Connect with us

Hi, what are you looking for?

HEADLINES

Security expert provides tips to protecting sensitive information

With news of Mark Zuckerberg having his social media accounts being breached, it should come as no surprise that cybercriminals are targeting consumers far and wide. Now more than ever, hackers are savvier and well-resourced, which reiterates the need for consumers to constantly update their passwords and ensure that they are using different passwords for each application. Security can be compromised at any time, especially when sticking to one password across the board.

With passwords being the key to the online daily life of the user, it should be safe-guarded and updated regularly.

Liam O’Murchu, Director, Symantec Security Response says, “With the publicity that Mark Zuckerberg’s password re-use has gained, many attackers will be taking notes and realizing that they can take advantage of the stolen data in the same way. It is likely that we will see more people affected in this way. The high visibility of Zuckerberg’s case certainly adds to the risk here. We hope people, other than attackers, pay attention and refrain from re-using passwords and change passwords now if needed.”

Norton by Symantec recommends consumers take five steps to protect their most sensitive password protected information:

Advertisement. Scroll to continue reading.

•               Beef up your passwords: When creating and updating passwords, make sure that your new password is a minimum of eight characters long and doesn’t contain your real name, username, or any other personally identifying information. The best passwords include a combination of uppercase and lowercase letters, numbers and special characters.

•               Don’t re-use passwords: Once a hacker has cracked a password for one of your accounts, they’ll try to use it to gain access to all your accounts. This is why it’s important to create a unique password for each account.

•               Use a password manager: It can be challenging (or nearly impossible) to remember unique passwords for each account, so consumers should consider using a password manager like Norton Identity Safe that stores your passwords in a secure, cloud-based vault.

•               Pay special attention to email credentials: Many users fail to recognize that their email account can be a front door to their entire digital life. Think about how many times you may have reset your password on some other site and the recovery link is sent to your email account. Ensure you use a particularly strong password with both characters and numbers for your email account. And don’t reuse it!

•               Enable two-factor authentication: Many websites now offer two-factor (or two-step) authentication, which adds an extra layer of security to your account by requiring you to enter your password, plus a code that you will receive on your mobile device via text message or a token generator to login to the site. This may add complexity to the login process, but it significantly improves the security of your account. If nothing else, use this for your most important accounts.

Advertisement. Scroll to continue reading.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

While they may use different platforms or strategies to run their modus, PLDT and its wireless unit Smart Communications, Inc. (Smart) have identified ‘social...

HEADLINES

The 2022 Unit 42 Incident Response Report offers a multitude of insights gleaned from Unit 42 by Palo Alto Networks' extensive incident response (IR)...

HEADLINES

Claroty xDome is the industry’s first solution to deliver the ease and scalability of SaaS without compromising on the breadth or depth of the...

HEADLINES

The novel malware used by Andariel in 2021 and 2022 has been dubbed Maui ransomware. Kaspersky experts identified its launch after DTrack was deployed...

Biz Solutions

For years, Rimini Street has provided proven and proactive advanced “zero-day” security solutions for our clients’ enterprise software applications, middleware, and databases, and these...

HEADLINES

60% of breached businesses raised product prices post-breach; vast majority of critical infrastructure lagging in zero trust adoption; $550,000 in extra costs for insufficiently...

HEADLINES

The share of smart attacks almost broke the four-year record, accounting for nearly 50% of the total. Experts also expect an increase in overall...

HEADLINES

While businesses in different industries are continuously upgrading their platforms, fraudsters also search for ways on how they can adapt to the ever-changing landscape...

Advertisement