<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>VRam Computers</title>
	<atom:link href="https://www.vramcomputers.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vramcomputers.com</link>
	<description>Premium Computer Services</description>
	<lastBuildDate>Thu, 02 Jun 2016 19:44:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.3.21</generator>
<site xmlns="com-wordpress:feed-additions:1">75756339</site>	<item>
		<title>Creating Secure Passwords</title>
		<link>https://www.vramcomputers.com/passwords/</link>
				<comments>https://www.vramcomputers.com/passwords/#respond</comments>
				<pubDate>Tue, 30 Sep 2014 01:50:31 +0000</pubDate>
		<dc:creator><![CDATA[Jason]]></dc:creator>
				<category><![CDATA[Tips]]></category>

		<guid isPermaLink="false">http://www.vramcomputers.com/?p=88</guid>
				<description><![CDATA[<p>Recommendations for a Secure Password Using short, simple passwords to access your online accounts, or using the same password everywhere is a mistake that puts you at significantly higher risk of a security breach or identity theft. To increase your protection, we suggest using a combination of letters, numbers, and symbols. The catch is, when you [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.vramcomputers.com/passwords/">Creating Secure Passwords</a> appeared first on <a rel="nofollow" href="https://www.vramcomputers.com">VRam Computers</a>.</p>
]]></description>
								<content:encoded><![CDATA[<div class="">
<h1>Recommendations for a Secure Password</h1>
</div>
<p>Using short, simple passwords to access your online accounts, or using the same password everywhere is a mistake that puts you at significantly higher risk of a security breach or identity theft. To increase your protection, we suggest using a combination of letters, numbers, and symbols.</p>
<p>The catch is, when you create a password, you have to be able to remember it. But your larger concern should be keeping your information secure and private. Some sites have their own guidelines for how many and what characters can and cannot be used. VRam Computers suggests these guidelines to help you create a password that&#8217;s less likely to be cracked.</p>
<p>&nbsp;</p>
<h2>Change Up Your Characters</h2>
<ul>
<li>Use at least one upper case letter</li>
<li>Use at least one lower case letter</li>
<li>Use at a handful of numbers</li>
<li>Use symbol characters from this special set: &#8216; ! @ $ % ^ &amp; * ( ) &#8211; _ = + [ ] ; : &#8216; &#8221; , &lt; . &gt; / ?</li>
<li>Use at least eight characters</li>
<li>Try not to use repeating characters</li>
<li>Don&#8217;t use spaces</li>
</ul>
<p>&nbsp;</p>
<h2>Don&#8217;t Use Predictable or Dictionary Words</h2>
<ul>
<li>Do not use a common, dictionary word—not even spelled backwards</li>
<li>Don&#8217;t use your name, a relative&#8217;s name, a close friend’s name, or pet&#8217;s name, either</li>
<li>Don&#8217;t use personal numbers, such as your driver&#8217;s license, license plate, social security, telephone, or birth date</li>
<li>Don&#8217;t <strong>ever</strong> use the word &#8220;Password&#8221; or any iteration of the word as it would be hacked almost instantly</li>
<li>It’s a good idea to change your passwords monthly. And if you must write them down, put them in a safe place and don’t include the URL</li>
<li>Use a password that is at least 8 characters long, but 20 characters would be best</li>
<li>Some examples of good passwords would be: Th1$isG00d!, B3nR0ck$, L3etSp3ak!</li>
<li><strong>Don&#8217;t use the above passwords!</strong> In fact don&#8217;t use any password you have seen on the internet as it is already known and no longer a secret to you</li>
</ul>
<p>&nbsp;</p>
<h2>The Personal Algorithm Method</h2>
<p>Many people use the same passwords for everything and this can be a problem. If your email gets hacked, the criminal may also gain access to your bank account if it uses the same password. But some people can&#8217;t remember random 8 character passwords for 50 different sites. To solve this quandary try creating a personal password algorithm. An algorithm is just a set of rules that can be applied the same way to different sites, and will result in a different password for each. For example, my algorithm could start with my dog’s name using some special characters (jon=j#n). I could then add the second and third letters of the website name (capitalized), and my favorite number (1337). If I was creating a password for paypal.com using this algorithm, my password would be j#nAY13gee37. Using the same set of rules, my password for Google.com, j#nOO1337.</p>
<p>Using a personal algorithm is one of the easiest to remember, and most secure methods. Albeit a 20 to 26 character password comprised of random characters is the most secure, it can be somewhat impractical for the average user.</p>
<p>&nbsp;</p>
<h2>Need Help Training Your Staff?</h2>
<p>VRam Computers has comprehensive training slideshow that you can use to train your staff, we can even customize it to your company&#8217;s specific needs. Call us today for a quote or to schedule one of our security consultants to come to your company and train your staff for you.</p>
<p>The post <a rel="nofollow" href="https://www.vramcomputers.com/passwords/">Creating Secure Passwords</a> appeared first on <a rel="nofollow" href="https://www.vramcomputers.com">VRam Computers</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.vramcomputers.com/passwords/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
						<post-id xmlns="com-wordpress:feed-additions:1">88</post-id>	</item>
		<item>
		<title>Backup Your Data</title>
		<link>https://www.vramcomputers.com/backup-data/</link>
				<comments>https://www.vramcomputers.com/backup-data/#respond</comments>
				<pubDate>Mon, 29 Sep 2014 03:04:18 +0000</pubDate>
		<dc:creator><![CDATA[Jason]]></dc:creator>
				<category><![CDATA[Tips]]></category>

