{"id":1436,"date":"2021-10-01T15:51:57","date_gmt":"2021-10-01T15:51:57","guid":{"rendered":"https:\/\/thecbagroup.com\/?p=1436"},"modified":"2022-12-06T16:30:53","modified_gmt":"2022-12-06T16:30:53","slug":"password-security-general-tips","status":"publish","type":"post","link":"https:\/\/thecbagroup.com\/password-security-general-tips\/","title":{"rendered":"Password Security: General Tips"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1436\" class=\"elementor elementor-1436\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-eff22c0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eff22c0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b4e6a92\" data-id=\"b4e6a92\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a587abf elementor-widget elementor-widget-html\" data-id=\"a587abf\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 style=\"color: green\">Password Security: General Tips<\/h1>\n <p style=\"font-size: 15px; margin-top: 20px\"> \n <strong style=\"color: green\">Security<\/strong> and <strong style=\"color: green\">Confidentiality<\/strong> are key concepts when dealing with commercial or personal data. Your first line of defense is an authentication method usually consisting of a username and password combination. Most users do not consider the personal or commercial impact of bad passwords until there has been unauthoarized access to their account or a data leak. Here are some strategies to implement strong passwords. Password Security: General\n <\/p>\n \n <h4 style=\"font-weight:bold; margin-top:40px\">Don\u2019t create passwords with personal or public information\n <\/h4> \n \n <p style=\"font-size: 15px\">\n Creating passwords with your name, birthday, hometown, etc. are bad practices. You might think: How would someone know my hometown? An easy facebook search, directory search, or even a simple google query can return more information than you might think would be out there. Be aware of your public information that is on the internet. Studies show that 92% of users create passwords that may contain public information.\n <\/p>\n \n <h4 style=\"font-weight:bold; margin-top:40px\">Change passwords regularly or after specific events\n <\/h4> \n \n <p style=\"font-size: 15px\">\n All users should consider changing their passwords once a year to be extra cautious. Even if you are not changing your password regularly, you should update your password in the event of the following situations:\n <\/p>\n \n <ul style=\"margin-top: 20px; margin; font-size:17px\">\n \n <li style=\"margin: 10px\"><h6>• <strong>After a security breach:<\/strong> If a security breach occurs, you should change your password as soon as possible to protect your information. Studies show that 45% of users haven\u2019t changed their password in the last year, even after a security breach.<\/h6>\n <\/li>\n \n <li style=\"margin: 10px\"><h6>• <strong>Unauthorized account access:<\/strong> Many software platforms provide some type of authentication monitoring where they will flag suspicious logins from different devices or geographic locations. If you receive one of these notifications, change your password as soon as possible. You should also check that data within the platform hasn\u2019t been altered or leaked.<\/h6>\n <\/li>\n <li style=\"margin: 10px\"><h6>• <strong>After malware if discovered on a system:<\/strong> If malware is discovered on the system, your computer or your network, you should change your password immediately. Change your password from a different device until you are positive the malware is removed.<\/h6>\n <\/li>\n\n <\/ul>\n \n <h4 style=\"font-weight:bold; margin-top:40px;\">Use different passwords for different platforms\n <\/h4> \n \n <p style=\"font-size: 15px\">\n Many people use the same password for multiple platforms. If an attacker gains access to your central password, they will gain access to a range of platforms and software. A few techniques exist to design passwords based on their platform, such as the name of the website backwards with some additional number of special characters. Creating a system for password management where you do not have to memorize or store passwords, allows easy access to a wide range of passwords. Be sure not to share your password management system design with anyone.\n <\/p>\n \n <p style=\"font-size: 15px; margin-top: 60px\">\n <em style=\"color:green; font-weight: bold\">Keep an eye out for next week's blog where we dive into the technical aspects of password security that include dark web scans, password entropy mathematics, and a tip from a cybersecurity researcher. Password Security: General<\/em>\n <\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Password Security: General Tips Security and Confidentiality are key concepts when dealing with commercial or personal data. Your first line of defense is an authentication method usually consisting of a username and password combination. Most users do not consider the personal or commercial impact of bad passwords until there has been unauthoarized access to their […]<\/p>\n","protected":false},"author":8,"featured_media":1440,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[152],"tags":[],"class_list":["post-1436","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business"],"acf":[],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/thecbagroup.com\/wp-content\/uploads\/2021\/09\/pexels-wiredsmart-3868576-scaled-e1633020390127.jpg","_links":{"self":[{"href":"https:\/\/thecbagroup.com\/wp-json\/wp\/v2\/posts\/1436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecbagroup.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecbagroup.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecbagroup.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/thecbagroup.com\/wp-json\/wp\/v2\/comments?post=1436"}],"version-history":[{"count":14,"href":"https:\/\/thecbagroup.com\/wp-json\/wp\/v2\/posts\/1436\/revisions"}],"predecessor-version":[{"id":4480,"href":"https:\/\/thecbagroup.com\/wp-json\/wp\/v2\/posts\/1436\/revisions\/4480"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thecbagroup.com\/wp-json\/wp\/v2\/media\/1440"}],"wp:attachment":[{"href":"https:\/\/thecbagroup.com\/wp-json\/wp\/v2\/media?parent=1436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecbagroup.com\/wp-json\/wp\/v2\/categories?post=1436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecbagroup.com\/wp-json\/wp\/v2\/tags?post=1436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}