Five Steps to Protect Your Passwords Before It's Too Late

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Steps to Protect Your Passwords Before It's Too Late-5 Next

Don't re-use passwords

Once a hacker has your account information and credentials, they'll try to use it to gain access to all your accounts. This is why it's important to create a unique password for each account. If you vary your passwords across multiple logins, they won't be able to access other sites with the same information.

Reports of data breaches, online accounts being hacked and passwords being stolen have become so commonplace, users are no doubt becoming numb and complacent to the real dangers these threats present. Even so, it's essential that organizations and users take proactive and ongoing action to protect their sensitive information.

For instance, recent reports detail the alleged theft of 1.2 million usernames and passwords by a Russian cyber crime group. While on the surface this appears to be a massive breach, it's a breach that took time, maybe even years to accomplish. So while it's important to respond to incidents such as this, it's just as important – or maybe even more important – to establish strong password best practices that take a proactive rather than reactive approach to dealing with breaches.

In this slideshow, we take a look at five steps, identified by Symantec, that organizations and individual users should take now to protect their most sensitive password-protected information.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.