![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
5 Tips For An Unbreakable Password
Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible. This can be a catastrophic mistake. There are certain specific guidelines you need to follow to choose a safe and secure password. Use the following tips as a "how to" on making your password secure. 1. Your password must be alphanumeric. That simply means a mixture of numbers and letters such as xpf2778z. Why? When a hacker tries to break into a system they often use what are called dictionary or brute force hacks. A dictionary hack is an application that simply uses standard words and word combinations in an attempt to guess your password. For example many computer users use the word "password" as their actual password. A dictionary hack would crack that password in a few moments. Using alphanumeric passwords increases the number of possible password combinations by millions. 2. It should be 6 - 8 characters in length. The longer the password the harder it is for a hacking program to get around. If your password was abc then there are 6 possible password combinations. If your password was abc123 there are now over 720 password combinations possible. If your password was abc1234 there are now almost 6,000 possible combinations. Never, ever use a short password only comprised of letters. 3. Never use personal details in your password. People often use their home address, their age, husband or wives name, their social security number or their date of birth. These are incredibly easy to get access to by either a fellow employee or potential system hacker. Your password needs to be secure and hard to guess and personal details meet neither of these criteria. 4. Do not write your password down anywhere. Keeping a record of your password for somebody to find is as dangerous as keeping a copy of your ATM pin number in your wallet beside your ATM card. Create a memorable password that you'll have no problem recalling. This is not as hard as it sounds and if you jot some password ideas down you'll quickly come up with some good ones. Obviously burn the piece of paper you jotted your ideas down on. 5. Do not use the same password for more than 90 days. Create several variants of the same password and recycle them every 60 - 90 days. This adds an extra layer of security to your data. By recycling your password frequently you make your data 1000% more secure. You'll notice that most large corporates force their employees to change their password every month for this exact reason. Hopefully these tips will help you choose a password that's both safe and secure and that you'll have some fun creating your new passwords too! If you need a review of the spam blocker you intend buying then check out Spam-Site.com for spam blocker reviews.
MORE RESOURCES: How Chinese Private Security Companies in Africa Differ From Russia’s Voice of America - VOA News Documents show Security Costs for Nathan Fletcher ABC 10 News San Diego KGTV Alex Murdaugh moved to SC maximum security, officials say WYFF4 Greenville Murdaugh moved to protective custody at maximum security SC prison Live 5 News WCSC Stormy Daniels Postpones ‘Piers Morgan Uncensored’ Interview Due to ‘Security Issues’ Yahoo Entertainment NYC Ups Security Again After Trump Indictment, NYPD Orders Officers Report in Uniform - NBC New York Remarks at a UN Security Council Briefing on Threats to ... United States Mission to the United Nations DL Security Incident | Department of Public Safety the Texas Department of Public Safety Online Briefing with Uzra Zeya, Under Secretary for Civilian Security ... Department of State TSA officers stop Tweed New Haven Airport’s first firearm Transportation Security Administration Lawmakers seek $75 million security grant for Milwaukee to host RNC Milwaukee Journal Sentinel WATCH: Dodgers fan gets crushed by security guard after running on field to propose to girlfriend CBS Sports Ypsilanti man pleads guilty to making false statements on security ... WDIV ClickOnDetroit NYC Ramps Up Security Again Ahead of Possible Grand Jury Action Against Trump, Police Sources Say NBC New York British Semiconductor Maker May Close Due To National Security Dispute With Chinese Parent Company Forbes Man arrested over secretly recording Republicans prompts Senate to change security policies NBC News TSA Honors Jacksonville Transit Authority with Gold Standard ... Transportation Security Administration Mayor of Niagara Falls launches program to encourage more businesses to install security cameras WKBW 7 News Buffalo Underwood Condemns Republican Plan to Cut Food Security ... Lauren Underwood Modi Meets Patrushev, Says Russia Security Council Foreign Policy Commerce Department Outlines Proposed National Security ... US Department of Commerce Suspect arrested in connection with Oklahoma City nightclub shooting that killed security guard KOCO Oklahoma City Senators Introduce Bipartisan Bill to Tackle National Security ... Senator Mark Warner China urges Apple to improve security and privacy The Register TikTok bills could dangerously expand national security state Responsible Statecraft TSA issues new cybersecurity requirements for airport and aircraft ... Transportation Security Administration Fact Sheet: Biden Administration's National Security Memorandum ... Homeland Security The Bureau of International Security and Nonproliferation Advances ... Department of