GS Blog

Posts By: Nisarg Naik

The preview of Windows 10 launched 10 days ago. The final version will launch sometime in the summer of 2015 and business users across the globe are waiting to see how it will compare to Windows 8. The RETURN OF STARTUP MENU is certainly a big, and welcome, change. Apart from that, the new version of Windows has many other features that you may come to love. Here is an overview of Windows 8 based on what we know now.  

Are you all using the same passwords for all your PCs? Do you use same password for all your accounts just because you don’t want to remember multiple passwords?

If the answer to these questions is yes, you may want to change your password strategy! If your password gets hacked for one account, hackersare now trying to access all your accounts using the same password.  This can leave your business and personal data at risk.  Password security is an important aspect of keeping your confidential data confidential. 


Choosing a strong password seems easy, but does take some perseverance. Employees may find it difficult to figure out a password they could use when they create a new account that is strong enough to avoid hacking and still easy enough to remember. It’s time to become a password guru! This blog will help you and your employees choose passwords that will help keep your confidential data safe.

  • There are some basic rules for creating appropriate passwords. Most websites will guide you about such rules. In simple terms, a strong password is a combination of upper and lower case letters along with numerical and special characters.During your HR on-boarding, make sure you brief your employees about password security and require strong passwords on the network and for business related websites.  Thankfully, many websites no longer allow you to create an account unless you have chosen a strong password.
  • When you are using numbers, do not use them in succession. ‘123’ or ‘12345’ is a very poor combination. Use numbers randomly. Also, do not use your home or office address; such passwords are very easy to crack.
  • Choose a password reminder tool. Many employees do not use complicated passwordsbecause they feel they can’t remember the password when needed. With the new crop of password tools available, the focus can be on creating strong passwords, not remembering them.  Tools such as LastPass are very helpful. Lastpass remembers all your passwords and also does security checks regularly to ensure that the websites that you are about to use are safe. If they are not, LastPass will warn you. It will also prompt you when it is recommended to change a particular password.  Brief your employees about such tools and ensure that they use them instead of trying to use sticky notes on their monitor to remember their passwords!
  • Change your password regularly, at least once in every two months. This will give an extra layer of security.
  • Do not let your employees use a universal password. Encourage them to use a different password for each account they operate.
  • Beware of “phishing” emails and websites.  Legitimate websites will never ask for your password via e-mail or phone.  If you get an email asking you to update your password, do not click the links in that message.  Instead, type the website into your browser and login from there.  Also, be sure to make sure that important sites such as email and online banking sites are using SSL and that the certifies are valid.  If you get an unexpected “certificate warning” message on one of the sites you frequent, close your browser and try again.  If you still get it, try from a different computer or call your IT team. 
  • Test your passwords before using them. Many online tools help you check the strength of your passwords; just be sure to obfuscate the real password by replacing a few characters!
  • Do not hesitate to choose a complex password. Almost all sites give you the option to reset the password via email or text if needed.  Resetting a password is easy, and is less work than trying to recover from a hacked account. As there were some tips provided by a seo company in phoenix 

We hope this blog encourages your employees to be more proactive in ensuring the security of your organization. For more such helpful details, read our other blogs or log on to www.gravityusa.com

If you are a large corporation, you probably have a well-established IT department who takes care of your data safety and security.You probably have invested a good amount of money to ensure that your business stays safe from data security threats. No one (except your IT department) has to bother about encryption, backup, email security, and other factors.

However, if you own a start-up or small to mid-sized business, you are ultimately responsible for the safety of your critical corporate data! Data loss could cost you severely. Many businesses that experience a data loss do not recover, or find that the costs of recovering the data far outweigh the cost of preventative measures.  Here are some essential points for consideration that you may want to consider in order to keep your business data safe. 


Encrypt your data 

Your clients do business with you because they trust you. If they entrust you with sensitive data, it is up to you to earn that trust by protecting it. Make sure you encrypt all their confidential information such as tax forms, address details, financial sheets, business plans, etc. Similarly, it is important to encrypt your own data as well. Encryption is a process of converting your information into a format that can’t be read, understood, or decrypted by any third party. The encryption is password protected. Unless someone knows the password, he/she won’t be able to decrypt it. Encryption, in some form or another, should take place at least when data leaves your organization premises.  For example, if you are an accountant focusing on tax returns, some encryption should be used when sending and receiving tax forms, working papers and finalized returns to and from clients.  


