Eight Ways to Create Stronger Passwords and Protect Your Accounts

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Eight Ways to Create Stronger Passwords and Protect Your Accounts-6 Next

Use a password manager.

A password manager is an application that helps manage your passwords and login info for your site memberships, as well as secret security questions for the "forgot password" screen. Many of them allow syncing between devices, and storing all the data on their servers on the Internet. Carefully research the different password managers before choosing one. Have there been any issues with the password manager safely storing passwords both locally and on the Internet? Properly implemented password managers are safer to use when saving to the Internet. While Jardine doesn't endorse any specific password manager, he personally uses SplashID from SplashData. There are many other ones out there like LastPass and Security Everywhere. The key is finding a password manager that aligns with your devices and specific needs.

Chances are that you or someone you know has had an account hacked. But do you know how the cyber attacker broke through? In order to truly understand how to protect yourself, you need to understand how personal security breaches occur.

In the movies, cyber attackers shuffle through papers and photos for clues, guessing passwords until they pick the right combination and are granted access.

That is not how it happens in real life.

Cyber attackers use tools to automate the process and then conduct mass attacks across the Internet. These tools use dictionaries, lists of common words or passwords, and then try each one in succession. The name of your dog and birthday don't come into play during an automated attack, and therefore don't matter.

Yet there are steps you can take to help keep your accounts from being breached. Security expert James Jardine of Secure Ideas shares simple ways to foil cyber attackers by creating stronger passwords.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.