password01, Password123, Password1! etc.). ![]() Why? Besides what’s known as a “brute-force” attack, hackers can firstly try common password combinations (e.g. > First off – never use a word found in a dictionary (or combination of) This simple secret is employed by many IT professionals, to deconstruct the simple art of creating a strong, (semi-) unique password – and importantly, one you can always easily remember. Here’s a simple way to create a strong and memorable password Strong password tipsīut we’ve all (or should have) read the advice on what constitutes a strong password, recommendations on policy, but in reality, how can you easily remember a complex and (semi)-unique password? Password123 admin 123456 etc.), they would certainly also use lists of hacked username/passwords, as well as packet sniffing to seek encrypted authentication requests, which can then be run through a list of known encrypted passwords (containing 10 billion+ passwords). Not only would a hacker test common ‘weak’ password combinations (e.g. The password-cracking capabilities of a hacker are considerable! And what’s concerning is that, trying to exploit weak or common-combination passwords is frequently successful (at least for our own ethical hackers performing a penetration test). ![]() The ease of exploiting weak passwordsįor a hacker, exploiting weak passwords is a bread-and-butter first step to gain a foothold onto a corporate network, from which they can then further probe to seek more exploitable weaknesses. If any of your accounts have been compromised, and if the same passwords are used for home and work, this could pose a serious security threat. Has your email/password been exposed in a data breach?įirstly, you can easily check if you have an account that has been compromised in a data breach. Individually, many people now understand the importance of a strong password, but perhaps it is less well understood that weak passwords within a commercial organisation pose a significant risk to corporate data. Data breaches, big hacks and subsequent data theft isn’t new news yet we continue to see breaches making the headlines almost daily, so naturally we’re all becoming more and more concerned about data security.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |