Your Business and Your Confidential Information

May 30th, 2011
Companies have a requirement that cannot be ignored if they are to operate on solid ground toward their future: data security, For computer system documentation, confidential information including but not limited to passwords and user accounts, they need to know that the important information can be retrieved when required but yet remain secure.

Beyond this, their server documentation must be sound and current. Further, it is often wise to keep the important system and password documentation in a secure, save and different location than where their servers or offices are located but should be easily accessible for those who have authorization, idealy on your iPhone or iPad in a secure program like the Get IT Organized™ iPhone IT Management software.

Having established relationships with their banking institutions, clients and vendors weathering the ups and downs of the economy it could be catastrophic if a their confidential information hosted on their systems were to get into the wrong hands.

How important are your passwords, network environment and server information? Think about it. All your money, bank accounts, financial info, web login information and everything else you need to keep private is protected by passwords.

Now what about your server and workstation system information, email account info, network info, routing information and IT system info information? Trust your important information to the security and convenience of the Get IT Organized™ iPhone IT Management software anywhere.

Take a look at GetITOrganized IT Management software to help you in managing your companies confidential IT information.

Share
Posted in IT Data Management, Password Management | Tagged , , , | 1 Comment

Stop and consider, how well do you know your computer system environment?

How well do you know your computer systems? Have you documented your server and computer system environment?

Stop and consider the following important questions related protecting and knowing your server environment;

  • If you had to connect to your server remotely do you know what your server external IP address is, or how to connect to your server?
  • If you had to login to your server do you know what your servers administration password is?
  • Do you know what server does what, and what the DNS computer name is should you have to know?
  • Do you know what internal IP your server is using? Do you have a DNS server? Are your IP addresses static or assigned?
  • If you lost connectivity to your server do you know where to look in order to troubleshoot? Wiring, IP conflict, router, switch and load balancer information for example.
  • If your internet access went down do you know where to look or call?
  • Do you have a backup policy? Do you know how your backups are performed, what folders are backed up, are they images and how frequent are they?
  • Do you know your computer users and passwords? What about directory usage and application information.
  • Do you know what service pack and operating system is currently installed on your server?
  • Do you know what hardware exists in your server? Hard drive sizes and what each drive is used for, RAM, processors and speed.
  • Do you have a disaster plan in place? What if a server should crash what would you do?
  • Do you have workstations? What are your workstation settings?
  • What are your printer settings?
  • Are there any hubs or switches in your network environment? Do you know what network cable belongs to what computer data port?

All businesses are faced with the essential need to document there computer systems and the GetITOrganized iPad server documenting application makes the task of documenting your server information easy enough so you don’t have to be an experienced technical writer or IT professional to get your computer systems documented with GetITOrganized.

Share
Posted in IT Data Management | Tagged , , | Leave a comment

IT Documentation Templates

Searching the internet for IT documentation templates can be very frustrating, most results are unrelated offering just plain word templates or excel templates that are so basic that even logging the basic information required for a server is not possible without massive changes to the document.

So why are there limited resources for this important task? IT people around the world have had to struggle with documenting the server configurations, passwords, usernames, pathing, permissions, groups, applications and so on for as long as I can remember, so what do they use? Ask around, search the internet, call data centres and you will be shocked to find out that until the GetITOrganized iPhone application was created they were using spreadsheets and word documents to log this important confidential information, and when asked why? When;

  • Spreadsheets and word documents are not secure easy to crack even if password protected
  • Spreadsheets and word documents are very clumsy – Due to the fact that all server types require different unique information creating one template to use for all doesn’t work, therefore you find yourself fighting to layout in a easy to use format so you know where to find the information between the different server spreadsheets you are looking for easy, thus the reason why templates are very rare on the internet because there is no one global IT document template that can be used for all. IT people end up wasting countless days, weeks and even months struggling with templates.
  • IT spreadsheets and IT word documents have serious versioning issues – how do you prevent multiple versions floating around on thumb drives, multiple computers and how do you know what the current version is? What if one person makes a change in one field for one server and another makes another change in a different area in a different copy of the spreadsheet? Oops now what?
  • What would it cost you if your important IT server information containing your companies secrets such as passwords, email account information, application information and so on got into the wrong hands? Competitors? It happens more often then you may realize, an IT staff member copies a spreadsheet with this information to his thumb drive, uses it and forgets this drive in the server farm or it falls out of his pocket.

The answer was always the same, “we know it isn’t the safest way, we realize it is risky but…. there is no other way to save this information in a usable format”.

