Eight Ways to Create Stronger Passwords and Protect Your Accounts

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Previous Next

Click through for eight ways to foil cyber attackers by creating stronger passwords, as identified by James Jardine, principal security consultant at Secure Ideas.

Chances are that you or someone you know has had an account hacked. But do you know how the cyber attacker broke through? In order to truly understand how to protect yourself, you need to understand how personal security breaches occur.

In the movies, cyber attackers shuffle through papers and photos for clues, guessing passwords until they pick the right combination and are granted access.

That is not how it happens in real life.

Cyber attackers use tools to automate the process and then conduct mass attacks across the Internet. These tools use dictionaries, lists of common words or passwords, and then try each one in succession. The name of your dog and birthday don't come into play during an automated attack, and therefore don't matter.

Yet there are steps you can take to help keep your accounts from being breached. Security expert James Jardine of Secure Ideas shares simple ways to foil cyber attackers by creating stronger passwords.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

CyphortSecurityParadigm0x Don't Let the IT Security Paradigm Shift Leave You Stranded

While funding and awareness have increased, it is unclear if organizations are making investments that keep up with the evolving security landscape. ...  More >>

AlientVaultMSSPMistakes0x Five Mistakes Managed Security Service Providers Should Avoid

MSSPs are at an exciting point where market acceptance, awareness and demand have converged. However, excitement and the prospect of profits can create haste, and with haste comes an increased risk of mistakes. ...  More >>

ITCareers34-190x128 Data Protection: Five Challenges Facing the Enterprise HR Department

HR departments are faced with unique security challenges - securing the flow of PII as well as sharing policies and inter-office communications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date