Passwords

Cyber Statistics Snapshot for August 2018

If you have been to any of our presentations you have heard Jack mention statistics from the website Hackmageddon.com, each month they issue a report of statistics in cyber crime incidents for the previous month. In an effort to create easier to digest bits of information the highlights of those reports will be illustrated monthly on our blog in the form of an infographic.

Below is the information compiled for August 2018. As in most months the leading motivation for the attacks are cyber crime at 77%, followed by cyber espionage, cyber warfare and hacktivism.

35% of those attacks are carried out via malware – think viruses, spyware, etc. and 23% of those attacks are going after the individual.

How do you go about NOT becoming a statistic?

  1. Educate yourself and your team. Learn about the tools and techniques criminals use to manipulate their victims.
  2. Use strong passwords. Knowing how to create strong passwords and using them is one of the easiest and most basic first steps to becoming more secure.
  3. Ask questions. Does something seem suspicious? Know the signs to look for and what to do if you suspect you may be compromised.

If you would like more information, contact us here or call 937.885.7272.

Follow us on FacebookTwitter and LinkedIn and stay up to date on by subscribing to our email list.

Cyber attack infographic

Cyber attack infographic

Posted by Jack Gerbs in Recent Posts

3 Posts to help up your password game

Having a strong password is one of the easiest ways to keep your information out of the hands of the bad guys but what does a strong password consist of? What steps should you take in safeguarding your passwords?

We have written several posts on the subject previously but have combined them all in one place for easy reference.

Can you remember all of your passwords?
This post discusses the recent changes and recommendations regarding easier to remember passwords.

Password Reuse
In this article the dangers of reusing a single password are covered, as well as reliable password managers.

Don’t use personal passwords at work
It’s important to make sure your employees understand why they should use different passwords at home versus at work.

If you would like more information contact us here or call 937.885.7272.

Follow us on FacebookTwitter and LinkedIn and stay up to date on by subscribing to our email list.

Posted by Jack Gerbs in Recent Posts

Can You Remember All of Your Passwords?

The era of incredibly hard passwords to remember may be coming to an end.

The National Institute of Standards and Technology, NIST, recently released Special Publication 800-63b. This government document titled “Digital Identity Guidelines, Authentication and Lifecycle Management” represents some pretty significant changes to creating difficult to crack passwords/passphrases.

Bottom line, complex passwords that require upper/lower case letters, numbers and symbols have become burdensome and is impeding the user’s ability to perform work. Studies have found that long passphrases are very difficult to crack and easier for the user to remember.

While this document is only 78 pages long, the key take-away for many of our clients is that you can:

  • Eliminate the requirement to periodically change passwords. Passwords still must be changed if there is a chance that the account was compromised.
  • Eliminate the complexity requirement (must have a mix of upper/lower case letters, numbers, and symbols). Passwords should be long. They did not state how long, but 20 plus characters would be my recommendation. Examples might be – TheOSUBuckeyesarethebest, Quanexusforallyouritneeds, etc. To test a password strength, use this web site. https://howsecureismypassword.net/ I would not use an actual password on this site, but it will give you a good feel for what a good password might be.

The document also calls for the implementation of a system/algorithm to determine if the password a user chooses is a weak password or a password that is easily determined/found in a hash table.

If you want to stay up to date and be the first to receive our tech news, threat alerts and newsletters, be sure to sign up for our email list. If you would like more information contact us here or call 937.885.7272.

Posted by Jack Gerbs in Recent Posts