Welcome, Guest
TELECOM LISTINGS MARKETPLACE: BUY & SELL TELECOM EQUIPMENT
Learn and Explore

In the last month, the 2012 LinkedIn security breach resurfaced when news broke that the 164 million stolen records were for sale on a dark-web marketplace. The records were confirmed legitimate and an almost 25-times increase from the initial claim of 6.46 million records. LinkedIn is the most popular business-oriented social networking service and professional networking website in the United States, ranking in the top 20 globally by analytic provider Alexa.

Telecom Listings takes security very seriously, so we’ve put together this guide to help your Internet security initiative.

2012 LinkedIn Account Security Breach

Password Security

It cannot be said enough: PASSWORD STRENGTH IS IMPORTANT. 76% of data breaches are caused by weak passwords, according to a CIO report. If you have a LinkedIn account and haven’t changed your password since 2012, do it now.

Leaked Source, a collaboration of data found online in the form of a search engine, posted the top 49 passwords that were listed in the LinkedIn breach.

Microsoft has a list of banned passwords that accounts cannot use that’s updated in response to major breaches, protecting users from being an easy target.

Pros & Cons of Tips for a Strong Password

We all just want to be as secure as possible in the World Wide Web and reduce our chances of being hacked. Blogs and websites provide advice on the keys of password security, usually contradicting one another as a result. Telecom Listings isn’t going to tell you what to do and what not to do – but, we will tell you the common topics and compare their arguments so you can have insight for your own conclusion.

Frequently update passwords

  • Pro: Even if hackers obtain your password, it will become useless once you change it.
  • Con: Even if hackers obtain your password, they can immediately change it before you have the chance. Plus, you’re more likely to forget passwords by routinely changing them.

Unique passwords for different websites

  • Pro: Prevents hackers from easily accessing all of your online accounts if you use one or a few passwords.
  • Con: Depending on how many accounts you’ve registered for, creating a unique password for every single account and remembering each one can be difficult.

Passwords with C#@ra(+3r$!

  • Pro: Adding numbers, characters, and symbols increase the possible combinations and decrease the simplicity of 123456 or passw0rd. Some people use online password generators, which is okay because the website doesn’t know how or if you use it.
  • Con: Complex passwords are so unusual that they’re often saved elsewhere, listed in word processor or spreadsheet document.

The Pro these “tips” share: Password strength. Password cracking and brute-force attacks are less effective and more difficult with a variety of strong passwords compared to any use of abc123, password1, and 654321.

The Con these “tips” share: Password inventory. The more you update your passwords… The more passwords you have… The more creative and bizarre your passwords are… The less likely you’ll remember them. To overcome this obstacle, people store their credentials in a word processor or spreadsheet document. One intrusion and those passwords lose the security they were meant to keep.

Suggestions for Creating a Strong Password

In an effort to rid the world of weak passwords, we hope you get inspired for a new password beyond consecutive letters and numbers. You can always use a mixture if your ideas are on the shorter side, such as LeoTea or BlueCher. Again, Telecom Listings cannot promise and will not guarantee that these ideas will prevent anything; we simply want to discourage the use of the top 49 passwords.

Letters

  • Use a family member or friend instead of yourself
  • Astrological sign or Zodiac symbol
  • Beverage, flavor, or scent
  • Color or pattern
  • Last name of: actor, artist, athlete, author, designer, fictional character

Numbers

  • Use dates that you shouldn’t forget but always do
  • Phone number digits (first three; last four; area code of another city)
  • Enter at the beginning (0229abc instead of abc0229) or in the middle (Leo0229Tea)
  • Bookend dates (02abc29 for February 29)

You can only do so much, so do what you can

The Reality: If a hacker wants LinkedIn’s database and succeeds, you can’t prevent it because the servers and information belong to LinkedIn. What you can prevent is your own servers, database, and information.

On June 14th, a U.S. Court of Appeals upheld the net neutrality rules that have been in effect since last year. Both praised and criticized, the decision is a very important event in telecommunications history that affects technology corporations and consumers.

Net neutrality is the equal treatment of the Internet and data by service providers and mobile carriers. The purpose of the FCC Open Internet Order is to define fixed and mobile broadband “common carriers” and prohibit practices that may interfere with the ability to access content online. The issue of net neutrality gained momentum in 2007 after it was discovered that Comcast was blocking and slowing BitTorrent traffic to manage traffic at peak times.

What does this mean for consumers, business owners, and users of Telecom Listings? No change. Internet service providers must abide by the “final rule” of Protecting and Promoting the Open Internet. If the rules had not been upheld, then it’d have been likely that ISPs would make changes to Internet access plans.

If you wish to learn more about net neutrality, Telecom Listings provides the following resources:

Telecom Listings is an online marketplace for new, used, and refurbished telecommunications equipment. Founded in 2016, our home offices are located in Green Bay, Wisconsin, USA.

We welcome inquiries from the media about our company, services, and activities. Please direct all inquiries to: media@telecomlistings.com

Telecom Listings can also be found on social media.

Mobile phones have evolved from brick and flip phones to touchscreen phones and phablets. Now, the way that telephones make calls is changing. Voice over Internet Protocol (VoIP) is the latest established mode of communication and embraced by businesses for its benefits including cost savings and flexibility. An IP phone can be a hardware device or software download – yes, a desk phone may not even be needed to make calls. How else has telecommunications evolved with VoIP?

Voice over Wireless Fidelity (VoWiFi) connects to a wireless network instead of Ethernet or cellular networks. VoIP is typically connected to the Internet via Ethernet, so VoWiFi functionality depends on the device instead of the service. There are wireless IP phones that resemble cordless digital phones and fixed phone systems with Bluetooth capabilities for headsets. Some mobile phones have a build-in option for Wi-Fi calling, which is useful if you’re in an area with a weak carrier signal. Otherwise, devices without that option or no cellular coverage will need to download a separate application.

VoWiFi splits off into two further categories representing the type of device. Voice over Wireless LAN (VoWLAN) is very similar but more restrictive than VoWiFi, connecting to a wireless broadband network only. VoWLAN is how designated wireless IP phones work to use your wireless access point and how devices with no cellular service can use applications. Mobile VoIP (mVoIP) connects to both WLAN and cellular networks, extending the mobility of a VoIP network. A single phone call can switch networks and transfer devices (with the appropriate tools, of course).

Which VoWiFi or Wireless IP Phone is for me?

If you’re looking for office mobility, a cellular network isn’t necessary and VoWLAN will work best as long as your WAPs are strategically located. If you’re looking to communicate in and out of the office, mVoIP will a cellular device will keep you connected using the strongest available network. If you’re new to the world of VoIP, be sure to do your research before purchasing a phone and agreeing to a service plan so you get the features and capabilities you want.

By donatella 2 years ago
In the last month, the 2012 LinkedIn security breach resurfaced when news broke that the 164 million stolen records were ...
By donatella 2 years ago
On June 14th, a U.S. Court of Appeals upheld the net neutrality rules that have been in effect since last year. Both pra ...
By admin one year ago
Telecom Listings is an online marketplace for new, used, and refurbished telecommunications equipment. Founded in 2016, ...
By donatella 2 years ago
Mobile phones have evolved from brick and flip phones to touchscreen phones and phablets. Now, the way that telephones m ...