Eight Ways to Create Stronger Passwords and Protect Your Accounts

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Previous Next

Click through for eight ways to foil cyber attackers by creating stronger passwords, as identified by James Jardine, principal security consultant at Secure Ideas.

Chances are that you or someone you know has had an account hacked. But do you know how the cyber attacker broke through? In order to truly understand how to protect yourself, you need to understand how personal security breaches occur.

In the movies, cyber attackers shuffle through papers and photos for clues, guessing passwords until they pick the right combination and are granted access.

That is not how it happens in real life.

Cyber attackers use tools to automate the process and then conduct mass attacks across the Internet. These tools use dictionaries, lists of common words or passwords, and then try each one in succession. The name of your dog and birthday don't come into play during an automated attack, and therefore don't matter.

Yet there are steps you can take to help keep your accounts from being breached. Security expert James Jardine of Secure Ideas shares simple ways to foil cyber attackers by creating stronger passwords.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

SupplyChain1-290x195.jpg Security Risks in the Supply Chain

While the use of IoT technology enables retailers to better track their products from production through delivery in the supply chain, it also introduces a variety of security and data risks. ...  More >>

Security105-190x128 Turning Zero-Day into D-Day for Cybersecurity Threats

Take a closer look at the explosion of zero-day threats and how deep learning can help organizations better protect their valuable cyber assets. ...  More >>

LastPassPasswords0x Are You One Password Away from a Data Breach?

To help improve overall cybersecurity practices, the first line of defense is often an educated user with strong password practices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.