Five Steps to Protect Your Passwords Before It's Too Late

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Steps to Protect Your Passwords Before It's Too Late-2 Next

Pay special attention to your email credentials

A lot of users fail to recognize that their email account can be a front door to their entire digital life. Think about how many times you may have reset your password on some other site and the recovery link is sent to your email account. In addition, avoid opening emails from unknown senders and clicking on suspicious email attachments; exercise caution when clicking on enticing links sent through email, instant messages, or posted on social networks; and do not share confidential information when replying to an email.

Reports of data breaches, online accounts being hacked and passwords being stolen have become so commonplace, users are no doubt becoming numb and complacent to the real dangers these threats present. Even so, it's essential that organizations and users take proactive and ongoing action to protect their sensitive information.

For instance, recent reports detail the alleged theft of 1.2 million usernames and passwords by a Russian cyber crime group. While on the surface this appears to be a massive breach, it's a breach that took time, maybe even years to accomplish. So while it's important to respond to incidents such as this, it's just as important – or maybe even more important – to establish strong password best practices that take a proactive rather than reactive approach to dealing with breaches.

In this slideshow, we take a look at five steps, identified by Symantec, that organizations and individual users should take now to protect their most sensitive password-protected information.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.