Home » How to Create Better Passwords

How to Create Better Passwords

3 Tactics Hackers Use to Steal Passwords

Passwords, a basic yet essential part of cybersecurity, are the first line of defence against cyberattacks in our increasingly digital world. However, according to research from Check Point Software, many users are under the false impression that cybercriminals have no interest in their personal information or data on their computers. And it is for this reason that the robustness and strength of passwords are more important now than ever. With that in mind – thanks to Checkpoint – here are three of the tactics used to steal passwords along with the necessary steps to prevent any person from becoming a victim of cybercrime: 1. Phishing attacks This method has become one of the most widely used tactics for stealing passwords and usernames. It works in a simple way: by sending an email that a...

5 Things to Keep in Mind when Creating the Perfect Password

Sourced from Travellers Using a strong, original and memorable password is one of the first things you can do to make sure you’re protected from cyber-threats. With that in mind, here are five things you can do to create the perfect password: 1. Remember the longer the betterWhen it comes to your password, try to include as many unique characters as possible – this makes it more difficult for hackers to crack. Mix letters, numbers, and punctuation and, when possible, include both uppercase and lowercase letters. Made up or altered words are better than actual words. You should go for passwords that are a minimum of 12 to 14 characters in length. A longer password would be even better. 2. Avoid obvious number combinations like calendar dates or phone numbersDon’t use account numbers, b...

5 Steps to Protect Yourself and Employees from Android-Based Cyber Threats

Sourced from International IDEA While nearly 9 in 10 companies not only allow but actually rely on their employees to access critical business apps using their personal devices, according to a recent Fortinet Threat Landscape Report, Android-based malware now represents 14% of all cyber threats. In addition to direct attacks, the number of compromised web sites, email phishing campaigns, and malicious access points continue to grow exponentially, infecting unsuspecting users – regardless of their devices –with spyware, malware, compromised applications, and even ransomware. And whenever a personal device of any of your employees becomes compromised, they can represent an increased risk to your organisation as well. In addition to deploying mobile device management software a...