Meet Tom. Tom works at Acme Consulting, a 25-person company. As the senior "tech guy" at Acme, Tom wears a number of hats, including having responsibility for IT and security. Tom tries his best to protect his company, but he's got his share of problems (and his colleagues don't always help out), as we'll see in our ongoing series Tom's Tales.... The project management director of Tom's company waltzed into Tom's office this morning, pulled up a chair, and informed him that they needed a solution. Of course, Tom is the man for the job. In a nutshell, each of their clients have one or more individual accounts, unique login information, and different needs that require different people on Tom's internal team. The Google spreadsheet they have been using isn't working anymore. It's too confusing, too hard to find information on, too easy to mess up, and it gives all information to everyone who can access it. Fix it, Tom.
Meet Tom. Tom works at Acme Consulting, a 25-person company. As the senior "tech guy" at Acme, Tom wears a number of hats, including having responsibility for IT and security. Tom tries his best to protect his company, but he's got his share of problems (and his colleagues don't always help out), as we'll see in our ongoing series Tom's Tales.... Tom takes great pride in the efforts that go into securing the workplace. Nevertheless, while walking through the building yesterday, he cringed at the flood of yellow sticky notes scattered around the cubicles. With growing concern, he noted many of the notes displayed the logins and passwords for a variety of accounts. This password information, if taken or lost, meant the company could lose important data or worse, have it exposed to others. Tom is deeply concerned about the risk of a data breach created by poor password management. He decides to implement the following strategies.
After years of studying passwords, there are definitely patterns and "secrets" that are most commonly followed. As was made evident in the semi-recent scandal, celebrities follow the same patterns when they create their passwords. Do you know these celebrities well enough to guess what their passwords might be? Find out ...
We always get lots of questions about our annual Worst Passwords List , so I thought I'd tackle some of these questions here. What exactly are these 25 Worst Passwords? How do you collect passwords?
SplashData has announced the 2015 edition of its annual "Worst Passwords List" highlighting the insecure password habits of Internet users. "123456" and "password" once again reign supreme as the most commonly used passwords, as they have since SplashData's first list in 2011, demonstrating how people's choices for passwords remain consistently risky.
Happy New Year from all of us at TeamsID!
Have you ever wondered how much it could cost your company if you lost your passwords or got hacked? Well here is your chance to answer all your questions on password security. This infographic will show you why it is so important to keep your passwords safe.
We're just starting to get the word out about TeamsID to users of our personal password manager SplashID. If you're a SplashID user, you'll find lots of familiar features in TeamsID.
Every once in a while you find a tool that is easy to use and really makes a difference. For Sara, TeamsID was the perfect solution to a growing problem.
Extend The Power of TeamsID To Your Browser If you haven't checked it out already, TeamsID has a nifty Chrome browser extension. You can get the browser plug-in from the Chrome Web Store here . Once installed, you can log into the extension and then automatically log into sites. Give ...
Get More From TeamsID With iOS, Android, and Windows Apps Unlike some other business password managers, TeamsID has native apps available in addition to the web experience. The TeamsID apps deliver mobility with smartphone versions and powerful native experiences on desktop versions.