Password Security
Seven Debunked Myths of Cybersecurity
Article by Kristin Herman, a writer and editor at Ukwritings.com and Academized.comThe term 'cybersecurity' has been tossed around lately. But although cybersecurity has been viewed as a saving grace for mobile devices, ...
How to stop rampant, poor password practices
We’ve all heard about the consequences of poor password practices again and again. Yet, users still reuse their passwords for multiple accounts, create weak passwords, or use dictionary words and compromised passwords ...
Why a strong password policy is so important for your WordPress website
If you’ve been managing a WordPress site for a while, you may be wondering why a strong password policy is so important. Surely, users are aware that they need to use strong ...
Trusting Passwords: Best Practices for Threat-Proofing Credentials
“Open, Sesame!”Upon reflection it’s easy to see that passwords have an incredibly long history: from shibboleths to military codes, they’ve been used in many situations to preserve privacy and identity. With the ...
Are Passwords Secure?
Credential-based authentication is the method nearly all network users are used to and has been a common tool for decades. But unlike other decades-old technology, passwords have not been phased out of ...
Back to Basics: Simple Moves to Keep You Secure at Home
Guest Post by Susan DoktorStaying at home, something we’ve all been doing a lot more of, can be relaxing. But as our attention has been focused elsewhere, particularly on our health and ...
Response Required
Why organizations need to react urgently to the state of password security, according to data from 451 Research In a recent brief titled “Love ‘em or Hate ‘em, Passwords Are Here to ...
Tips for Protecting Your Password and Personal Data
This list is a combination of proactive steps you can take, as well as activities you should avoid for protecting your password and personal data. One of the main barriers to robust ...
The Updated Do’s and Don’ts of Password Security
When it comes to passwords, individual habits and organizational policies vary widely—unfortunately, the pattern is one of weakness. But organizational online security can be immediately improved by the implementation of a few ...
Cyber Security Roundup for June 2020
A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, May 2020.EasyJet's disclosure of a "highly sophisticated cyber-attack", which occurred ...

