Archive for September, 2009

Using the Java Contactor for password protection

Monday, September 7th, 2009

Use the Java Contactor to protect your business or personal assets. As the following Morningstar article recommends, protecting your passwords is a best practice to avoid identity theft. In addition to using complicated passwords, it is best to have a different password for each online site. Once you use the Java Contactor to save passwords in an encrypted (protected) database, you can click on the website from within the Java Contactor to go to the login page making your password protection strategy easy and safe.

Be Password-Savvy

“Also be careful with the passwords that you use, particularly on sites where you conduct transactions or provide personal financial information. Don’t use obvious passwords, such as the name of your spouse or pet, or your birthday; that makes it easy for identity thieves to guess at yours. Also don’t use the same password again and again. The hardest-to-hack passwords are gibberish or use a combination of numbers and letters.

Windows will ask you whether you want it to “remember” your passwords, and then it will populate the password field automatically. That makes it a lot easier to surf online, but be careful when using this feature. Use it only when you’re on sites that don’t store sensitive information, such as your local newspaper’s site, rather than on sites where you actually execute business transactions. You can also shut off the Windows feature that asks you whether you want it to remember your passwords.

Using “password manager” software is another way to guard against phishing and other online scams. These programs store your user names and passwords and encrypt your information so it’s not accessible to hackers; however, these programs may not be able to handle some of the more complicated password formats that some banks require.

If you manage your various user names and passwords on your own, perhaps by maintaining a Microsoft Word or Excel document on your computer, take care to ensure that document’s safety. If your workstation doesn’t require a password to log on, take the step of password-protecting your document (Four Strategies for Avoiding Identity Theft,”