About Sparrow Rubin

This author has not yet filled in any details.
So far Sparrow Rubin has created 22 blog entries.

IT Solutions for Weathering a Downturn

IT Solutions for Weathering a Downturn This week, with economic instability in the news, I've been thinking about the ways our solutions can empower businesses to succeed in all stages of growth. Specifically, I want to talk about IT solutions for scaling down a business during an unfavorable economic climate.  1. Smooth Offboarding We can

2022-11-16T10:49:57-04:00November 16th, 2022|Uncategorized|

Why Does Rebooting Fix So Many Problems?

Why Does Rebooting Fix So Many Problems? To this day, there isn’t an IT phrase more iconic than “turn it off, then turn it back again.” While it might seem like a funny way to underscore a potentially bigger problem, the reality is that a large portion of problems truly can be resolved by a

2022-11-02T09:40:27-04:00November 2nd, 2022|Uncategorized|

Why Turning On Number Matching Is Now Urgent

Why Turning On Number Matching Is Now Urgent In my last post, I said that this post would be about the relative strengths of different MFA methods. Due to unforeseen events - specifically, the breaches of Uber and Rockstar Games - that post will be delayed in favor of this one.  In this post, I'm

2022-09-21T08:43:13-04:00September 21st, 2022|Uncategorized|

Better Authentication Options in 2022

Better Authentication Options in 2022 Some of you may have seen the recent news about "0ktapus," a sophisticated phishing effort that targeted more than a hundred major companies. This attack attempted to compromise corporate accounts with fake login pages that would capture both passwords and MFA (multi-factor authentication) codes, allowing attackers one-time access to accounts

2022-09-07T10:59:47-04:00September 7th, 2022|Uncategorized|

5 Ways to Engage Employees During IT Training

5 Ways to Engage Employees During IT Training Like many other kinds of training, IT training can feel boring to many employees. Some may feel like they’re a wiz at figuring out the ins and outs of everything from on site printers to SharePoint, while others may feel completely lost in the dust. Often both

2022-08-24T09:14:31-04:00August 24th, 2022|Uncategorized|

Top 4 Reasons to Use a Mobile Device Management System

Top 4 Reasons to Use a Mobile Device Management System Companies in modern times are dealing with a unique situation moving into the future, a future where employees are more mobile than ever.  Whether they are working from home, the office, a local coffee shop, or traveling for a business trip, their company documents are

2022-07-27T10:21:49-04:00July 27th, 2022|Uncategorized|

Four Strong Password Strategies

Four Strong Password Strategies In my last post, I discussed password strategies that we don't recommend, because they make one's accounts much less secure.  Today, I'll be discussing password strategies that we DO recommend, including the ones that are currently in use at Deep Core Data and the one we're looking into unrolling in the

2022-06-29T11:54:25-04:00June 29th, 2022|Uncategorized|

Four Flawed Password Strategies

Four Flawed Password Strategies We have previously talked briefly about complex, unique passwords, but today we'll be diving into the topic of good passwords in more depth.  4. Extremely Flawed Strategy: Repetition This one is fairly commonly known: if my password is Scr4rmbler1! on every single website and system that I access, and exactly one

2022-06-15T11:03:20-04:00June 15th, 2022|Uncategorized|

Three Steps to Basic Internet Security

Three Steps to Basic Internet Security I'm going back to the basics this week and focusing on the essential steps we recommend for securing all internet-connected devices and apps. These can include your LinkedIn profile, smart lightbulbs, laptops, desktops, mobile devices, apps, and Internet of Things devices.  3. Use Multi-Factor Authentication (MFA) When accessing systems,

2022-05-18T11:35:24-04:00May 18th, 2022|Uncategorized|