SlideShare una empresa de Scribd logo
1 de 12
Don’t Get
Hacked:
Why Good
Passwords Matter
Hackers are Lurking
• Hackers can gain access to your computer in a
number of harmful ways
– There are hackers who tap into email systems with
low security
• Ie: Yahoo, ComCast, and AOL email systems are most prone
to hacks

– Hackers have found means to manipulate areas with
free WiFi to gain access to your personal information
– There are hacker who take advantage of your
unattended computer system.
– By simply leaving your computer unattended to take a bathroom
break at a coffee shop provides the perfect opportunity for a
hacker to quickly download a harmful software onto your
computer

– And many more! Hackers are always seeking the most
creative, unexpected way to steal your personal data
Hacking Happens
• Recently, there’s been an upswing of breaches
in online security systems. Lots of secure
companies can suddenly become victims of a
hacking attack
– Source: Forbes.com

• While companies are working to compensate
for the rare instances that their security
systems are hacked, sometimes a sincle
Methods of Hacking
• There are many means by which
software works to hack into your system.
It’s important to be aware of these
means as you log your personal
information into an internet database.

• Source: microsoft.com/business
Brute Force
• The most time-consuming method.
• A program tries every combination of
letters, numbers, and keyboard characters to
guess your password.
– It starts with trying every character, then tries
two-character combinations, and so on.
Custom Dictionaries
• Custom dictionary software is also worth
considering when creating a password
• These dictionaries are filled with words and
names, but also number and letter
combinations, such as 11111 and abc123.
• Simple passwords such as "duke" or
"ilovemydog" can easily be guessed.
Social Engineering
• This involves someone with criminal intent
soliciting a password directly from a user.
• Many people divulge their passwords to coworkers and strangers without even realizing
it; thus, exposing their personal information
and leaving their accounts vulnerable to attack
Keeping Your
Password
Safe
Unique Passwords are KEY
• You must have a unique password for every
service you use.
– If you reuse the same password, and a hacker
cracks one account, he or she will be able to
access the rest of your accounts.

• Source: HowTo.Cnet.com
Eight Characters or More!
• Short passwords enhance your risk of getting
hacked. The longer the better.
• The longer the password, the less likely it is
that a custom dictionary will hack into your
account!
• Source: Thegeekstuff.com
Change Your Password Often!
• At the very least, you should change your
password every three months!
• This is an annoying task, but it’s a sure way to
protect your personal information from
getting hacked!
• Source: Wisegeek.org
Wacky Passwords Work Best
• We’re basically suggesting that you mix
different character types.
– Use some uppercase letters along with lowercase
letters, numbers and even special characters such
as '&' or '%‘
– Ie: instead of using “hamandcheese” as your
password, use “H4m&Ch33s3”
– Source: Netsecurity.about.com

Más contenido relacionado

La actualidad más candente

TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Information Security Awareness Orientation
Information Security Awareness OrientationInformation Security Awareness Orientation
Information Security Awareness Orientationmohannadalhanahnah
 
The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)Stu Sjouwerman
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet SecurityDavid Cirella
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationLaura Platt
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 
How to-become-secure-and-stay-secure
How to-become-secure-and-stay-secureHow to-become-secure-and-stay-secure
How to-become-secure-and-stay-secureIIMBNSRCEL
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness programNeel Kamal
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Your internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerableYour internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerableIIMBNSRCEL
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksSrikanth VNV
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedRasheed Ur Rehman
 

La actualidad más candente (20)

TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Information Security Awareness Orientation
Information Security Awareness OrientationInformation Security Awareness Orientation
Information Security Awareness Orientation
 
The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet Security
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
IT Security DOs and DON'Ts
IT Security DOs and DON'TsIT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Internet security
Internet securityInternet security
Internet security
 
How to-become-secure-and-stay-secure
How to-become-secure-and-stay-secureHow to-become-secure-and-stay-secure
How to-become-secure-and-stay-secure
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness program
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Your internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerableYour internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerable
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 

Similar a Password protection

Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
Computer Security
Computer SecurityComputer Security
Computer Securitytonik
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Password Cracking
Password CrackingPassword Cracking
Password CrackingSagar Verma
 
Thoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for SitecoreThoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for SitecorePINT Inc
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
2 Laymans Course - LAMP V2.pptx
2 Laymans Course - LAMP V2.pptx2 Laymans Course - LAMP V2.pptx
2 Laymans Course - LAMP V2.pptxssuser2f0fb0
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)David Herrington
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based SecurityRare Input
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 

Similar a Password protection (20)

Computer security
Computer securityComputer security
Computer security
 
Hacking
HackingHacking
Hacking
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Hacking 2018
Hacking 2018Hacking 2018
Hacking 2018
 
Hacking
HackingHacking
Hacking
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Thoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for SitecoreThoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for Sitecore
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
2 Laymans Course - LAMP V2.pptx
2 Laymans Course - LAMP V2.pptx2 Laymans Course - LAMP V2.pptx
2 Laymans Course - LAMP V2.pptx
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 

Último

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Último (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Password protection

  • 2. Hackers are Lurking • Hackers can gain access to your computer in a number of harmful ways – There are hackers who tap into email systems with low security • Ie: Yahoo, ComCast, and AOL email systems are most prone to hacks – Hackers have found means to manipulate areas with free WiFi to gain access to your personal information – There are hacker who take advantage of your unattended computer system. – By simply leaving your computer unattended to take a bathroom break at a coffee shop provides the perfect opportunity for a hacker to quickly download a harmful software onto your computer – And many more! Hackers are always seeking the most creative, unexpected way to steal your personal data
  • 3. Hacking Happens • Recently, there’s been an upswing of breaches in online security systems. Lots of secure companies can suddenly become victims of a hacking attack – Source: Forbes.com • While companies are working to compensate for the rare instances that their security systems are hacked, sometimes a sincle
  • 4. Methods of Hacking • There are many means by which software works to hack into your system. It’s important to be aware of these means as you log your personal information into an internet database. • Source: microsoft.com/business
  • 5. Brute Force • The most time-consuming method. • A program tries every combination of letters, numbers, and keyboard characters to guess your password. – It starts with trying every character, then tries two-character combinations, and so on.
  • 6. Custom Dictionaries • Custom dictionary software is also worth considering when creating a password • These dictionaries are filled with words and names, but also number and letter combinations, such as 11111 and abc123. • Simple passwords such as "duke" or "ilovemydog" can easily be guessed.
  • 7. Social Engineering • This involves someone with criminal intent soliciting a password directly from a user. • Many people divulge their passwords to coworkers and strangers without even realizing it; thus, exposing their personal information and leaving their accounts vulnerable to attack
  • 9. Unique Passwords are KEY • You must have a unique password for every service you use. – If you reuse the same password, and a hacker cracks one account, he or she will be able to access the rest of your accounts. • Source: HowTo.Cnet.com
  • 10. Eight Characters or More! • Short passwords enhance your risk of getting hacked. The longer the better. • The longer the password, the less likely it is that a custom dictionary will hack into your account! • Source: Thegeekstuff.com
  • 11. Change Your Password Often! • At the very least, you should change your password every three months! • This is an annoying task, but it’s a sure way to protect your personal information from getting hacked! • Source: Wisegeek.org
  • 12. Wacky Passwords Work Best • We’re basically suggesting that you mix different character types. – Use some uppercase letters along with lowercase letters, numbers and even special characters such as '&' or '%‘ – Ie: instead of using “hamandcheese” as your password, use “H4m&Ch33s3” – Source: Netsecurity.about.com