Ready to Start Your Career?

By: rotsap
December 10, 2015
Passwords are Always the Weakest Links

By: rotsap
December 10, 2015
[caption id="attachment_56334" align="aligncenter" width="1024"]
Passwords are victims of neglect and the weakest links in the IT landscape[/caption] Security savvy starts hereCarefully creating and handling passwords is the perfect place to become a more savvy Security Pro. It seems reasonable that by the time someone launches their security career, they'd be practicing safe password usage and deployment. Yet, many still let this critical item slip by in daily application.A casual wink and nudge-nudge is given to this tool, which could make a difference between secure and vulnerable. Absent, bad or lax password policies create holes in the security barrier. As as a result, we often unwittingly place our own, our firms or our employers' information at great risk.Today, I encourage you to commit to getting back to the basics. Start a proper routine for increasing password complexity, frequency of change and regular policy updates that govern deployment strategies. When it comes to appliance, infrastructure and network security, best practices are the order of the day.REMEMBER: You can never lay it on too thick or do too much when it comes to security measures. Use good formThe following considerations go a long way to secure intellectual property and hardware. Observe these considerations - ANY OR ALL - and you could avoid the pain or shame of data loss and build your reputation as a conscientious IT professional:

- Always install a password, or update the existing one, wherever and whenever possible.
- Never share your passwords with anyone.
- Make your passwords more complex and use words or phrases.
- Use combinations of: Upper-case letters, Lower-case letters, Numbers and Special Characters when available. (NOTE: Not all forms allow special characters.)
- "I" can be used for "eye" or vice versa
- "4" or "four" could stand in place of "for"
- "1" or "one" or "won"