![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Password Security and Safety
There is nothing more important that password security in world of technology. It is the first step to creating a safe and secure environment. If your password becomes compromised, there are limitless consequences to what could happen. There are a few very important factors in keeping your passwords safe and secure that everyone should adhere to. Do not tell anyone your password Do not write your passwords down Be aware all the time Do not use the same password Password complexity Avoid bad passwords, or easily guessable passwords Don't use personal information in your passwords. Passwords that contain your date of birth, pets, drivers license number, social insurance number and similar information should be avoided. This also means person numbers of your children, friends, and family also! Make sure your password is adequately complex, don't use passwords like: kenken, dog, sex. Stay away from incremental passwords! If you use a password like HiThere1, don't change your password every few months with HiThere2, HiThere3. Create unique passwords each time. Don't reuse your old passwords even if you haven't used that password in 3 password changes, keep away from reverting to your old passwords. Don't use words from the dictionary. Passwords should be original conceptions, with no words that could be guess be an automated program. Notes on character substitutionI mentioned in the last point that dictionary words should be avoided. This is very true, but in addition to that, there are now dictionary attacks that integrate common slang spellings and special characters. For those of you who were on the internet and BBS world, the old KRAD, elite speak, can be just as easily guess as a properly spelled word from the dictionary. A couple of examples of what I'm talking about are, "elite speak" could just as easily be "l33t sp34k", "project" and "pr0j3ct". Don't rely on character substitution as a means of securing a simple password. Creating a good password A password should be over eight (8) characters in length. Remembering passwords "I like money, give me your money!" could translate to: Il$,gmyM!"Oh, I wish I was an Oscar Myer Weiner!" could be: OH,iwIwaOMW Simple phrases that are easy to remember for you seem to work the best. "I live in Toronto, Ontario, Canada EH?" - iLiTOCeh? Ken Dennis
MORE RESOURCES: Exclusive: U.S. exempts security funds from aid freeze — but little for humanitarian programs Reuters Europe Vows to Step Up Baltic Sea Security After a New Cable Break The New York Times UK minister met Chinese turbine company amid security concerns POLITICO Europe Protector app provides on-demand armed security ABC7 Los Angeles Turkish army could play key role in Europe's security Voice of America Apple Pulls iPhone Security Feature in UK The New York Times In strengthening its security architecture, Europe shouldn’t discount Türkiye’s role Atlantic Council Airport security will start checking for a REAL ID in 75 days. Here’s what you need to know. South Carolina Daily Gazette Electric infrastructure security measure updated Unicameral Update US states push back against possible election security changes Voice of America Russia Recommends Increased Port Security Citing Threat from NATO The Maritime Executive Remarks at a UN Security Council Briefing on the Democratic Republic of the Congo United States Mission to the United Nations Napco Security Technologies (NSSC) Shares Plummet After GlobeNewswire Veterans and American National Security Foundation for Defense of Democracies HackerOne Debuts New Way to Quantify Security Value Channel Insider Maine school increases security due to national attention on transgender athlete - Bangor Daily News Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA), Steps Down HSToday EU Moves to Enhance Undersea Cable Security as Sweden Looks at New Incident - The Maritime Executive EU Moves to Enhance Undersea Cable Security as Sweden Looks at New Incident The Maritime Executive Oklahoma finalizes three agreements with Homeland Security, ICE KFOR Oklahoma City Lebanon County man cited for loaded gun at LVIA airport security, TSA says lehighvalleylive.com DOE layoffs weaken security, economic growth: “Forget American energy dominance” Federal News Network US Marshals Service deputizes Musk’s private security detail: Reports Straight Arrow News Is It Worth It: Home Security System Realtor.com News Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability The Hacker News ThreatLocker® launches new solutions, further advances Zero Trust security resilience and adoption Yahoo Finance Regional peace depends on Iran's security Tehran Times Cleared to connect: American Airlines pilots streamlined security program in collaboration with US and UK governments American Airlines Newsroom UN Security Council Calls on