Eight Ways to Create Stronger Passwords and Protect Your Accounts

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Previous Next

Click through for eight ways to foil cyber attackers by creating stronger passwords, as identified by James Jardine, principal security consultant at Secure Ideas.

Chances are that you or someone you know has had an account hacked. But do you know how the cyber attacker broke through? In order to truly understand how to protect yourself, you need to understand how personal security breaches occur.

In the movies, cyber attackers shuffle through papers and photos for clues, guessing passwords until they pick the right combination and are granted access.

That is not how it happens in real life.

Cyber attackers use tools to automate the process and then conduct mass attacks across the Internet. These tools use dictionaries, lists of common words or passwords, and then try each one in succession. The name of your dog and birthday don't come into play during an automated attack, and therefore don't matter.

Yet there are steps you can take to help keep your accounts from being breached. Security expert James Jardine of Secure Ideas shares simple ways to foil cyber attackers by creating stronger passwords.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Poremba2016Security0x 10 Security Trends to Look for in 2016

So what is on the horizon for 2016? Most experts expect to see continued growth in mobile malware and even more security breaches, especially in the health care and financial industries. ...  More >>

Security86-290x195 Reduce Data Breach Damage by Improving Detection and Response

The new age of security technology will focus on solutions that speed up, automate and ideally combine phases of the typical security process. ...  More >>

eCommerce13-190x128 9 Ways Online Retailers Can Protect Customer Data Privacy During the Holidays

Experts recommend online retailers consider these issues before hitting the busy shopping season to better ensure their security is running smoothly. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.