Security Information |
|
Password Security and Safety
There is nothing more important that password security in world of technology. It is the first step to creating a safe and secure environment. If your password becomes compromised, there are limitless consequences to what could happen. There are a few very important factors in keeping your passwords safe and secure that everyone should adhere to. Do not tell anyone your password Do not write your passwords down Be aware all the time Do not use the same password Password complexity Avoid bad passwords, or easily guessable passwords Don't use personal information in your passwords. Passwords that contain your date of birth, pets, drivers license number, social insurance number and similar information should be avoided. This also means person numbers of your children, friends, and family also! Make sure your password is adequately complex, don't use passwords like: kenken, dog, sex. Stay away from incremental passwords! If you use a password like HiThere1, don't change your password every few months with HiThere2, HiThere3. Create unique passwords each time. Don't reuse your old passwords even if you haven't used that password in 3 password changes, keep away from reverting to your old passwords. Don't use words from the dictionary. Passwords should be original conceptions, with no words that could be guess be an automated program. Notes on character substitutionI mentioned in the last point that dictionary words should be avoided. This is very true, but in addition to that, there are now dictionary attacks that integrate common slang spellings and special characters. For those of you who were on the internet and BBS world, the old KRAD, elite speak, can be just as easily guess as a properly spelled word from the dictionary. A couple of examples of what I'm talking about are, "elite speak" could just as easily be "l33t sp34k", "project" and "pr0j3ct". Don't rely on character substitution as a means of securing a simple password. Creating a good password A password should be over eight (8) characters in length. Remembering passwords "I like money, give me your money!" could translate to: Il$,gmyM!"Oh, I wish I was an Oscar Myer Weiner!" could be: OH,iwIwaOMW Simple phrases that are easy to remember for you seem to work the best. "I live in Toronto, Ontario, Canada EH?" - iLiTOCeh? Ken Dennis
MORE RESOURCES:
'Blow the whistle': Indiana's top election official spends $35k on security guide mailings • Indiana Capital Chronicle Indiana Capital Chronicle Violence in New Caledonia subsides slightly as France sends reinforcements for security The Associated Press Canada security intelligence chief warns China can use TikTok to spy on users, CBC reports Reuters Canada House Passes Israel Security Assistance Support Act | House Committee on Appropriations - Republicans House Appropriations Israel Resists Grand Bargain as U.S. and Saudis Work on Security Pact The New York Times U.S.-Ukraine Security Entanglement Risks Forever War The American Conservative Sean 'Diddy' Combs Allegedly Paid $50K to Obtain Hotel Security Footage of Cassie Assault: Lawsuit PEOPLE Women are worried about their financial security. That may affect the 2024 presidential election CNBC Palo Alto Networks and IBM to Jointly Provide AI-powered Security Offerings; IBM to Deliver Security Consulting ... IBM Newsroom Now armed with AI, America's adversaries will try to influence election, security officials warn The Associated Press Is AI the future of school security systems? Yahoo! Voices Security video appears to show Sean 'Diddy' Combs beating singer Cassie in hotel hallway in 2016 Washington Times Nuclear security through the eyes of the Co-Presidents of ICONS 2024 International Atomic Energy Agency Appropriators Lead Israel Security Assistance Support Act | House Committee on Appropriations - Republicans House Appropriations Security footage calls into question Anchorage police account of fatal shooting Alaska Public Media News Security Council Secretary: 'Not an Inch of Armenian Land Ceded to Azerbaijan' • MassisPost Armenian News by MassisPost FCC proposes BGP security measures Network World Identity Management and Information Security News for the Week of May 17; Exabeam, Saviynt, VAST Data, and More Solutions Review New Survey Finds a Paradox of Confidence in Software Supply Chain Security Security Boulevard Canada Releases Defense Policy Update to Boost Security Department of Defense EXCLUSIVE: Two students uncover security bug that could let millions do their laundry for free TechCrunch NATO and Economic Security: A Political Oxymoron or Inevitability? CSIS | Center for Strategic and International Studies Endpoint Security and Network Monitoring News for the Week of May 17; Alkira, Preamble, c/side, and More Solutions Review Amazon security guard tries to kill unsuspecting boss before he's shot dead in gunfight with police: 'He almost executed me' New York Post RSA Conference 2024: AI and the Future Of Security Security Boulevard Diddy Seen Physically Assaulting Cassie in Never-Before-Seen 2016 Hotel Security Footage Entertainment Tonight Putin has ditched his paranoid security chief. Here are 5 of the wackiest things Nikolai Patrushev has said. POLITICO Europe Fox News Poll: Abortion, economy, and border security are top deal-breakers in 2024 elections Fox News 7 months since Oct 7, UN Security Council holds first meeting entirely dedicated to Israeli hostages in Gaza All Israel News See cops working security at Tacoma grocery stores? Here’s why and what policies allow Tacoma News Tribune OWASP dep-scan: Open-source security and risk audit tool Help Net Security Opinion | Is TikTok Chinese ownership a U.S. national security issue? Come on. - The Washington Post Opinion | Is TikTok Chinese ownership a U.S. national security issue? Come on. The Washington Post UN sexual violence envoy pulls out of Security Council briefing on Hamas hostages The Times of Israel May 17: IDF fighter jet carries out rare strike on target in West Bank city of Jenin The Times of Israel Enabling Continuous Zero Trust in