![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Password Security and Safety
There is nothing more important that password security in world of technology. It is the first step to creating a safe and secure environment. If your password becomes compromised, there are limitless consequences to what could happen. There are a few very important factors in keeping your passwords safe and secure that everyone should adhere to. Do not tell anyone your password Do not write your passwords down Be aware all the time Do not use the same password Password complexity Avoid bad passwords, or easily guessable passwords Don't use personal information in your passwords. Passwords that contain your date of birth, pets, drivers license number, social insurance number and similar information should be avoided. This also means person numbers of your children, friends, and family also! Make sure your password is adequately complex, don't use passwords like: kenken, dog, sex. Stay away from incremental passwords! If you use a password like HiThere1, don't change your password every few months with HiThere2, HiThere3. Create unique passwords each time. Don't reuse your old passwords even if you haven't used that password in 3 password changes, keep away from reverting to your old passwords. Don't use words from the dictionary. Passwords should be original conceptions, with no words that could be guess be an automated program. Notes on character substitutionI mentioned in the last point that dictionary words should be avoided. This is very true, but in addition to that, there are now dictionary attacks that integrate common slang spellings and special characters. For those of you who were on the internet and BBS world, the old KRAD, elite speak, can be just as easily guess as a properly spelled word from the dictionary. A couple of examples of what I'm talking about are, "elite speak" could just as easily be "l33t sp34k", "project" and "pr0j3ct". Don't rely on character substitution as a means of securing a simple password. Creating a good password A password should be over eight (8) characters in length. Remembering passwords "I like money, give me your money!" could translate to: Il$,gmyM!"Oh, I wish I was an Oscar Myer Weiner!" could be: OH,iwIwaOMW Simple phrases that are easy to remember for you seem to work the best. "I live in Toronto, Ontario, Canada EH?" - iLiTOCeh? Ken Dennis
MORE RESOURCES: How Chinese Private Security Companies in Africa Differ From Russia’s Voice of America - VOA News Man arrested over secretly recording Republicans prompts Senate to change security policies NBC News Energy security is trumping climate concerns Financial Times Russia assumes rotating presidency of UN Security Council: ‘April 1 absurdity’ - The Times of Israel Russia assumes rotating presidency of UN Security Council: ‘April 1 absurdity’ The Times of Israel Remarks at a UN Security Council Briefing on Threats to ... United States Mission to the United Nations Online Briefing with Uzra Zeya, Under Secretary for Civilian Security ... Department of State TSA officers stop Tweed New Haven Airport’s first firearm Transportation Security Administration Sustainably meeting the security and operational needs of solar farms Security Magazine Lawmakers seek $75 million security grant for Milwaukee to host RNC Milwaukee Journal Sentinel WATCH: Dodgers fan gets crushed by security guard after running on field to propose to girlfriend CBS Sports Ypsilanti man pleads guilty to making false statements on security ... WDIV ClickOnDetroit British Semiconductor Maker May Close Due To National Security Dispute With Chinese Parent Company Forbes Mayor of Niagara Falls launches program to encourage more businesses to install security cameras WKBW 7 News Buffalo NYC Ramps Up Security Again Ahead of Possible Grand Jury Action Against Trump, Police Sources Say NBC New York NYC Ups Security Again After Trump Indictment, NYPD Orders Officers Report in Uniform - NBC New York Underwood Condemns Republican Plan to Cut Food Security ... Lauren Underwood TSA Honors Jacksonville Transit Authority with Gold Standard ... Transportation Security Administration Modi Meets Patrushev, Says Russia Security Council Foreign Policy Commerce Department Outlines Proposed National Security ... US Department of Commerce How Does Data Literacy Enhance Data Security? Dark Reading Argentina: Minimum requirements for management and control of IT ... GlobalComplianceNews TikTok bills could dangerously expand national security state Responsible Statecraft Homeland Security Chief Mayorkas calls Ted Cruz’s comments ... The Texas Tribune China urges Apple to improve security and privacy The Register Senators Introduce Bipartisan Bill to Tackle National Security ... Senator Mark Warner TSA issues new cybersecurity requirements for airport and aircraft ... Transportation Security Administration Russia to outline 'contours of a new world order' as UN Security ... Washington Examiner Russian Court Orders Wall Street Journal Reporter Evan ... The Wall Street Journal EPSO investigating Security-Widefield homicide FOX21News.com Fact Sheet: Biden Administration's National Security Memorandum ... Homeland Security Bitter, frustrated and afraid: Deri