5 tips for better password security

July 30, 2019

You probably see articles about the importance of having better password security fairly often–and for good reason. Year after year, cyber security companies report that most computer users are choosing the same weak passwords, with passwords like ‘123456’ and ‘password’ ranking at the top of the list. With the rising threat of cyber crime, information leaks and data breaches, a strong password is your first line of defence. Luckily, most web services are forcing their users to follow best practices by only allowing passwords with pre-set criteria or by analyzing passwords to see if they’re weak, fair or strong. Most services require a password that’s at least 8 characters long and contains an uppercase letter, a number and a symbol. While these requirements are useful, simply changing your password from “password” to “Password1!” doesn’t suddenly make your password much more difficult to crack.

Spotlight

Plum Laboratories LLC

Plum Laboratories is a research and product development firm focused on extending secure, high speed broadband communications to areas that are not well served by traditional cellular transmission connectivity devices; OR, where there exists a need for failover when an organization loses power and/or their normal WAN connectivity.

Other Infographics
news image

Know the Use Cases of Biometric Technologies

Infographic | April 4, 2022

Biometrics is the most suitable means of identifying and authenticating individuals. It is reliable and fast because of the unique biological characteristics it uses.

Read More
news image

The Booming Information Security Industry

Infographic | August 26, 2021

The information security industry is expected to exhibit tremendous growth in 2021. The key drivers of this growth are increased spending on cybersecurity services and the rising demand for cloud security. According to Gartner, the 2021 information security and risk management spending is anticipated to grow almost 2X from the previous year.

Read More
news image

Cybersecurity Best Practices Every Enterprise Should Follow in 2020

Infographic | February 11, 2020

Lack of awareness in protecting customer’s sensitive data can lead to severe repercussions. Therefore, enterprises should be able to predict potential cybersecurity risks and invest more in building strategies against hackers. But then, those strategies don’t have to be complicated. In fact, simplifying your approach towards cybersecurity (or cybercriminals at large) can go a long way.Not sure if you are maintaining the right cyber hygiene for your business and your customers? Here are a few tips by industry leaders that could help.

Read More
news image

Navigating the cyber security marketplace

Infographic | January 1, 2020

Infographic showing the interactions of the certified cyber security products and services and how they could help you safeguard your systems PUBLISHED Trusted security products and services certified by the National Cyber Security Centre can help reduce vulnerability to cyber attack.

Read More
news image

Necessity of a Data Loss Prevention Strategy for Businesses

Infographic | February 9, 2022

A Data Loss Prevention (DLP) strategy is essential to protect sensitive data. Data loss prevention tools and software are designed to constantly monitor and filter data in real-time. In addition to dealing with the data being used, stored and transmitted within the network, data loss prevention applications ensure no harmful outside data is entering the company network.

Read More
news image

Cyber Security Market

Infographic | January 11, 2022

The global cyber security market size is anticipated to reach USD 366.10 billion by 2028 and exhibit a CAGR of 12.0% during the forecast period. The surging number of e-commerce platforms and the growing integration of machine learning, internet-of-things (IoT), and cloud are expected to boost the market's growth.

Read More

Spotlight

Plum Laboratories LLC

Plum Laboratories is a research and product development firm focused on extending secure, high speed broadband communications to areas that are not well served by traditional cellular transmission connectivity devices; OR, where there exists a need for failover when an organization loses power and/or their normal WAN connectivity.

Events