Now there is a safe secure solution to documenting your server and IT information. The GetITOrganized iPhone IT management application provides you a way of easily and securely documenting your confidential server and network information.

  • Say NO to clumsy IT word document templates and so-long to easy to crack password protected spreadsheets – GetITOrganized iPhone application is a safe secure way of storing your important IT documentation with your iphone password enabled and the application also password protected, even if your phone got stolen or lost your data is safe.
  • Say NO to complicated hard to use spreadsheet IT templates – GetITOrganized has several pre-configured templates to get you started
  • IT spreadsheets and IT word documents have serious versioning issues – how do you prevent multiple versions floating around on thumb drives, multiple computers and how do you know what the current version is? What if one person makes a change in one field for one server and another makes another change in a different area in a different copy of the spreadsheet? Oops now what?
  • What would it cost you if your important IT server information containing your companies secrets such as passwords, email account information, application information and so on got into the wrong hands? Perhaps even your competitors? It happens more often then you may realize, an IT staff member copies a spreadsheet with this information to his thumb drive, uses it and forgets this drive in the server farm, or clients site, or perhaps it falls out of his pocket.

Save your company time and money and document your server, IT, network, usernames and passwords in the popular GetITOrganized iPhone application.

Share
Posted in IT Data Management | Tagged , , | 2 Comments

Protect your PIN, protect your money

Bank Card and Credit Card Security

Protect your PIN, protect your money

Bank PIN protection

PIN and password protection

Interac Association and its members continue to work together to protect you from debit card fraud.

You can also play a role in prevention by remembering to protect your Personal Identification Number (PIN) and by practicing debit card safety.

 

Debit Card Safety Tips

  • If you have a chip card, insert the card first. If the point-of-sale device is not chip capable it will prompt you to swipe your card. Avoiding an unnecessary swipe of the card will reduce the potential of your card information being skimmed.
  • Use your hand or body to shield your PIN during every transaction conducted at an Automated Banking Machine (ABM) or at the checkout.
  • Keep an eye on your debit card when conducting a transaction at the checkout.
  • Check your banking statements regularly and contact your financial institution immediately if you detect any unusual activity, for example, purchases you did not make or missing charges.
  • Notify your financial institution immediately, if your debit card is lost, stolen or retained by an ABM.
  • Memorize your PIN – only you should know it. If you suspect that someone knows your PIN, even a friend or family member, change it immediately.
  • Select a unique PIN. Never use obvious information, such as, your telephone number, date of birth, address or Social Insurance Number. These are numbers often stored in the same place as your debit card enabling criminals to easily guess your PIN.
  • Always use a different PIN for each of your cards, this way if someone should figure out your PIN they can’t access all your accounts, for most people this is the hardest rule to follow because remembering multiple PINS can be challenging so if you can’t remember all your PIN’S then use a secure program like the GetITOrganized iPhone password protection program to store your PIN and bank or credit card information securely, this way they are with you at all times but securely stored on your iPhone.
  • When using an ABM, if you suspect anything unusual do not use the machine and report it to the financial institution immediately.
  • Remember to take your card when the transaction is complete.
  • Be alert. If someone is watching you or makes you feel uncomfortable, cancel the transaction and use a different machine.

Remember to insert your chip card first throughout the transition to chip

In an effort to combat debit card skimming and the production of counterfeit cards, Interac Association is transitioning to a new generation of payment card technology, known as chip. Chip technology provides the card with processing power, allowing the card and the terminal to communicate and carry out additional security checks to ensure the card is valid. The full security of a chip transaction is achieved when a chip debit card is inserted into a chip-capable terminal.

Chip debit cards and chip capable ABMs and store terminals are already entering the marketplace; however, given the vast number of debit cards and terminals across Canada that must be upgraded, the transition will not be completed until 2015. During the transition, some magnetic stripe transactions will still continue to take place. As a result, your magnetic stripe can still be skimmed at a terminal that has not been upgraded to chip technology, even if you have a chip card, so it is important to continue to routinely practice debit card safety.

Continue to protect your PIN and check your financial statements regularly. If you have a chip card and are not sure whether the store terminal is chip-capable, insert your card first. If the terminal is not chip capable, it will prompt you to swipe your card. By inserting first, you avoid an unnecessary swipe of your card and reduce the potential of your magnetic stripe being skimmed.