to quit observer role in security cabinet The Times of Israel FACT SHEET: President Biden’s Budget Strengthens Border ... The White House Biden Administration Announces Additional Security Assistance for ... Department of Defense Why TikTok's security risks keep raising fears The Associated Press Is there a second Supplemental Security Income payment this month? WJW FOX 8 News Cleveland Boyfriend gets caught cheating on couples’ cruise security cameras: ‘Most gut-wrenching moment’ Yahoo Life Operation Lone Star Marks Two Years Of Border Security Efforts Office of the Texas Governor Feds Charge NY Man as BreachForums Boss “Pompompurin ... Krebs on Security TikTok CEO's Message to Washington: A Sale Won't Solve Security ... The Wall Street Journal Jenkins Security Alert: New Security Flaws Could Allow Code ... The Hacker News Officials are preparing security in case of Trump indictment The Associated Press Saudi Arabia Seeks U.S. Security Pledges, Nuclear Help for Peace ... The Wall Street Journal ChatGPT and LLMs: what's the risk - NCSC.GOV.UK National Cyber Security Centre |
![]() |
![]() |
![]() |
RELATED ARTICLES
Computer-Virus Writers: A Few Bats In The Belfry? "Male. Obsessed with computers. Hacked: Who Else Is Using Your Computer? A friend called me one day and asked if I would stop by to look at his computer. He said it was running abnormally slow and he had found something on his hard-drive he could not explain. Criminals are Fishing For Your Identity What is Phishing? In a typical Phishing attack, a criminal will send you an email which appears to be from a well known company, bank or government agency. The email will direct you to click on a link which directs you to a Website or pop-up box that looks like the company's or organization's legitimate site. Virus and Adware - Fix them Both! We all get the odd virus now and then, but sometimes that one virus could cause so many problems. In this article I shall be going though just some of the problems that these virus software programs can do, and how to fix them. How To Be Your Own Secret Service Agency So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. File Sharing - What You Need to Know! File sharing on p2p is soaring despite the music and movie industryefforts to curb the practice. Regardless of which side of the arguement you are on it is likely that sharing of copyright materialwill continue in one form or another for the foreseeable future. 6 Ways To Prevent Identity Theft These six ways to prevent identity theft offer you valuable tips against the fastest growing crime in America today. In 2004, more than 9. What Every Internet Marketer Should Know About Spyware If you run any type of Internet business, Adware and Spyware can be a very serious issue. These programs hide themselves on your computer and do all sorts of annoying and potentially dangerous things. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. IPv6 - Next Step In IP Security IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete. How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics. Phishing: An Interesting Twist On A Common Scam After Two Security Assessments I Must Be Secure, Right?---------------------------------------Imagine you are the CIO of a national financial institution and you've recently deployed a state of the art online transaction service for your customers. To make sure your company's network perimeter is secure, you executed two external security assessments and penetration tests. Identity Theft Offline -- So Many Possibilities Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.This survey wasn't a scam; in fact, it was an experiment. Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders Can you protect your computer from all possible viruses and other invasions?The quickest answer to this is "no." It's just flat impossible to protect your computer from all viruses, registry attacks, worms, spyware, malware, popups, and other such nasties. Everything You Need To Know About Spyware and Malware You are at your computer, checking out software on EBay. The computer is really sluggish, and you are not running anything else. 3 Simple Steps to Stay Safe from Spyware There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&D. Internet Small Business and Fraud Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions. Securing Your Accounts With Well-Crafted Passwords In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. Internet Scams: Dont be a Victim As the number of people using the Internet as an integral part of their daily life grows, it is inevitable that the number of Internet Scams will grow. Unfortunately there are many forms of scams but in this article we will look at three of the most prominent. Virus Prevention 101 Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound Familiar?Have you been as bothered by viruses this past year as I have? Does it seem like there are more viruses, worms and Trojans out now then ever before? It is only getting worse.For the general public, "virus" has become a catchall term for any unwanted program that spreads from computer-to-computer; yet, in reality, there are differences between viruses, worms and Trojan horses. ![]() |
home | site map |
© 2006 |