So far in this video series, we’ve given you ground rules for better passwords and told you which ones to memorize.
Now it’s time to learn how to create, store, and access all the rest of your passwords.
Read MoreIn the last video, we left you with a long list of requirements to keep yourself secure.
Now, let’s start putting that plan into action and take a look at what it takes to craft the ultimate, secure password.
Read MoreWhile simply seeing the word “cybersecurity” may ignite an overwhelming feeling, rest assured that these simple ground rules will drastically improve your security at home and work.
Over the next few weeks, we’ll be publishing a series of videos, to help you create better passwords, understand multi factor authentication, and learn some tips on how to keep your passwords organized.
Read MoreOver the past few weeks, we’ve covered everything from password complexity to the management that sustains it. Now, we’re ready to make the leap into a slightly more complex layer of password security, two-factor authentication. In this final installment, we’ll wrap things up by highlighting the benefits of implementing one of these services, while helping you decide which method may be right for you.
Read MoreIf you read the first part of our password security series, you understand the significant impact that passphrases can have on account security. This week, we’re focusing our attention on the importance of using multiple unique passphrases, while giving you some handy methods to keep track of all your new login credentials.
With just a couple of (free) changes, you can add an additional layer of security to all of your online accounts.
Read MoreWhile protecting an organization’s network from the threat of hackers is a complex task, doing so starts at a rudimentary level. By ensuring every employee is vigilant in implementing proper password security practices, an organization can greatly mitigate the risk of of a total network takeover.
Simply put, Rocket IT suggests that an organization’s leaders start by mandating a series of company-wide password security rules. Although, over the next few weeks, we’ll share some of these suggestions, it’s important to start by addressing the foundational cause of security breaches, a lack of password complexity.
Read More