Rwanda to Pull Troops From Congo U.S. News & World Report Pye-Barker Fire & Safety acquires Secure Pacific and Sonitrol Pacific SECURITY SYSTEMS NEWS Pennsylvania Treasury Bans Chinese AI Platform Over Security Concerns Franklin County Free Press The Diplomatic Security Service is being targeted for firings. Why that matters: Analysis - ABC News Ukrainians are looking past NATO to a European security architecture Al Jazeera English Menlo Security Acquires Votiro to Deliver Easy, AI-driven Data Security to Enterprises Business Wire Topic: Relations with Ukraine NATO HQ Texada achieves top security certifications American Rental Association SIA Names Holly Borgmann as 2025 Chairman’s Award Honoree Security Sales & Integration German election targeted by Russian disinformation, security services warn The Record from Recorded Future News ISC West 2025 Preview: Inside the Security Industry’s Premier Event Security Sales & Integration DOGE access to Social Security, IRS data could create privacy and security risks, experts say The Record from Recorded Future News |
![]() |
![]() |
![]() |
RELATED ARTICLES
Personal Firewalls for Home Users What is a Firewall?The term "firewall" illustrates a system that protects a network and the machines on them from various types of attack. Firewalls are geared towards keeping the server up all the time and protecting the entire network. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. IPv6 - Next Step In IP Security IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete. Top Ten Spyware and Adware Threats Identified On December 8, 2004 Webroot, an award winning anti-spyware solution provider, released a press release identifying the ten most significant emerging spyware and adware threats. Most of these you probably haven't heard of and a few may surprise you. How Can Someone Get Private Information From My Computer? From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. How Spyware Blaster Can Protect Your Computer From Harm By browsing a web page, you could infect your computer withspy ware, ad ware, dialers and hijackers. These, unwelcomeguests, are some of the fastest growing threats on theInternet today. Is Spyware Watching You? Imagine my surprise when I received a phone call from afriend who told me he'd been the victim of a "spyware"attack that left him shaking at his loss of privacy.I listened to his horror story with a sympathetic ear, butI felt secure since I carry anti-virus software and afirewall (both by Norton). Personal Firewalls - Secure Your Computer There has not been a time in the history of the personal computer that firewalls and anti-virus programs have been more necessary and in-demand. Today, personal computer security is not only threatened by viruses and worms, but also by spyware - those severely annoying programs that are illegally loaded onto your computer from the internet. Dont Allow Hackers to Take Out Money from Your Bank Account If you know what is the 'Fishing' then it's very easyto understand the definition of 'Phishing'. Justreplace letter 'F' from the word Fishing with 'Ph'. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. Wells Fargo Report Phishing Scam First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information. Wireless Network Security Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U. Crack The Code - Thats A Direct Challenge I Challenge You To Crack The Code-------------------------------------I had quite an interesting experience recently. I was hired by a company to perform a vulnerability assessment and penetration test on their network. Information Security for E-businessmen: Just a Couple of Ideas If you constantly deal with bank or electronic accounts, it must beyour worst nightmare--to wake up and learn that you are a bankrupt.Some crook stole your personal data and all the money you have beensweating blood for years has flown to somebody else's account. Virus Nightmare..Lessons Learned I got a virus the other day, Thursday I believe and since then I have been making FRANTIC efforts to save all my info.The most important thing for me to save are my Outlook Express emails and my Roboform passwords. Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. How Free Scripts Can Create Security Problems With the Internet entering our lives in such an explosive manner, it was inevitable that Internet security issues would follow as well. While credit card frauds are an offline security problem that has been carried over to the Internet as well, spamming and phishing are uniquely Internet security hazards. Dont be a Dork - Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. A New Low A new variation of the Nigerian Scam themeThe scam artists are employing the Nigerian Scam to fleece unwary sellers who advertise pets for sale.This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them. ![]() |
home | site map |
© 2006 |