		<guid isPermaLink="false">http://www.vramcomputers.com/?p=82</guid>
				<description><![CDATA[<p>Recommendations for Data Backup Creating a backup can sometimes seem like a daunting task, but here are some tips on how to do so with ease. Backing up data regularly ensures that personal documents, photos, and other important files are secure in the event of a technology malfunction. Local Backup Transfers data to a separate [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.vramcomputers.com/backup-data/">Backup Your Data</a> appeared first on <a rel="nofollow" href="https://www.vramcomputers.com">VRam Computers</a>.</p>
]]></description>
								<content:encoded><![CDATA[<div class="">
<h1>Recommendations for Data Backup</h1>
</div>
<p>Creating a backup can sometimes seem like a daunting task, but here are some tips on how to do so with ease. Backing up data regularly ensures that personal documents, photos, and other important files are secure in the event of a technology malfunction.</p>
<h2>Local Backup</h2>
<p>Transfers data to a separate type of media, such as a CD/DVD, external hard drive, USB Flash drive, or Windows Home Server. For people who like backups of backups, especially for financial data, this provides a way to store the data offsite at another location.</p>
<p><strong>Advantage</strong> &#8211; Backups and restores are fast and accessible. Copies can be placed offsite for complete peace of mind.</p>
<p><strong>Disadvantage</strong> &#8211; Cost of media or server can be expensive. Even though the media might be very resilient, it is still susceptible to physical failure.</p>
<p>&nbsp;</p>
<h2>Using an Online &#8220;Cloud&#8221; Backup Solution</h2>
<p>These backups are stored online and can be accessed from anywhere and often by multiple computers. The data is often stored in a secure online location that is accessible with a password you create. See <a title="Creating Secure Passwords" href="https://www.vramcomputers.com/passwords/" target="_blank">creating secure passwords</a> for recommendations on password strength.</p>
<p><strong>Advantage</strong> &#8211; The most secure method and can be accessed anywhere. Backups can be setup to automatically happen in real time.</p>
<p><strong>Disadvantage</strong> &#8211; Usually requires a subscription cost and regular online access.</p>
<p><strong> No matter which backup solution(s) you choose, it&#8217;s a good idea to follow these steps:</strong></p>
<ul>
<li><strong>Create a checklist</strong>
<ul>
<li>Document the files and folders to be saved. Back up the most important files first.</li>
</ul>
</li>
<li> <strong>Create a schedule</strong>
<ul>
<li>Consumers may back up important information once a week. Small businesses may do so daily. Most backup software can be programmed to consistently backup automatically.</li>
</ul>
</li>
<li><strong>Verify the backup</strong>
<ul>
<li>Load information from the storage device back to the computer to ensure that the data copy is intact.</li>
</ul>
</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.vramcomputers.com/backup-data/">Backup Your Data</a> appeared first on <a rel="nofollow" href="https://www.vramcomputers.com">VRam Computers</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.vramcomputers.com/backup-data/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
						<post-id xmlns="com-wordpress:feed-additions:1">82</post-id>	</item>
		<item>
		<title>Data Safety</title>
		<link>https://www.vramcomputers.com/data-safety/</link>
				<comments>https://www.vramcomputers.com/data-safety/#respond</comments>
				<pubDate>Sun, 28 Sep 2014 01:25:13 +0000</pubDate>
		<dc:creator><![CDATA[Jason]]></dc:creator>
				<category><![CDATA[Tips]]></category>

		<guid isPermaLink="false">http://www.vramcomputers.com/?p=90</guid>
				<description><![CDATA[<p>Keeping Your Data Safe When information is lost, either to a system crash or to hackers, it can feel like we are losing a piece of our lives. That&#8217;s why keeping our data secure and safe is of the up-most priority. Tips to keep in mind that will help keep your data safe from both [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.vramcomputers.com/data-safety/">Data Safety</a> appeared first on <a rel="nofollow" href="https://www.vramcomputers.com">VRam Computers</a>.</p>
]]></description>
								<content:encoded><![CDATA[<div class="">
<h1>Keeping Your Data Safe</h1>
</div>
<p>When information is lost, either to a system crash or to hackers, it can feel like we are losing a piece of our lives. That&#8217;s why keeping our data secure and safe is of the up-most priority. Tips to keep in mind that will help keep your data safe from both an internal malfunction or an external invasion.</p>
<ul>
<li class="number">Be proactive with your protection software. Anti-virus software is a basic requirement and can be obtained either on a subscription based model and/or a free model. Anti-malware often comes bundled with anti-virus, but if not, can also a good tool to have in your arsenal.</li>
<li>Viruses and spyware can creep into your computer and easily degrade performance and corrupt and/or destroy data.</li>
<li>Use a firewall. Firewalls assist in blocking dangerous programs, viruses or spyware before they infiltrate your system. Various software companies offer firewall protection, but hardware-based firewalls, like those frequently built into network routers, provide a better level of security.</li>
<li>Be cautious of suspicious emails from unknown sources. Don’t open emails with attachments if you don’t know the sender.</li>
<li>Steer clear of websites of ill repute. These are havens for malicious and annoying intruders like spyware.</li>
<li>Keep your operating system updated. Repair the security holes that hackers love to exploit with the newest critical updates from Microsoft or Apple.</li>
</ul>
<p>Consistent data backup is also a crucial component. Backing up to a separate media device or an online backup solution on a regular basis ensures that your important files are secure. Take a look at our <a title="Backup Your Data" href="https://www.vramcomputers.com/backup-data/" target="_blank">backup your data</a> post for tips and recommendations for data backup.</p>
<p>The post <a rel="nofollow" href="https://www.vramcomputers.com/data-safety/">Data Safety</a> appeared first on <a rel="nofollow" href="https://www.vramcomputers.com">VRam Computers</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.vramcomputers.com/data-safety/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
						<post-id xmlns="com-wordpress:feed-additions:1">90</post-id>	</item>
	</channel>
</rss>
