagram’s mobile app you click on the Options icon at the top right to get to a menu offering this option. You will get a short link to click on. Do so, and turn on the two-factor authentication. You’ll set it up using your mobile phone. Then, in the future, you’ll have to log in with the added security of a unique code sent to your phone via text message.

#6 Review your login activity

Keep an eye out for illicit use of your account by reviewing Login Activity. This is under Settings on the desktop app and shows a list of locations from which you’ve logged in. So, if you’ve never been to Thailand, but your IG account has, that would be a red flag. If you do spot locations you don't recognize, log out from your device, and change your password.
​
Need help securing your Instagram account or other social media channels? Our helpful IT pros have the expertise you need. Contact us today at (888) 234-WDIT(9348).
0 Comments

    Author

    Stay connected to our Blog for vital, timely and  relevant information to keep your personal technology optimized, updated and protected.

    Categories

    All
    Browsers
    Cat
    Cconnectivity
    Cell Phone
    Children
    Cloud
    Computer
    Computer Damage
    Content Creation
    Cybersecurity
    Data
    Data Theft
    Deepfake Voice
    Dog
    Download
    Email
    Fake
    False Information
    Fraud
    Furry Family Member
    Google Search
    Graphics Card
    Guide
    Hacking
    Hard Drive
    Hardware
    Holidays
    Influencer
    Laptop
    Laptop Batteries
    Malware
    Managed Services
    Memory
    Mobile
    Mobile App Store
    Monitor
    Network
    New Device
    Online Shopping
    Operating System
    OS
    Password
    Password Autofill
    Password Manager
    Pet
    Pet Lover
    Pet Risk
    Printers
    Privacy
    Ransomware
    Repair
    Residential
    Safety
    Scam
    Seniors
    Shortcut
    Social Media
    Software
    Storage
    Tablets
    Tech Tips
    Victim
    Video Card
    Video Editing
    Windows

    Archives

    March 2025
    February 2025
    January 2025
    December 2024
    November 2024
    October 2024
    September 2024
    August 2024
    July 2024
    June 2024
    May 2024
    April 2024
    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    October 2023
    September 2023
    August 2023
    July 2023
    June 2023
    May 2023
    April 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020

    RSS Feed

Connect With Us
Remote First - Our Company Blog
 Facebook
Twitter
E-Mail
Instagram
LinkedIn
RSS Feed
Services

24/7 Remote Help Desk & NOC Services

Unlimited On-Site Technical Repair Services

Managed Anti-Virus, Malware, Spyware, Greyware, Rootkit and Identity Theft Protection


Windows / Mac / Linux / Unix File Server, Exchange and SQL Backup & Disaster Recovery

Secure, Redundant Cloud Storage

Apple, Windows Activesync, Android, Blackberry & Nokia Symbian Mobile Device Management

Managed IT Services Consulting

Virtual Chief Information Officer (CIO) Services
Client Remote Support

Enter 6-Digit Remote Support Code




Picture
Search Our Site

Home  |  @Home - Residential  |  @Work - Business  |  @School - Educational  |  @Worship - Spiritual |  Virtual CIO  |  Contact Us  |   Login

CALL US TOLL-FREE:  888-234-WDIT
Copyright ©2021  We Define IT LLC, All Rights Reserved. 
Site Design by  Nu Web Order Designs.  Hosting Powered by  Hostivity.

New York, New Jersey,  Connecticut, Pennsylvania, Brooklyn, Manhattan, Queens, Bronx, Staten Island, Long Island, Technical, Computer,  Managed IT, Support, Services
  • Home
  • Plans
  • Testimonials
  • Professional Services
  • Blog
  • Contact
  • Login