State Russian Court Orders Wall Street Journal Reporter Evan ... The Wall Street Journal FACT SHEET: President Biden’s Budget Strengthens Border ... The White House Biden Administration Announces Additional Security Assistance for ... Department of Defense S. Korea national security advisor resigns after alleged Blackpink White House invite blunder Yahoo News Why TikTok's security risks keep raising fears The Associated Press German Police Raid DDoS-Friendly Host 'FlyHosting' – Krebs on ... Krebs on Security Feds Charge NY Man as BreachForums Boss “Pompompurin ... Krebs on Security TikTok CEO's Message to Washington: A Sale Won't Solve Security ... The Wall Street Journal NYC Comptroller Responds to House Speaker McCarthy's Attacks ... New York City Comptroller Jenkins Security Alert: New Security Flaws Could Allow Code ... The Hacker News Officials are preparing security in case of Trump indictment The Associated Press Saudi Arabia Seeks U.S. Security Pledges, Nuclear Help for Peace ... The Wall Street Journal |
![]() |
![]() |
![]() |
RELATED ARTICLES
Wells Fargo Report Phishing Scam First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information. Lottery Scam, What It is and how to Avoid It? Internet scams and frauds are on the rise! The quantity of scam emails with various fraud schemes any email account receives today is simply overwhelming! There is this infamous Nigerian 419 scam, which is by far the most widely circulated one. I wrote about it in one of our ezine articles not long ago. Wireless Network Security Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. What Can Be Done About Spyware And Adware Having a good Spyware eliminator on your computer is vital now a days with all of the different Spyware, Adware, and other malicious computer parasites that are out there. Most of them are reasonably priced and very easy to use. Online Shoppers, Beware of a New Scam Beware of a New Scam Aimed at Bargain-HuntersTrying to buy something cheap is absolutely natural--and online crooks set traps for unwitting bargain-hunters. On April 6 Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential information. Protecting Your Home Both Inside and Out If you are a parent, you have probably wondered at one time or another, what more you can do to protect your children and yourself, not only physically but emotionally, mentally, spiritually etc. Today many parents and families are discouraged. Virus Prevention 101 Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound Familiar?Have you been as bothered by viruses this past year as I have? Does it seem like there are more viruses, worms and Trojans out now then ever before? It is only getting worse.For the general public, "virus" has become a catchall term for any unwanted program that spreads from computer-to-computer; yet, in reality, there are differences between viruses, worms and Trojan horses. Behavior to Stay Safer Online 1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan. The 5 Critical Steps to Protecting Your Computer on the Internet Spyware, viruses and worms.. Why Corporations Need to Worry About Phishing Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster. Identity Theft -- 10 Simple Ways to Protect Your Good Name! Identity Theft is one of the most serious problems facing Internet users. Identity Theft is exactly as the name states -- someone steals your Identity and commits fraud in your name. Is Shopping Online For Your Horse Gifts Safe? Shopping for horse gifts or other gift items on the internetis quick, convenient and is probably safer than you think.However, you still need to be aware that it is essential tovigorously protect your privacy and financial informationwhen making purchases online. Information Security for E-businessmen: Just a Couple of Ideas If you constantly deal with bank or electronic accounts, it must beyour worst nightmare--to wake up and learn that you are a bankrupt.Some crook stole your personal data and all the money you have beensweating blood for years has flown to somebody else's account. The Move to a New Anti-Virus Model This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday's methods for solving today's problems: they wait for the next virus to wreak havoc and then produce a solution. Internet Scams: Dont be a Victim As the number of people using the Internet as an integral part of their daily life grows, it is inevitable that the number of Internet Scams will grow. Unfortunately there are many forms of scams but in this article we will look at three of the most prominent. Steganography - The Art Of Deception & Concealment The Message Must Get Through-----------------------------The year is 300A.D. An Open Letter From a So-called Stupid Someone recently told me, "You would have to be a stupid to lose your personal information." While I respectfully responded to this person in the moment, the comment has stuck with me. 6 Ways To Prevent Identity Theft These six ways to prevent identity theft offer you valuable tips against the fastest growing crime in America today. In 2004, more than 9. Keeping Worms Out of Your Network... No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms. Avoid Internet Theft, Fraud and Phishing Since its birth, the Internet has grown and expanded to unprecedented, unmanageable proportions. Information, software, news, and much more flow freely through its twisted pathways. ![]() |
home | site map |
© 2006 |