Friday, November 1, 2019

Why Weak Passwords Are a Security Risk


A password is the most commonly used primary security measure for protecting access to websites. Passwords are also commonly used to restrict access to hardware devices, such as computers. While some people may consider the need to use passwords a nuisance, the reality is that we rely on passwords to keep prying eyes away from sensitive data.

Just creating a password may not be enough to protect data. If you choose simple passwords like "password," "qwerty," or "123456," you are greatly increasing the risk that your online accounts or local hardware can be accessed by third parties.

Who would try to access my computer or online accounts? 

Any person who wants access to information stored on your computer or in an online account may try to crack your password; it could be somebody known to you, such as a spouse, partner, relation or work colleague, or it could be a total stranger with fraud on his or her mind. You could also be subjected to automated attacks, where special apps try to break your password by using millions of combinations of characters.

Weak passwords 

Regardless of whether it's somebody you know, a total stranger, or an automated program that is trying to crack your password, if you have a weak password, you are at increased risk of your defenses being breached. 

Weak passwords are ones that can easily be guessed. They include combinations like those mentioned above or passwords based on the date of birth of you, your children, or other relatives. Those based on your favorite books, poems, songs, pets, or geographical locations associated with you are also potentially weak passwords. 

How your personal details can be found 
You may think it is unlikely that a stranger, or even an acquaintance, knows your date of birth, or information about your likes and dislikes. However, it is surprising how much information is in the public domain.

Social media platforms are great sources of information for people who may want to hack passwords. Those birthday greetings from your friends that say "Can't believe you're 20" reveal your date of birth. Greetings to or from "my favorite mum/sister/uncle/brother etc." reveal the names of other family members and their relationship to you. 

People regularly use social media to tell the world about their favorite pet, actor, movie, song, etc. In short, making innocent posts or comments online can reveal a lot of information about you. Even if you don't actively do this, other people can reveal your personal information in their posts or comments. Social media can be a rich source for people trying to break your password.

Automated attacks 

Unlike an individual trying to guess what your password is, automated, or brute force, attacks do not use information about you to assist them. Instead, they try various combinations of characters. While this may seem like a very inefficient way to crack a password, it should be remembered that it is often possible to try millions of combinations in a very short time. 

While these attacks use random sequences of characters, they are often structured to try well-known words or phrases first. These may be followed by combinations of common names and digits that could be dates. Weak passwords are likely to be discovered more quickly.

In summary, using simple passwords is risky. Individuals can try to guess your password based on your personal data. Automated attacks are more likely to find readable passwords, even if they are combinations of words and numbers. Avoid weak passwords if you want to keep your data safe.

Robert Blake
877.860.5831 x190

Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Thursday, October 31, 2019

Why People still use fax machines..

This was an excellent article! I predicted the death of fax in my 20's I was wrong and continue to be surprised at the number of processes still use fax. See the link below.

Why people use fax


Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Monday, October 28, 2019

A hack can ruin more than your day!



Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Monday, October 21, 2019

Friday, October 18, 2019

Data Breaches Threaten Companies' Financial Viability



Throughout 2019, new research is illuminating the extensive financial consequences of a data breach. Not only are direct costs increasing, but consumers are making sure that business feel financial pain for failing to protect their information. 

According to a report by PCI Pal, consumers are prioritizing data security by spending money at companies with demonstrated track records of data security and integrity and declining to shop at companies that have comprised consumer data. 

Specifically, 44% of UK customers, 83% of US consumers, 43% of Australian shoppers, and 58% Canadian users claimed that they will stop or reduce spending at companies that experience a data breach.

Moreover, such patterns can inflict future consequences, as consumers will search the competitive landscape for new products and services, making it increasingly difficult for compromised companies to win back old customers.

Since keeping your existing customer base is significantly more affordable than finding new clients, prioritizing data security should be at the top of every company’s to-do list. When internal resources can’t cover the entire responsibility, seek assistance from qualified collaborators (like us!) that can assess your cybersecurity posture while partnering with you to provide the resources necessary to keep customer data safe.

https://securityboulevard.com/2019/09/global-research-shows-poor-data-security-practices-have-serious-consequences-for-businesses-worldwide/

Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Tuesday, October 15, 2019

Patching = Protection



Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com