In the digital world, passwords are used and required for many applications and services.
Access to your PC or to your email account will require a password, as will access to your favourite online shop or the web access to your bank.
Passwords are the digital version of our traditional door keys, and yes, there are already possibilities to replace traditional door keys also with a digital lock or even your mobile phone.
Passwords help to protect your data and your privacy.
It is strongly recommended to use different passwords for different applications.
This, to avoid granting access to all the digital services you use at once if ever one of your passwords should be compromised, be it accidentally from your side or from the service provider side.
Just as a reminder, see what recently happened at Cathay Pacific and the privacy breach.
The tricky thing with passwords is that on the one hand the password shall be strong, i.e. as random as possible to avoid guessing or easy password cracking, but on the other hand you shall be able to remember the password.
Here are some tips for creating a safe and secure password.
Continue reading Create a strong yet memorable password
Privacy is a big topic all in itself, and I shall provide some more related information in separate posts.
The recent incident, however, has caught my attention and also the urge to comment.
Cathay Pacific (CX), Hong Kong’s flagship airline, finally came forward on 25th October 2018 with information that their servers were accessed without authorization and data of 9.4 million of the airlines customers had been compromised.
This incident already happened in March 2018, so “only” 7 months before Cathay Pacific chose to inform their customers.
Shortly after the story made headlines in the news, I also received an email informing me that my data at the carrier had been accessed without authorization.
Data privacy is an important topic to me and I shall use the excellent example from Cathay Pacific to explain some details, what to watch out for and also what an impacted company should or should not do.
Continue reading Privacy – the handling of the breach by CX
You have just bought yourself a fantastic, new, shiny high-tech toy called Smartphone.
Yeah! The world to phone calls, internet, a pocket sized camera and lots of entertainment is now open and available in your palm.
But do you know that you have at the same time also signed up for a new job?
Yes, you heard right. You have just signed up for a new job.
Congratulations again and welcome to the world of
After all, this new device in the size of your palm is a powerful computer.
And yes, it can likely also do phone calls.
Continue reading Congratulations!
If you ever encountered an IT (Information Technology) related issue, maybe with your PC (Personal Computer) not working as expected or your application not doing what you’d expect it to do or maybe your company provided mobile phone doing odd and unexpected things, you may have taken to find out where your IT administrator is located in your office and maybe you’ve even gone to see your administrator in person to ask for support.
There, sometime referred to as Service Desks or IT Support Centre, a friendly and service oriented person may have offered you the support and advise you needed and enabled you to happily continue your daily endeavour with a well working device.
Now, with PCs and Smartphones having entered also many homes, you may at some time miss such support option when encountering some strange things happening, or not happening, with your personal gadgets.
Continue reading Welcome to the “friendly admin”