How to stop the Majority of Hackers?

SHORT ANSWER: BY PROTECTING YOUR LOGINS

BACKGROUND

The latest Verizon Data Breach Investigations Report (DBIR) states that 80% of all security breaches are tied to passwords.

This means that your account logins which are protected with passwords alone have a high risk of being breached by hackers.

THE REALITY

Choosing a password is a risky business and often it is the weak point of your security.  Remember: All that is between you and a hacker accessing your entire world is your password.  If this doesn't meet modern standards then it is just a matter of time before it’s your turn to be hacked and your world will be turned upside down!

PASSWORDS ARE DEAD

You should now be using a Passphrase instead which is :

  • Long (14 characters minimum) and contain a combination of upper and lowercase letters, plus a number and special symbol.

E.g. A 15 character Passphrase is something like Eating@work24/7

So actually easier to remember rather than a password and due to its length would take 52 years to crack using a  supercomputer that can go through billions of attempts per second to guess a password.

SOLUTIONS

Having a longer (not complex) passphrase (instead of password) is the key (14 characters or more).  See * above

Then adding on the 2nd tier of authentication via a separate authenticator app to the login means only you can access it.

There is no need to try and remember these long passphrases anymore as everything is secured in a double factor, an encrypted database which can be securely accessed via either your phone, laptop or computer.  N.B. Most authenticators are tied you your mobile phone which can be painful, especially if you lose it and you are in another country!

NEXT STEPS

At Computer Clinic, we can set up and configure everything to industry best practices and know all the pitfalls to avoid you being locked out of your accounts.

WHAT WE WILL DO FOR YOU

Securely store all your new passphrases in a new system for you to easily use without having to remember them all.  Plus a 2nd tier of authentication will be setup and configured which allows a 2nd tier of login via all your computers, browsers, laptops and mobiles.

The software is provided by international, reputable providers and there is no cost for this, although paid options are available (which you won't need unless sharing certain passphrases as part of a team).

There is a one-off setup cost during which we will provide full documentation and training.  Prices obviously vary depending on how many passwords and devices you have, along with the amount of training that is required.

Previous
Previous

Your Business (probably) isn't Cyber Secure

Next
Next

THE IMPORTANCE OF TWO-FACTOR AUTHENTICATION (2FA)