Thoughts from the team at Mission Data

Get to Know Two Factor Authentication

No matter how complicated your passwords are or how well you’re storing them, you have to trust that the site you’re using is doing security correctly. If they’re not, your password could be leaked out onto the Internet, where any evil villain could use your credentials for no good. In fact, in most cases, you should probably just assume that every password you have will be stolen at some point.

It’s not all bad news though. There are methods to keep attackers out of certain accounts, even if you posted your password out on the Internet for all the world to see (this is an extreme example, please don’t do this!). Today we’re going to explore one of those methods, called Two-Factor Authentication.

Read More »

How We Work: DocsFlow

Our team of designers, developers and writers are experts at figuring out the right tools to use for producing great work. Of course we use a lot of the usual suspects (Photoshop, HTML, Google Docs, Basecamp, Sublime) but we also use some lesser known gems and have developed our own techniques and workflows. These things helps us work better, smarter and more efficiently and we think you should know about them.

So today we’re introducing a new occasional series of posts called “How We Work.” Each “How We Work” post will highlight a particular tool, technique or workflow that helps us do our jobs better. DocsFlow is the first tool we want to spread the word about.

Read More »

Yes Virginia You Do Need a Complicated Password Scheme

Recently there’s been a great deal of discussion about the security of passwords. Events like Heartbleed (which we discussed last month) and data breaches at large websites like AOL, Kickstarter and Ebay have highlighted just how prevalent website security issues are and how imperfect passwords are at keeping our data safe. But even though they are imperfect passwords aren’t going away anytime soon. So how do we, as web users, go about becoming more secure in a time where security breaches are becoming more commonplace?

Read More »

Wizardry: Something for Everyone

A common theme among new sites we’ve developed for partners over the past year is the inclusion of wizards or modelers. These robust tools give site owners the benefit of content that will appeal to their audience as a whole while simultaneously giving users content tailored for them as individuals.

This technique is useful for a wide variety of sites and companies. Two recent examples are the GangsAway Genie for suggesting cities to retire in and the Defined Contribution Modeler tool for Mercer’s Healthcare Exchange.

Read More »

The Specialists

Everyone needs the occasional bit of outside help. Even large companies with in-house IT departments. Those IT departments are focused on enterprise software, massive website infrastructure, information security and other really big problems.

Read More »

Respect The Users

Web designers have long battled against the concept of “the fold”. The term originated with the printed page, specifically newspapers. When a newspaper is folded on a rack or table what you see on the top of the front page, literally above the fold, is the most important and relevant information to share with your reader. It’s where newspapers feature large headlines and graphics that hopefully grab the reader’s attention and convince him to buy the paper.

Read More »