World Password Day: Fact or Fiction

World Password Day: Fact or Fiction

It’s time to take the pledge to improve your password habits.

Thursday, May 4th, is World Password Day. A day of digital reflection to see if your password habits are actually securing the information you use the password to guard.

In most instances, password users believe they are doing the best they can to improve the security of their information and accounts, but more often than not they are using tips and tricks that are actually creating vulnerabilities for their accounts.

Let’s see where you stand with your password, can you guess if the statements below are fact or fiction?

I can use the same password for many accounts, especially if it is really complex.

Fiction. I know it may be easy to use the same password for all your accounts so that you can remember it better, but it actually increases your chances of being vulnerable in the digital space if you do.

It doesn’t matter if your password has a capital letter, lowercase letter, number, symbol and hidden rhyme, if someone hacks a website that you use the password for and gains entry into their user database, your complex password isn’t very useful anymore. They can take the data stolen from the website to try to gain entry into other accounts you might use, like your email, social media accounts and even online banking accounts.

Using two-factor authentication decreases my chances of being hacked.

Fact. The use of two-factor authentication has been growing as of lately. You might have been prompted to use it for a Gmail account recently. It works by adding another layer of security to your account.

With Gmail, when you tell your laptop or desktop computer that you want to log into an account, it automatically sends a code to your mobile device. Once you receive that code, you can type it into the field on the computer. This lets the website know that you are more likely to be the person you say you are if you have possession of a secondary device linked to the account.

I should change my password every 30 days.

Fiction. Although this is good advice for high-risk accounts, it isn’t the best policy for the average user. Requiring frequent password changes usually results in weaker and weaker passwords as the users struggles to find the happy place between remembering a new password and figuring out new ideas.

Rather than limit the password by age, try to focus on stronger passwords and better user awareness. You should still look to change your password every now and then, but maybe try every three months so you don’t burn out so quickly.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3