Tips

Guest Post: 10 Ways to Conquer Time Management

by Morgan

Today’s guest post is from personal productivity expert Brittany Wheeler. Hope you enjoy it, and let me know if you’d like to see more guest posts like this from experts in business productivity and security. _____ 10 Ways to Conquer Time Management Businesses large or small have moving parts that have to synchronize in order for […]


Tom’s Tales #2 The One Where Tom Trains Three Techs at Once

by Morgan

Meet Tom. Tom works at Acme Consulting, a 25-person company. As the senior “tech guy” at Acme, Tom wears a number of hats, including having responsibility for IT and security. Tom tries his best to protect his company, but he’s got his share of problems (and his colleagues don’t always help out), as we’ll see […]


Q&A On Our Worst Password List

by Morgan

We always get lots of questions about our annual Worst Passwords List, so I thought I’d tackle some of these questions here. What exactly are these 25 Worst Passwords? How do you collect passwords? Technically, these are the most common 25 passwords we found from our searches of public posts or “dumps” of plain text […]


Screen Shot 2016-01-19 at 8.57.36 AM

Announcing Our Worst Passwords of 2015

by Morgan

SplashData’s fifth annual “Worst Passwords List” shows people continue putting themselves at risk While longer passwords debut on this year’s list of most commonly used passwords, they are not necessarily more secure LOS GATOS, CA – SplashData has announced the 2015 edition of its annual “Worst Passwords List” highlighting the insecure password habits of Internet […]


Tom’s Tales #1 The One Where Tom’s Boss Gives Away Their Passwords

by Morgan

Meet Tom. Tom works at Acme Consulting, a 25 person company. As the senior “tech guy” at Acme, Tom wears a number of hats, including having responsibility for IT and security. Tom tries his best to protect his company, but he’s got his share of problems (and his colleagues don’t always help out) as we’ll […]


Resources for ransomware

by Morgan

My goal with this blog is to go beyond password management and cover other security and productivity topics of interest, especially topics of interest to small and medium sized businesses. Along these lines, I’ve been doing some research on ransomware, especially Crowti (also known as Cryptowall).


Zombies Be Gone: Tips on Closing Accounts of Former Employees

by Morgan

Having to let employees go can be a difficult process—regardless of the circumstances behind the dismissal or that person’s decision to leave the company. However, when staff members leave the company, one of the most important things any business needs to do is remove that individual’s access to company resources. For some companies, closing down a […]