Protect data in transit 

Your data is at far more risk in transit than when it is stored in your PC. When you are sending something confidential to your client, make sure you find out an appropriate way to secure it.  Email, by itself, is not a secure method of sending documents.  Encryption will help you, and local encryption is fairly easy. However, encrypting data in transit is challenging. This is because you and your client have to agree on a common encryption process. If your client already has an encryption policy, you may want to use their system. If not, then you both have to figure out a common way through which both the parties can protect their data during transit. One common method, following on the accounting example, would be to use a 3rd party file share site which uses common SSL security to encrypt uploads and downloads.  


Secure your PCs using an anti-virus 

Do not ignore basic protection. Viruses, malware, Trojans, worms, and other malicious elements can severely affect your productivity and provide hackers with copies of your data. You may either lose access to the contents of confidential client files or to the files themselves.  Invest in a quality anti-virus program, and make sure it is always up to date. Also, secure all your PCs and mobile devices. Remember that laptops and portable devices can be exposed to extra risk due to the unsecure networks they access. 


Use an online backup service 

Backing up your data to a single local physical device isn’t enough. As you can imagine, a fire or flood can make short work of such devices.  A tape or other multi-copy backup is a better choice, as you will always have copies away from the office.  Many customers also use online backup either exclusively or in conjunction with premise-based backup.  Online backup can be inexpensive for your core set of files, and may be a good choice for all of your data, depending on the size and type of data you are backing up.  For some, the benefit of not needing to change a tape is tremendous!

We hope this blog helps you understand the basics of securing your data. If you are looking for professional help, get in touch with us www.GravityUSA.com

Every business these days is looking for innovative ways to increase productivity and free up valuable resources. Today we highlight a few apps that have proved useful for our small business customers: 



We use this app internally and have quite a few customers who use it.  Basically, it is a 3rd party content indexer that works very well with Outlook.  It pulls the searching and indexing out of outlook (pst and ost) and moves them into a text-only index.  It turns out that much of Outlook slowness in searching is related to display times and not search times.  By removing the display part of the equation, Lookeen enables super-fast searching.  You can easily search 50,000 items in under a second.  Pro tip: turn off attachment indexing if you don’t need it for better indexing performance. 



This is another useful app. This app isn’t meant to simplify your business operations. Instead, it will help you manage your travel in on “plane of glass”.  TripIt is a travel-based app that can help you book your flights, car rentals, trains, buses, etc. instantly. It is quite easy to use and is perfect for entrepreneurs who are always on the move. If you are into a business that requires you to travel frequently, try subscribing to TripIt. 




This smart app is built act like your virtual assistant and to handle a number of your daily calendar operations. It is also known as ‘calendar with brain’. It can help you deal with your appointments effectively and in a timely manner. It can also find the social profiles of people who you are planning to meet, helping you learn more about their background before meeting them. Mynd also tells you about the traffic conditions and reminds you to leave for your appointment on time based on current conditions.

There are tons of apps that small businesses and entrepreneurs can use for optimizing their operations. If you need professionals IT help, get in touch with us and we would be glad to provide you with our take.


2015 is here. We hope this year brings prosperity and success for your business. At the same time, we want to educate you about few IT mistakes that you must avoid this year

Cloud computing is a very popular topic in today’s business world. However, one subject that is often overlooked is how the various hybrid cloud computing models can add value to end users as well as to MSPs. For small business customers, the cloud may be an answer, THE answer, or part of the answer, depending on their needs and wishes.  

When Apple released the iPad, little did it know that this device would transform businesses dramatically in the same manner that it transformed personal entertainment? 

Technology has become an integral part of every business. Most businesses rely very heavily on their IT infrastructure and can’t fully function without it.  The advancement in technological fields has made our work simpler, easier, and more accurate.

Cloud computing has gained tremendous popularity in the last few years. In fact, the technology is no longer limited to large corporations; even small and medium sizes businesses prefer hosted servers to store and manage their data. 

Many organisations overlook one of the most important tasks regarding their business computer systems: updating software and firmware. Some people believe that any sort of updating may cause conflicts and create more problems than they actually fix. They feel that “if the software is not broken,  why fix it?”.   

Subscribe to Email Updates

Recent Posts

Follow Us