3 Ways to Use a Team Password Manager for Your Agency

Managing passwords shouldn't get in the way of doing good work for your clients. However, when each client has several, dozens, or hundreds of passwords to manage, it's easy to get overwhelmed. There's nothing quite so infuriating as getting held up on a big project because you can't "find the damn password." Managing passwords on a shared Google Doc can be not only messy but insecure (anyone with edit access can change those privacy settings!) And a password-protected Excel document is going to become outdated over several different versions on different people's computers. Who wants to spend more time looking at spreadsheets, anyway?

5 Bad Password Habits to Break Immediately

We all have bad habits--letting emails pile up in the inbox, getting fast food for lunch, leaving dishes in the sink. We all do it. The typical bad habit isn't normally a big deal, but when it comes to managing your passwords, getting into a bad pattern can cost you serious time and money. We all know the hassle of forgetting a password and having to reset it, but that's nothing compared what you'll go through if your accounts are compromised because you managed your passwords poorly.

Tom's Tales #5 The One Where Tom Searches for the Best Application Control Software

Tom2Meet Tom. Tom works at Acme Consulting, a 25-person company. As the senior "tech guy" at Acme, Tom wears a number of hats, including having responsibility for IT and security. Tom tries his best to protect his company, but he's got his share of problems (and his colleagues don't always help out), as we'll see in our ongoing series Tom's Tales.... Tom is considering replacing his standard antivirus protection with "application control." With all of the choices, he would like to find a program that offers the same features he has come to rely on with TeamsID.Toms tale 5.png

Tom's Tales #4 The One Where Tom Finds An Alternative to Spreadsheets

Tom2Meet Tom. Tom works at Acme Consulting, a 25-person company. As the senior "tech guy" at Acme, Tom wears a number of hats, including having responsibility for IT and security. Tom tries his best to protect his company, but he's got his share of problems (and his colleagues don't always help out), as we'll see in our ongoing series Tom's Tales.... The project management director of Tom's company waltzed into Tom's office this morning, pulled up a chair, and informed him that they needed a solution. Of course, Tom is the man for the job. In a nutshell, each of their clients have one or more individual accounts, unique login information, and different needs that require different people on Tom's internal team. The Google spreadsheet they have been using isn't working anymore. It's too confusing, too hard to find information on, too easy to mess up, and it gives all information to everyone who can access it. Fix it, Tom. Toms tale 4

Tom's Tales #3 The One Where Tom Gets Sick of Sticky Notes

Tom2Meet Tom. Tom works at Acme Consulting, a 25-person company. As the senior "tech guy" at Acme, Tom wears a number of hats, including having responsibility for IT and security. Tom tries his best to protect his company, but he's got his share of problems (and his colleagues don't always help out), as we'll see in our ongoing series Tom's Tales.... Tom takes great pride in the efforts that go into securing the workplace. Nevertheless, while walking through the building yesterday, he cringed at the flood of yellow sticky notes scattered around the cubicles. With growing concern, he noted many of the notes displayed the logins and passwords for a variety of accounts. This password information, if taken or lost, meant the company could lose important data or worse, have it exposed to others. Tom is deeply concerned about the risk of a data breach created by poor password management. He decides to implement the following strategies.oh TOM

How Well Can You Guess These Celebrity Passwords?

After years of studying passwords, there are definitely patterns and "secrets" that are most commonly followed. As was made evident in the semi-recent scandal, celebrities follow the same patterns when they create their passwords. Do you know these celebrities well enough to guess what their passwords might be? Find out ...

Tom's Tales #2 The One Where Tom Trains Three Techs at Once

Tom2Meet Tom. Tom works at Acme Consulting, a 25-person company. As the senior "tech guy" at Acme, Tom wears a number of hats, including having responsibility for IT and security. Tom tries his best to protect his company, but he's got his share of problems (and his colleagues don't always help out), as we'll see in our ongoing series Tom's TaleIf finding qualified employees weren't hard enough, the ordeal of getting them up and going can be even more painful than being understaffed in the first place. Tom thought hiring three techs at once would streamline the training process-until they were all eagerly seated in front of him. He looked down at his to-do list and found himself wondering if it was too late to change his mind.

Q&A On Our Worst Password List

We always get lots of questions about our annual Worst Passwords List , so I thought I'd tackle some of these questions here. What exactly are these 25 Worst Passwords? How do you collect passwords?

Announcing Our Worst Passwords of 2015

SplashData has announced the 2015 edition of its annual "Worst Passwords List" highlighting the insecure password habits of Internet users. "123456" and "password" once again reign supreme as the most commonly used passwords, as they have since SplashData's first list in 2011, demonstrating how people's choices for passwords remain consistently risky.