ZR Systems Blog

ZR Systems has been serving the Aiea area since 2006, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: It’s Now a Crime to Share Your Netflix Password

Warning: It’s Now a Crime to Share Your Netflix Password

“What’re you in for?” a prison inmate asks. “I shared my Netflix password with my sister,” you say. This conversation might be absurd, but according to a recent ruling in accordance with the Computer Fraud and Abuse Act, it’s one that could actually happen. Now, sharing your Netflix password to let someone catch up on their favorite TV show can be considered a federal offense.

Continue reading
0 Comments

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

In a recent hack attack, Twitter had 33 million user login credentials stolen. This is unfortunate, but not surprising; an incident like this routinely makes the headlines. Although, what is surprising is what this hack reveals about people’s poor password security habits.

Continue reading
0 Comments

The US Military Plans to Bring Biometric Passwords to the Public

b2ap3_thumbnail_biometric_security_systems_400.jpgHumans are always trying to improve security protocols that can protect against increasingly advanced online threats. Unfortunately, the threats only grow stronger in response, and the war against malicious online activity rages on. Biometrics are security measures that are growing in popularity, but are expensive and difficult to integrate. Now, the US military is funding a campaign to make it more readily available to end users.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Privacy Best Practices Cloud Technology Hosted Solutions Windows 10 Backup Business Computing Hackers Microsoft Office Business Network Security Disaster Recovery Workplace Tips Software Upgrade Hardware Email VoIP Efficiency Malware Business Continuity Server Small Business Quick Tips Employer-Employee Relationship Windows IT Services Data Mobile Devices Alert Save Money Network Ransomware Computer Managed IT Services Remote Computing Operating System Microsoft Office Passwords Browser Business Management Hacking Internet Productivity Social Engineering Communication Health Telephone Systems communications Managed Service Provider Innovation User Tips Social Media WiFi Mobility Password Virtualization Productivity Cloud Computing Facebook Marketing Artificial Intelligence Best Practice Gmail Office Tips Education Data Management Tech Support Law Enforcement Networking Staff Smartphones Meetings HaaS Data Breach DDoS Bandwidth Internet Exlporer Office 365 Flexibility Application Work/Life Balance IT Support Collaboration Customer Relationship Management IT solutions Risk Management Google Outsourced IT Cybersecurity Smartphone Miscellaneous Private Cloud Encryption Holiday Recovery Cybercrime Bloatware eWaste Biometric Security Assessment Computing Infrastructure Spam Blocking Books Two-factor Authentication Government Save Time Remote Monitoring Tools Environment Website Phishing Television Business Intelligence Shortcut Big Data Workers Settings Techology Public Computer Saving Money Worker Commute Data recovery Shadow IT Emergency Telephone System Files Employer Employee Relationship Tablets Training Automobile Data Backup Social WIndows 7 Retail Excel Patch Management Cryptocurrency User Error Hiring/Firing App Distributed Denial of Service Manufacturing Phone System Telecommuting Spam VPN Fax Server Cryptomining End of Support Worker Legal BDR Hard Drives Cabling Entertainment Remote Work Social Networking Wireless Technology Transportation Managing Stress Database Internet exploMicrosoft Mobile Device Current Events Memory Consultant Cables Politics Identity Theft Bring Your Own Device Computers Budget Mobile Computing Wireless Chrome Windows 10 Advertising Rootkit Lithium-ion battery Best Available Users Avoiding Downtime Keyboard Credit Cards Mobile Device Management Firewall Paperless Office Vendor Management Scalability Network Congestion Customer Service IT Infrastructure USB Fraud Two Factor Authentication Windows 8 Business Technology Public Cloud SaaS Black Market IT Support Entrepreneur Notifications Windows 7 Wi-Fi OneNote Going Green Tablet SharePoint Android Hybrid Cloud Applications Managed IT Services Maintenance Windows Server 2008 R2 Troubleshooting Evernote Electronic Medical Records

Blog Archive