Will We Ever Be Safe
Image Shows a shield with a key symbol, with the words death of the passwords. The colors are gold,blue and dark gray.
By: Intelligence Officer Markeith Price PLY | 03-23-2022 | Move Progress Production | Social Media @markeithprice | www.moveprogresspro.com
If you have information, hackers want what you have. Why you may ask. A hacker may want to use your account as a pond for its attacks on another account. They might want to use your information for ransom, so then you have to pay them.
There are so many reasons. Putting up a defense will help these thieves from gaining access.
How Do You Improve Your Password you may ask. We went through the steps you could take in the last article Death Of The Password. Here are some more steps.
Updating your password on a frequent basis
Using Multi Factor Authentication
Using capital letters, lower case letters, numbers and special characters
Not clicking on links that are not secure
Using a password manager
Not using the same password for every account
Writing password in a password Journal
Using a double blind password
Using a tool like Onlykey https://onlykey.io
The Image shows the tech cyber blog logo. With the color blue, black and white.
Using these methods gives you more security. Using only a key gives you physical security and multi factor authentication. This is a high level of security. If you are highly technical this could be used to secure your accounts and systems.
Make sure whatever you do you don’t lose your passwords and password tools.
When it comes to hacking. Hackers use many techniques to get in on the inside. Key logging software is being utilized and perfected. Social engineering is another technique that is being used.
There are many moments where this method can be used against you without a hacker ever needing your information. Hackers can trick your account manager by pretending to be you or a family member claiming they forgot the password.
If your account manager falls for that. That now has socially hacked their way into your account and could take all types of information.
My question to you.
How will you protect your information?
Is the password really dead?
Citation:
Cyber security: making the most of passwords. (n.d.). The Association of Taxation Technicians. Retrieved March 16, 2022, from https://www.att.org.uk/cyber-security-making-most-passwords
Choosing and Protecting Passwords | CISA. (n.d.). CSIO. Retrieved March 16, 2022, from https://us-cert.cisa.gov/ncas/tips/ST04-002
Blackwell, J. (2021, November 12). 4 Reasons Why MFA Should Be a Requirement for IT Tasks. Imanami. Retrieved March 16, 2022, from https://www.imanami.com/4-reasons-why-mfa-should-be-a-requirement-for-it-tasks/
Comentarios