Password lessons from security breaches

by Enstep Team | Aug 9, 2012 | Security

Security_August08_AWith the increasing number of high profile security breaches in the past few months, many netizens are wondering if their information is secure and what they can do to ensure it stays secure, even when sites they use have come under attack. One of the keys to secure information is a secure password, without it, you’re practically inviting people to steal your information.

Here are three tips on ensuring that your password is secure and how to keep it that way.

Strength is important
Websites use a security method called hashing to ensure your passwords are secure. Hashing is an algorithm that encodes your password, making it theoretically harder to unravel.

You shouldn’t trust on hashing to keep your password secure as recent breaches have shown that a company’s hashing may not be secure. Instead, pick a password that’s hard to guess. The most effective passwords have no full English words and a mixture of numbers and symbols. e.g., San1@3 is more secure than San123.

Watch for apres-hack emails
After a company’s systems have been hacked and account information stolen, scammers often jump at the opportunity to send emails to users. These emails are designed to look like they come from the company when they really are phishing campaigns aimed at getting you to enter your personal information, or have links to websites with malware. If you get an email from a website, don’t click the links in the email. You should go directly to the website in your browser and log in from there.

Have more than one password
Ideally you should use a different password for each website you have an account with, however, it can be hard to remember so many passwords. At the very least you should have separate passwords for work, personal and bank/financial related accounts.

If you’re worried about the strength of your password or the general security of your devices please contact us, we may have a solution for you.

Published with permission from TechAdvisory.org. Source.

Related Posts

Digital Defense: Essential Security Practices for Remote Workers

Digital Defense: Essential Security Practices for Remote Workers

The rise of working remotely has redefined the modern workplace. Gone are the days of rigid office schedules and commutes. But with this flexibility comes a new set of challenges – cybersecurity threats. Remote work environments often introduce vulnerabilities to your...

What is a Network Security Assessment?

What is a Network Security Assessment?

A network security assessment is a vital process that reveals the secrets of evaluating and strengthening your network defenses. In today's interconnected world, where cyber threats lurk around every corner, understanding the concept and purpose of a network security...

Preventing Phishing Attacks with Managed IT Services

Preventing Phishing Attacks with Managed IT Services

Phishing attacks have risen recently as many businesses store sensitive data online. Studies show that three billion phishing emails get sent daily. One of the best ways of preventing phishing attacks is by investing in managed IT services, and you’ll see how....

FIND OUT WHAT YOUR BUSINESS SHOULD EXPECT TO PAY
FOR HOUSTON TECH SUPPORT

Give us a call and discover how great local IT services and computer support can be!