#1 Trending Cyber Security News & Magazine
Monday, May 29, 2023
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Martin Sloan, Five Years Of GDPR

    Five Years of GDPR: There is a Long Way to Run on Cross-Border Data Transfers

    Mikko Hypponen

    I Was Wrong About the Future: Mikko Hypponen

    2023 Biggest Cyber Attacks

    2023 Biggest Cyber Attacks So Far And How to Protect Against Them

    Cybertech Africa

    Cybertech Africa: The Pan-African Event for Innovation and Networking

    Invicta Stealer

    Invicta Stealer Developers Exploit Facebook to Advertise Malware

    Cyber attack on the City of Augusta

    Cyber Attack on the City of Augusta: BlackByte Ransomware Group Claims Hit

    Mirai botnet cyber attack

    Linux Devices Attacked Via a Mirai Botnet Variant ‘IZ1H9’

    Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

    Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

    Nokoyawa Ransomware Group

    All You Need to Know About The Nokoyawa Ransomware Group

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Martin Sloan, Five Years Of GDPR

    Five Years of GDPR: There is a Long Way to Run on Cross-Border Data Transfers

    Nokoyawa Ransomware Group

    All You Need to Know About The Nokoyawa Ransomware Group

    StopRansomware Guide

    Updated StopRansomware Guide Warns of Ransomware’s Shape Shifting Tactics

    Microsoft Entra

    Microsoft Build 2023: Microsoft Entra Introduced With New Identity and Access Features

    Data Protection Commission

    Irish Data Protection Commission imposes $1.3bn Fine on Meta

    US Police Auction Seized Cell Phones Without Wiping Data, Sparks Privacy Concerns

    US Police Auction Seized Cell Phones Without Wiping Data, Sparks Privacy Concerns

    disclosing cybersecurity incidents

    Why Victims Fail to Disclose Cybersecurity Incidents, And Why They Should

    Stakeholder Communication During Crisis

    Stakeholder Communication During Crisis: How to Get It Right

    Government Regulation of AI businesses

    Government Regulation of AI businesses: UK Competition Watchdog Launches Review

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Cybertech Africa

    Cybertech Africa: The Pan-African Event for Innovation and Networking

    IBM Acquired Polar Security

    IBM Acquires Polar Security Reportedly For $60 Million

    World CyberCon Middle East 2023

    World CyberCon Middle East 2023: The Premier Cybersecurity Conference in the Region

    ODIN by Cyble

    Cyble Launches ODIN: A Revolutionary Tool for Unparalleled Internet Exploration

    cybersecurity investments

    Cybersecurity Investments Up in April, Market Watchers Predict Growth of Over $700 billion

    OilRig APT

    Experts Warn of Increased IT Supply Chain Attacks by OilRig APT in Middle East

    World Password Day 2023

    World Password Day 2023: Protect Your Password, Create an Unbreakable One

    national cybersecurity strategy

    US National Cybersecurity Strategy: Businesses, Let’s Start with Disclosure!

    Stack Identity

    Silicon Valley Startup, Stack Identity Receives $4 Million to Detect Shadow Access in Cloud

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
SUBSCRIBE
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Martin Sloan, Five Years Of GDPR

    Five Years of GDPR: There is a Long Way to Run on Cross-Border Data Transfers

    Mikko Hypponen

    I Was Wrong About the Future: Mikko Hypponen

    2023 Biggest Cyber Attacks

    2023 Biggest Cyber Attacks So Far And How to Protect Against Them

    Cybertech Africa

    Cybertech Africa: The Pan-African Event for Innovation and Networking

    Invicta Stealer

    Invicta Stealer Developers Exploit Facebook to Advertise Malware

    Cyber attack on the City of Augusta

    Cyber Attack on the City of Augusta: BlackByte Ransomware Group Claims Hit

    Mirai botnet cyber attack

    Linux Devices Attacked Via a Mirai Botnet Variant ‘IZ1H9’

    Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

    Norton Healthcare Cyber Attack: ALPHV/BlackCat Posts Ransom Note

    Nokoyawa Ransomware Group

    All You Need to Know About The Nokoyawa Ransomware Group

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Martin Sloan, Five Years Of GDPR

    Five Years of GDPR: There is a Long Way to Run on Cross-Border Data Transfers

    Nokoyawa Ransomware Group

    All You Need to Know About The Nokoyawa Ransomware Group

    StopRansomware Guide

    Updated StopRansomware Guide Warns of Ransomware’s Shape Shifting Tactics

    Microsoft Entra

    Microsoft Build 2023: Microsoft Entra Introduced With New Identity and Access Features

    Data Protection Commission

    Irish Data Protection Commission imposes $1.3bn Fine on Meta

    US Police Auction Seized Cell Phones Without Wiping Data, Sparks Privacy Concerns