Multi-Cloud Environments with Netography Fusion Security Boulevard Votiro Keeps Up the Momentum in 2024 Security Boulevard An inspector general warned the Justice Department of gaps in its security clearance appeals process Government Executive Multnomah County Signs $40 Million Contract for Armed and Unarmed Security at County Facilities, Including Public ... Willamette Week A Free, Prosperous, and Secure Future for Ukraine - United States Department of State Department of State JLOTS, an obscure Army-Navy capability, arrives in Gaza NavyTimes.com America's Envoy to the United Nations Gets 'Honest' With Security Council About the Fate of Hamas's Hostages The New York Sun Cybersecurity Insights with Contrast CISO David Lindner | 5/17/24 Security Boulevard Brothers Indicted for Stealing $25 Million of Ethereum in 12 Seconds Security Boulevard The situation concerning Iraq - Security Council, 9628th meeting Welcome to the United Nations The Dell API Breach: It could have been prevented Security Boulevard Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta Security Boulevard 'Abnormal' security video, Google Drive led to Stephan Sterns' arrest in Madeline Soto case, documents show WKMG News 6 & ClickOrlando USENIX Security ’23 – AEX-Notify: Thwarting Precise Single-Stepping Attacks Through Interrupt Aware... Security Boulevard Making Safety and Security Intrinsic to School Design Campus Security Today U.S. Security Cooperation with Ukraine - United States Department of State Department of State Belgium cuts off ticket sales for soccer match against Israel over ‘security concerns’ The Times of Israel Donald Trump to visit St. Paul. What are the security expenses? St. Paul Pioneer Press Security fog machine helps deter burglars from Chatsworth business FOX 11 Los Angeles Galaxy Tab S9 lineup gets Android's May 2024 security update SamMobile - Samsung news French security forces impose 'calmer' situation in New Caledonia under emergency powers FRANCE 24 English EAM to India Inc: Use 'national security filter' in China deals The Times of India In first, UN Security Council holds meeting solely focused on hostages held by Hamas The Times of Israel NHL coaching job-security tiers: Who could go next? The New York Times Galaxy S21 lineup grabs the May 2024 security update SamMobile - Samsung news |
RELATED ARTICLES
Personal Firewalls for Home Users What is a Firewall?The term "firewall" illustrates a system that protects a network and the machines on them from various types of attack. Firewalls are geared towards keeping the server up all the time and protecting the entire network. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. IPv6 - Next Step In IP Security IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete. Top Ten Spyware and Adware Threats Identified On December 8, 2004 Webroot, an award winning anti-spyware solution provider, released a press release identifying the ten most significant emerging spyware and adware threats. Most of these you probably haven't heard of and a few may surprise you. How Can Someone Get Private Information From My Computer? From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. How Spyware Blaster Can Protect Your Computer From Harm By browsing a web page, you could infect your computer withspy ware, ad ware, dialers and hijackers. These, unwelcomeguests, are some of the fastest growing threats on theInternet today. Is Spyware Watching You? Imagine my surprise when I received a phone call from afriend who told me he'd been the victim of a "spyware"attack that left him shaking at his loss of privacy.I listened to his horror story with a sympathetic ear, butI felt secure since I carry anti-virus software and afirewall (both by Norton). Personal Firewalls - Secure Your Computer There has not been a time in the history of the personal computer that firewalls and anti-virus programs have been more necessary and in-demand. Today, personal computer security is not only threatened by viruses and worms, but also by spyware - those severely annoying programs that are illegally loaded onto your computer from the internet. Dont Allow Hackers to Take Out Money from Your Bank Account If you know what is the 'Fishing' then it's very easyto understand the definition of 'Phishing'. Justreplace letter 'F' from the word Fishing with 'Ph'. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. Wells Fargo Report Phishing Scam First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information. Wireless Network Security Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U. Crack The Code - Thats A Direct Challenge I Challenge You To Crack The Code-------------------------------------I had quite an interesting experience recently. I was hired by a company to perform a vulnerability assessment and penetration test on their network. Information Security for E-businessmen: Just a Couple of Ideas If you constantly deal with bank or electronic accounts, it must beyour worst nightmare--to wake up and learn that you are a bankrupt.Some crook stole your personal data and all the money you have beensweating blood for years has flown to somebody else's account. Virus Nightmare..Lessons Learned I got a virus the other day, Thursday I believe and since then I have been making FRANTIC efforts to save all my info.The most important thing for me to save are my Outlook Express emails and my Roboform passwords. Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. How Free Scripts Can Create Security Problems With the Internet entering our lives in such an explosive manner, it was inevitable that Internet security issues would follow as well. While credit card frauds are an offline security problem that has been carried over to the Internet as well, spamming and phishing are uniquely Internet security hazards. Dont be a Dork - Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. A New Low A new variation of the Nigerian Scam themeThe scam artists are employing the Nigerian Scam to fleece unwary sellers who advertise pets for sale.This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them. |
home | site map |
© 2006 |