Remember if you have several credit cards and debit cards and must store your passwords and PINS somewhere then NEVER use spreadsheets, paper, notepads instead use a secure program like the GetITOrganized iPhone password protection program to store your PIN and bank or credit card information securely, with the secure GetITOrganized application you have your banking information with you on your iPhone.

Share
Posted in Password Management | Tagged , , , , , , | Leave a comment

Why Is it Important to Change Your Password?

Secure your passwords with GetITOrganizedA strong computer password is an important tool in the fight against crackers and spammers.

Changing the password frequently helps protect you and your computer, The GetITOrganized iPhone password management application can make this task much easier to manage.

Changing your password helps keep a computer secure.

Considerations

  • It’s easier to get a computer password than most people think. Some websites don’t have secure, or encrypted logins, which means that anyone who’s running a “sniffer” program could obtain your password.

Prevention

  • If you use the same password at every site, if the cracker gets hold of one password he literally owns your online presence. Changing your password periodically helps safeguard against such a disaster and using a different password for every site is a good way to protect yourself, using the GetITOrganized iPhone password management application can make password management simple and secure.

 

Diversity

  • To control the effect of a security breach, you should never use the same password for financial sites that you do for general web surfing. Always maintain separate passwords for different groups of sites and never store your passwords on paper, notepads, or in spreadsheets, this is not secure and unwise, use a secure program to store your passwords, the GetITOrganized iphone password management application makes password management simple.

 

Strength

  • The best passwords contain letters, numbers and punctuation. These make it harder for programmers to guess your password because they don’t resemble everyday words.

 

Tip

 

Share
Posted in Password Management | Tagged , , , , , , | Leave a comment

Documenting your physical network

The first step that we recommend is to make a map of the main network segments in your building. This may include wired and wireless segments. Use a tool such as Visio to create a diagram of the building (if such a diagram doesn’t already exist). Next, plot the location of all hubs, routers, and wireless access points on the map. Finally, draw in the network cables that connect each device.

Should network connectivity fail for a portion of the mapped building, you could look at the map to see which areas were affected by the problems and see if those areas share a common network segment. This could help you to quickly pinpoint other potential points of failure.

Make sure to use the GetITOrganized iPhone system documentation application to document which port on a hub or switch is wired to which network jack (in which office or cubicle). The idea is that, by knowing which hub or switch and which port feeds each office, you will be able to troubleshoot connectivity problems on individual PCs much more quickly.

As you document the physical portion of your network, you will want to be sure to record the settings used by each network device (switches, wireless access points, routers, and firewalls), The GetITOrganized iPhone network documentation program is a great program to store this sensitive information in.

Share
Posted in IT Data Management | Tagged , , | 1 Comment

Protect your password.

Never share your password with anyone, not even a relative or colleague. If another person has your password, they can, for all computer purposes, be you. This extends far beyond simply reading your email. This could include sending email as you, gaining access to sensitive financial or health information, and charging your debit and credit cards, and is considered a serious bank card and credit card policy violation to share your PIN (password) and besides it’s just not a smart thing to do anywhere.

It’s very important to use different passwords for different systems. This limits the damage a malicious person can do should a password fall into the wrong hands. Everyone understands that it’s nearly impossible to memorize a different strong password for each service you need to log in to, however with the GetITOrganized iPhone password management software solution you no longer have too.

GetITOrganized password management software designed for iPhones and iPads enables you to securely store your sensitive information, passwords, bank card PIN information, username and website login information and can even automatically log you into your secure websites so you no longer have to memorize your passwords. You should never write down a password or keep your passwords in spreadsheets or on a text file on your computer device and with GetITOrganized you never have to.

For more information on the GetITOrganized iPhone password management software proceed to http://www.getit-organized.com

Share
Posted in Password Management | Tagged , , | Leave a comment

Documenting your Servers

If the building that houses your servers were destroyed tomorrow, your server documentation should be adequate to assist you or someone else in completely rebuilding the server from scratch. The chances of such a cataclysmic event occurring are slim, of course, so wouldn’t it be nice to get some kind of use out of the documentation that you’ve worked so hard to create?

You’ll be happy to know that a well written server document such as one generated in the GetITOrganized iPhone server documentation application can be used to troubleshoot a variety of server problems. For example, if your primary boot hard drive were to stop working, it would take some time to install and configure a replacement — unless you had all of your server settings documented, and drivers with software put aside.

Protect yourself from server disaster with GetITOrganized now.

 

Share
Posted in IT Data Management | Tagged , , | Leave a comment