    US Police Auction Seized Cell Phones Without Wiping Data, Sparks Privacy Concerns

    disclosing cybersecurity incidents

    Why Victims Fail to Disclose Cybersecurity Incidents, And Why They Should

    Stakeholder Communication During Crisis

    Stakeholder Communication During Crisis: How to Get It Right

    Government Regulation of AI businesses

    Government Regulation of AI businesses: UK Competition Watchdog Launches Review

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Cybertech Africa

    Cybertech Africa: The Pan-African Event for Innovation and Networking

    IBM Acquired Polar Security

    IBM Acquires Polar Security Reportedly For $60 Million

    World CyberCon Middle East 2023

    World CyberCon Middle East 2023: The Premier Cybersecurity Conference in the Region

    ODIN by Cyble

    Cyble Launches ODIN: A Revolutionary Tool for Unparalleled Internet Exploration

    cybersecurity investments

    Cybersecurity Investments Up in April, Market Watchers Predict Growth of Over $700 billion

    OilRig APT

    Experts Warn of Increased IT Supply Chain Attacks by OilRig APT in Middle East

    World Password Day 2023

    World Password Day 2023: Protect Your Password, Create an Unbreakable One

    national cybersecurity strategy

    US National Cybersecurity Strategy: Businesses, Let’s Start with Disclosure!

    Stack Identity

    Silicon Valley Startup, Stack Identity Receives $4 Million to Detect Shadow Access in Cloud

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

World Password Day 2023: Protect Your Password, Create an Unbreakable One

On World Password Day 2023, let us understand the significance of employing strong passwords to keep our systems secure. 

Editorial by Editorial
May 4, 2023
in Firewall Daily, Press Release
0
World Password Day 2023
604
SHARES
3.4k
VIEWS
Share on LinkedInShare on Twitter

World Password Day 2023: Every year, on the first Thursday in May, World Password Day is commemorated, a perfect opportunity to send a reminder about the importance of dedicating special care to passwords, as they are one of the main barriers against cyber criminals.

Passwords are used by billions of users around the world, but despite their enormous importance, there is still a high number of bad practices when it comes to managing and creating them.

You might also like

NoName DDoS Attacks Continue, This Time on London City Airport, Cooperative Credit Bank of Rome

Five Years of GDPR: There is a Long Way to Run on Cross-Border Data Transfers

I Was Wrong About the Future…: Mikko Hypponen

In 2019, the UK’s National Cyber Security Centre revealed that 23 million people worldwide continue to use insecure passwords such as “123456”, evidencing that many users are still unaware of the potential dangers.

But this is not the only problem we face. Relentless technological advances are not only benefiting users but also providing cybercriminals with new tools to carry out their attacks.

What once was considered secure passwords are now becoming outdated, creating new vulnerabilities. On World Password Day 2023, let us understand the significance of employing strong passwords to keep our systems secure.

World Password Day 2023: How Easily Passwords Can Be Hacked

The advent of new graphics cards with virtual memory (VRAM) has opened the door for these hardware devices to process high-speed data, the same way it is used in cryptocurrency mining.

However, they can also be used in brute-force cyberattacks to obtain passwords, being the newest models able to perform more than a million checks in just one second, way faster than the previously achieved by central processing units (CPU).

This means that if we have a password with less than 12 characters based exclusively on the use of letters and numbers, it could be breached in just a few days.

According to the latest report from Hive Systems, which shared the approximate times in which cybercriminals could “crack” our passwords, range from minimal effort and almost instantaneous times for the most insecure passwords, to 438 trillion years for the most robust keys.

In a matter of just one year, these same figures have seen their possible vulnerability times cut by up to 90% that, with the entry of new agents such as cloud services or artificial intelligence, could be even more reduced in the coming years.

“Every day, cybercriminals create new attacks aimed at stealing user passwords. Techniques such as phishing have managed to breach thousands of services by stealing credentials, especially here in the UAE, where on average, organizations are attacked 1345 times per week in the last 6 months compared to 1207 attacks per organization globally,” Ram Narayanan, Country Manager at Check Point Software Technologies, Middle East said.

“This risk can be easily remedied by establishing secure passwords, making it much more difficult for cybercriminals to guess these combinations, ensuring the highest level of security for our devices”.

World Password Day 2023: How to Secure Your passwords?

The goal and the reasons are clear, but what does a password need in order to be secure and strong?

