604-534-4790

Are your passwords secure?

When it comes to using computers and the internet we are challenged to create a plethora of user names and passwords to protect our information.  But how do you make up a username and password that will be easy for you to remember but impossible for anyone else to figure out?  Here are some suggestions:

First of all, there are good passwords and bad passwords.  If someone wanted to “crack” your password using computer software they would probably start with lists of common passwords.  For the dedicated “password cracker” there are actually huge lists of common passwords available online.  Also, when you hear on the news that the accounts of the XYZ Company or the ABC Website have been hacked those passwords can end up on websites like this one where other hackers can access them. Here is a list of the most common passwords used today:

1. 123456
2. Password
3. 123456789
4. 12345678
5. 12345
6. 111111
7. 1234567
8. sunshine
9. qwerty
10. iloveyou
11. princess
12. admin
13. welcome
14. 666666
15. abc123
16. football
17. 123123
18. monkey
19. 654321
20. !@#$%^&*
21. charlie
22. aa23456
23. donald
24. password1
25. qwerty123

So what makes for a good password?  Here are some basic suggestions but in the end it will be up to you to come up with something that works for you: 

1. Avoid common names, dates, phone numbers or things easily associated with you.

2. Avoid common words or phrases as they would be the first thing checked by password cracking software.

3. Use a combination of numbers and letters.  For example, substitute numbers for letters and letters for numbers in a word or phrase.

4. Make it something you can remember all by yourself.  Don’t write it down anywhere!

5. Don’t use naturally occurring keyboard sequences (like “qwerty” for example)

6. Try to make it at least 8 – 16 characters long.  Obviously the longer the better.

7. Plan on changing your password often.  Experts suggest changing your passwords at least every 6 months. 

Whether it’s about protecting the money in your bank account or just restricting access to your email, you’ll need to have good usernames and passwords to protect yourself.  Choose wisely.

Is it time to move away from RDP for remote users?

One of the most convenient ways of working remotely is remote desktop access. It is a widely known fact that opening a hole in a firewall in order to get a direct RDP connection is risky as it entails a weak encryption or VPN. Because it is convenient and so much quicker to set up a direct RDP rather than a VPN or a gateway proxy, most users tend to ignore the risks associated with it. Additionally, it is also considerably cheaper.

However, there are numerous disadvantages that accompany the use of direct RDP for remote users and perhaps the most important one is the concern for security. Because RDP makes use of port 3389 which is an open port, the security and safety of the user is at stake. The server can be immediately attacked by hackers through countless attempts of authentication in the hope that at least one of them would work.  It is best to rename your user account from ‘administrator’ to something different, as well as have a strong password and enable auto-lock on your account when there has been three attempts on entering the incorrect password.

The biggest problem concerned with the use of direct RDP is performance. Because of the aforementioned attempts to log into the server by hackers from all around the world, there are thousands of sessions created every minute which require the system to respond to them. Consequently, the main functions you are trying to perform on your server are affected through slower processing and unnecessary lags. There are some steps you can follow to ensure that your slow performance of the system is not because of a brute force attack; one of which is checking the session numbers to see whether they are insanely high or not.

While these can be temporary solutions, they are not always effective and the whole setup will still be a big threat to the safety of the user. Perhaps the best solution is to use a VPN or an RDP gateway proxy. These help secure the connection through the establishment of an encrypted tunnel in the network which prevents middle-man attacks and also helps provide a better network with better performance. A convenient and cheap as direct RDP sounds, it can be a source of a great deal of trouble in the long run and therefore it is advised to always take the safer route in order to avoid easily preventable costly incidents in the future.

Our technicians at TriTech are well informed and can help you get setup in a more secure environment. Send us a quick email to support@tri-tech.comand we’ll help you out right away.