About Sparrow Rubin

This author has not yet filled in any details.
So far Sparrow Rubin has created 14 blog entries.

Four Flawed Password Strategies

Four Flawed Password Strategies We have previously talked briefly about complex, unique passwords, but today we'll be diving into the topic of good passwords in more depth.  4. Extremely Flawed Strategy: Repetition This one is fairly commonly known: if my password is Scr4rmbler1! on every single website and system that I access, and exactly one

2022-06-15T11:03:20-04:00June 15th, 2022|Uncategorized|

Three Steps to Basic Internet Security

Three Steps to Basic Internet Security I'm going back to the basics this week and focusing on the essential steps we recommend for securing all internet-connected devices and apps. These can include your LinkedIn profile, smart lightbulbs, laptops, desktops, mobile devices, apps, and Internet of Things devices.  3. Use Multi-Factor Authentication (MFA) When accessing systems,

2022-05-18T11:35:24-04:00May 18th, 2022|Uncategorized|

The Best IT Support Tool Ever

The Best IT Support Tool Ever There are a lot of IT Support tools we use regularly at Deep Core Data, and that I have used in other roles. Many of them are good. Some are even great.  There is only one that I would describe as "the best," though, in part because it's almost

2022-05-04T11:11:34-04:00May 4th, 2022|Uncategorized|

Top Ten Windows Shortcuts in 2022

Top Ten Windows Shortcuts in 2022 Many people prefer not to use keyboard shortcuts to issue commands at all, but they allow you to quickly complete a number of complex tasks, some of which I do every day. They may help you with everyday productivity. First, a note about modifier placement and keyboard variations; depending

2022-04-20T11:39:45-04:00April 20th, 2022|Uncategorized|

Top 4 Places to Invest in Your IT Infrastructure 

Top 4 Places to Invest in Your IT Infrastructure  Nowadays, it’s virtually impossible to run a business without considering your IT budget, but many companies are prone to making cuts that can hurt long-term. While there are places where extravagant spending can be unnecessary, IT has become an integral part of the business world and

2022-04-06T11:48:44-04:00April 6th, 2022|Uncategorized|

Writing, Pointing, and Calling

Writing, Pointing, and Calling This week, I've been thinking about the techniques I use to handle extremely critical work in which close coordination and timing are paramount.  One technique that you've probably all heard about is writing. When handling dynamic, challenging situations, it can be very beneficial to take detailed notes. This is especially true

2022-03-23T10:07:20-04:00March 23rd, 2022|Uncategorized|

Finite Options and Providing Reasoning

Finite Options and Providing Reasoning This has been a hectic, cognitively demanding week for us all here at Deep Core Data. Fortunately, or unfortunately, I have had a lot of practice drawing information out of people who are under a lot of cognitive demand and have extraordinarily little mental bandwidth. Today I want to talk

2022-03-09T12:38:15-04:00March 9th, 2022|Uncategorized|

Unconventional Computer Naming Conventions

Unconventional Computer Naming Conventions There are a few different schools of thought on how to name computers. This is much lower priority and more playful than other batters, but there is a business objective that benefits from this light-hearted approach. Like cars and smart phones, computers don't need unique names if each person only has

2022-02-23T12:37:07-04:00February 23rd, 2022|Uncategorized|

Managing IT In the Work from Home Era

Managing IT In the Work from Home Era There are a lot of reasons that the new push to work from home can be a positive experience for users. From an IT perspective, the ever-evolving meaning of the word “workspace” can pose a challenge. While IT support can be implemented in many situations over the

2022-01-26T13:49:26-04:00January 26th, 2022|Uncategorized|

Lock It Down

Lock It Down A few weeks ago, a client asked what the best way was to configure his Windows computer so that nobody could see his personal information when he stepped away. However, he also wanted all of his tasks and programs opened when he returned.  This reminded me that locking my computer is a

2022-01-12T10:57:20-04:00January 12th, 2022|Uncategorized|