  • The longer and more varied, the better: it should be at least 14-16 characters long and consist of different letters, combining upper and lower case letters, symbols and numbers.However, it has been noted that by simply increasing the password to up to 18 characters combined, a completely unbreakable key can be constructed.This belief is based on the number of attempts brute-force practice requires where the total number of combinations is equal to the number of characters multiplied by their length.
  • Easy to remember, complex to guess: it should be a combination that only the user knows, so it is advisable not to use personal details such as dates of anniversaries or birthdays, or the names of family members, as these can be easier to figure out.A simple way to create passwords that anyone can remember is to use complete sentences, either using common or absurd scenarios, with examples such as ‘meryhadalittlelamb’, or its even safer equivalent with different characters ‘#[email protected]
  • Unique and unrepeatable: create a new password each time a service is accessed and avoid using the same password for different platforms and applications. This ensures that in the event of a password being breached, the damage will be minimal and more easily and quickly repairable.According to a Google survey, at least 65% of respondents reuse their passwords across multiple accounts and web services, which increases the chances of multiple platforms or applications being breached.
  • Always private: a premise that may seem basic but is important to remember.A password should not be shared with anyone, and it is especially advisable not to write it down anywhere near the computer or even in a file on it. For this task, you can use tools such as password managers, which do the same job, but in a more secure way.
  • Real security is just ‘two steps’ away: in addition to having a strong and secure password, the use of two-factor authentication (2FA) is a major security enhancement.This way, every time an attacker or an unauthorized person wants to access someone else’s account, the account owner will receive a notification on their mobile phone to grant or deny access.
  • Change it periodically: sometimes, even after following all these practices, incidents beyond our reach occur such as leaks of company databases.Therefore, it is advisable to periodically check whether an email has been the victim of a vulnerability to a third party, as well as to try to trace the accounts that may have been compromized.To do this, there are public access tools such as the Have I Been Pwned website, which try to gather basic information on these leaks in order to offer support and help to users.Similarly, even if they have not been breached, it is always recommended to update passwords every few months.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: How Easily Passwords Can Be HackedHow to Secure Your passwords?World Password Day 2023
Previous Post

Iran Threat Actors Mount Cyber-enabled Influence Operations: Microsoft Threat Intelligence report

Next Post

FTC Facebook Ban Update: FTC Accuses Facebook of Misleading Parents Over Children’s Data

Editorial

Editorial

The Cyber Express is a publication that aims to provide the latest news and analysis about the information security industry. The news comes from a variety of sources and is updated regularly so that readers can stay up to date with the latest happenings in this rapidly growing field.

Related Posts

NoName DDoS attacks
Firewall Daily

NoName DDoS Attacks Continue, This Time on London City Airport, Cooperative Credit Bank of Rome

by Vishwa Pandagle
May 29, 2023
Martin Sloan, Five Years Of GDPR
Compliance

Five Years of GDPR: There is a Long Way to Run on Cross-Border Data Transfers

by Chandu Gopalakrishnan
May 28, 2023 - Updated on May 29, 2023
Mikko Hypponen
Features

I Was Wrong About the Future…: Mikko Hypponen

by Rajashakher Intha (Raj)
May 28, 2023 - Updated on May 29, 2023
2023 Biggest Cyber Attacks
Features

2023 Biggest Cyber Attacks So Far And How to Protect Against Them

by Editorial
May 27, 2023
Cybertech Africa
Firewall Daily

Cybertech Africa: The Pan-African Event for Innovation and Networking

by Editorial
May 27, 2023
Next Post
FTC Facebook Ban Update

FTC Facebook Ban Update: FTC Accuses Facebook of Misleading Parents Over Children's Data

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest Issue is Out. Subscribe Now

Download Now

CRIL


Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

mailchimp

Latest Cyber News

Martin Sloan, Five Years Of GDPR
Compliance

Five Years of GDPR: There is a Long Way to Run on Cross-Border Data Transfers

May 28, 2023
Mikko Hypponen
Features

I Was Wrong About the Future: Mikko Hypponen

May 28, 2023
2023 Biggest Cyber Attacks
Features

2023 Biggest Cyber Attacks So Far And How to Protect Against Them

May 27, 2023
Cybertech Africa
Firewall Daily

Cybertech Africa: The Pan-African Event for Innovation and Networking

May 27, 2023

Categories

Web Stories

Top 10 CISOs to Follow in 2023
Top 10 CISOs to Follow in 2023
Top 10 Ransomware Gangs in 2023
Top 10 Ransomware Gangs in 2023
Top 5 IoT Security Risks in 2023
Top 5 IoT Security Risks in 2023
Top 10 CTF Platforms in 2023
Top 10 CTF Platforms in 2023
Types of Risks Covered by Cyber Insurance
Types of Risks Covered by Cyber Insurance

About

The Cyber Express by Cyble

#1 Trending Cyber Security News and Magazine

The Cyber Express  by Cyble is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

For Events & Conferences related information: [email protected]

 

Quick Links

  • About Us
  • Advertise With Us
  • Contact Us
  • Editorial Calendar

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News
  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • Products
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Top 10 CISOs to Follow in 2023 Top 10 Ransomware Gangs in 2023 Top 5 IoT Security Risks in 2023 Top 10 CTF Platforms in 2023 Types of Risks Covered by Cyber Insurance