Are Random Password Generators Safe?

Many people look to random password generators to produce a password that will be hard to guess. The idea of a generator is to generate a password that is not easy to guess. A lot of people tend to use personal information that is easy to obtain via social media. An important concept to grasp from this is not to use any publicly known information as a password. However, the question remains, are random password generators safe? The answer is yes, and no. Let’s clarify why it can go either way.

A random password generator is secure to use because it does not include any private information as a password. A lot of people tend to post a lot of information on social media; examples include pet names, nicknames, parent’s names, and so forth. Not to say that you shouldn’t post any information you want, just don’t incorporate that information into your password. Hackers use social engineering to crack passwords, so by adding personal data, the door is left wide open to compromise your accounts.

Now let’s explore how a random password generator can be unsafe. While generating a password online, there is no clear cut way to distinguish if your password stays on that website. Yikes, not another compromised case for your business to stress over. However, having good cybersecurity policies and an IT company with strict password policies can help prevent that from happening. When utilizing a random generator, it’s essential to keep the passwords longer than twelve characters and change your password every six months. By implementing these policies, your accounts will be secure due to not using your dog’s name as your password.

CoreRecon has specialists who are accustomed to how passwords can be compromised. We have tools that help discover whether you have had your password compromised. We are here to keep your data and your business protected. Trust CoreRecon to ensure your business is not the next headline because company data was compromised. Our staff is highly skilled and equipped to prevent situations like this from occurring. If you have any questions or would like to know more information on the services we provide, feel free to contact us at 361-248-3258. We are available 24/7 for your IT and cybersecurity demands.

361-248-3258 |

Zoom: How Do You Use It?

What is Zoom? Zoom is a video-conferencing application that allows online meetings, chat, and collaborations. Many teachers are using Zoom as their classroom, which allows students to be more involved. Many judges in Texas are beginning to use Zoom as their virtual courtroom. Zoom is available on Windows, macOS, iOS, and Androids. Many people are using Zoom to communicate with each other and just allowing there to be collaboration during the stay-at-home or shelter-in-place order It’s an excellent way to continue to keep in contact the way you need to while social distancing.

Let’s cut to the chase, how do you use Zoom? First, make sure you sign up for an account or log on. If it’s work-related definitely recommend a login with your work email.

Screenshot of the sign-up page

Next is to get logged in and start working. In order to understand Zoom a little better, it’s essential to play with it a bit and get familiar with the website.

There are multiple features included in Zoom. You can either host or join a meeting. Join a meeting by clicking, “Join a meeting”. You will then be prompted with a pop up that states to enter your “meeting ID” this should be provided by the host of the meeting. Next, you join, and congratulations you’re now attending a Zoom meeting. Another feature is to start your own meeting. To do this you will click the “Host a meeting,” this is where you will see various options about the video, audio, and screen sharing. Be extra careful because by sharing your screen it will allow the attendees to have access to your screen. Make sure that you do not have personal or private information on your screen anywhere. By doing this it will allow you to keep your personal data safe. It’s also essential to mark the meeting private if you do not want anyone other than the people you are inviting to be in attendance.

Overall, using Zoom is a great way to practice social distancing. When used correctly, it is beneficial. I have included below a link to a website which provides some do’s and don’t’s of video conferencing. If you need help with remote work, please do not hesitate to give us a call, we are always available to assist. Stay safe and healthy! Thanks for reading.

Contact CoreRecon at 3612483258, available 24/7. #CorpusChristi #Texas

Link to article with do’s and don’t’s

Follow CoreRecon on Twitter:

Coronavirus and Cybersecurity

As the Coronavirus pandemic swings into full effect, most businesses are closing down. Many people are being forced to work from home for social distancing purposes. Working from home is convenient, but convenience isn’t always secure. Using remote desktop can be dangerous because someone can hack into your pc and steal your companies data if you are not using a secure connection. Now is the time that hackers will be working harder. That has many people asking, what can be done to ensure data safety?

There is a screen sharing software that can be used to access your desktop from work. Another way to work from home safely is to use a VPN. Using a VPN allows there to be a layer of security over your companies information.

VPN (Virtual Private Network): “allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more…”

VPN access can get given by your IT provider. VPNs in the business setting allow access to company data via a firewall. This allows you to work from home and access your files while remaining protected. Firewalls are essential to protect your company’s data. A firewall is your business’s first line of defense.

Firewall: ” a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules”

Coronavirus has instilled much panic and fear everywhere. The last thing on your mind should be your business exploited as a result. Contact CoreRecon to ensure your company’s data stays safe while you work from home. We are available 24/7 to help you keep your business safe. Remember to wash your hands, stay home if you feel sick, and stay safe. As Matthew McConaughey said, “every red light turns to a green light”.

As for our customers, we will be here 24/7 to help you with any issues and questions you have regarding working from home. Please contact us if you have any questions.

Thanks for reading!

Don’t be the next headline!

Contact CoreRecon at 3612483258 or

Follow CoreRecon on Twitter:

TikTok and Its Hidden Vulnerabilities

Many people are using TikTok these days. If you haven’t heard of TikTok, you are part of the rare crowd. TikTok is video-sharing social networking, basically the new Vine. There are over 1.5 billion uses globe-wide within a two and a half year span.  TikTok has spread to Facebook, Twitter, and even Instagram.

How can hackers use TikTok to hurt users:

  • Manipulating content in Tik Tok user accounts
  • Erasing videos
  • Uploading unapproved videos
  • Changing private videos to be publicly available
  • Expose private information like personal email addresses


How are they doing this?? By sending malicious links with spoofed messages, they are gaining access to TikTok profiles. Social engineering is also a way that hackers are getting access to TikTok user profiles.

Since TikTok has been looking to grow quickly, they have not given security vulnerabilities much needed attention. However, back in 2019, TikTok was fined 5.7 million dollars for collecting personal information illegally from minors. *Yikes* Soldiers are not permitted to make TikTok’s while in uniform. The Navy and the Army have banned the application on December 30th. 

It has many vulnerabilities, and it has the potential to be very risky for minors. Parents, please monitor your children’s TikTok. Very important to follow your children’s social media and make sure they are not being taken advantage of. Thanks for reading!

Don’t be the next headline, contact CoreRecon at 3612483258

Big thanks to Medium for providing this insightful information. 

Photo creds to Wikimedia Commons for the TikTok logo

Follow CoreRecon on Twitter: