This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Allow me to be controversial for a moment: arbitrary password restrictions on banks such as short max lengths and disallowed characters don't matter. Also, allow me to argue with myself for a moment: banks shouldn't have these restrictions in place anyway. 6 characters. for my *online banking*.
I spend a good quarter hour at the start of this video talking about what I'll be doing, namely getting on with business and running a bunch of public workshops remotely in conjunction with Scott Helme. References You can register to do Scott Helme's and my "Hack Yourself First" workshop at NDC Copenhagen on April 1-2 right now!
Along with a private Sydney workshop earlier on, I'm talking about some free upcoming NDC meetup events in Brisbane and Melbourne and I'd love to get a great turnout for. In other news, there was old news appearing as new news about how hosed you are if your machine is compromised with the level of hosing extending to your passwordmanager.
I talk about that below including the preceding days involving some pretty full on sledding in Norway, workshops, talks, ice, slush and snow. LastPass is sponsoring my blog this week (if you don't already have a passwordmanager, you're doing it wrong!). iTunes podcast | Google Play Music podcast | RSS podcast.
Learn about strong password creation, multi-factor authentica-tion, secure browsing habits, and data encryption. Implement Strong Password Practices: Passwords serve as the first line of defense against unauthorized access to your online accounts. Utilize a passwordmanager to securely store and generate strong passwords.
The reputation is well-deserved when you consider that we (the cybersecurity team) tell users to create a unique password for each account to increase security. According to Gartner, 20 – 50% of help desk calls are for password reset – which is an expensive burden for any help desk.
Much of this is simply due to lack of awareness; I must have taught 50 security workshops where the vast majority of attendees had simply never heard of CSP before. This is poor form as it can break tools that encourage good security practices such as passwordmanagers. Let them paste passwords! Why do websites do this?
Is there cybersecurity training on best practices, including setting strong passwords in accordance with the organization’s policy? Encourage strong password practices: Provide tips on how to create complex passwords and use passwordmanagement tools.
Customize training materials to address these specific concerns, including data handling protocols, passwordmanagement , and phishing attempt identification. Everyone, from senior management to front-line staff, is responsible for maintaining a thorough data security policy.
Workshops and Seminars : Attending industry conferences, workshops, and seminars provides exposure to the latest trends and practices. This can include workshops, seminars, and hands-on labs that cover current cybersecurity threats, tools, and best practices.
Phishing attacks refer to fraudulent attempts, usually through email or messaging platforms, to deceive individuals into revealing sensitive information like passwords, credit card details, or Social Security numbers. Use a passwordmanager to securely store and manage your passwords. Phishing attacks.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content