logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
15th December 2017 by CyberVision 0 Comments 885 Views
15th December 2017 by CyberVision in Business Security

Password protection is the way forward 

 

 

Creating strong passwords has become the biggest burden of today’s generation. So many different accounts are created during the online “struggle” to have access to all the services available to us; but keeping track of the multiple usernames and passwords becomes too overwhelming for any sane person. Controlling this issue in the workplace does not make it simpler. Constant headlines announcing data breaches serve as a daily reminder to all that services we’ve divulged our sensitive information to could possibly already have been compromised.

We need to stress the importance of unique, strong passwords for each online account. Re-using passwords makes it that much easier for unsuspecting victims to be exploited for the data that has now been compromised.

Passwords are known to be leaked on a daily basis through online services that we register for using work email addresses. The potential consequences of these accounts being breached are always bleak. Services such as LinkedIn, Dropbox and Adobe have publically announced that they have dealt with encounters such as these. Most people re-use passwords across all the platforms they use for professional purposes. And the large amount of data breaches announced in 2017 all involved weak, default or stolen passwords. This just provides evidence to prove that password protocols need to be tightened in the workplace, at home and in one’s personal capacity.

With the experiences being shared and observed online during the general population’s attempt to protect their online security, we should all now be inclined to adopt the mindset of being one step ahead with this growing problem. Using private email addresses that are not known to a larger audience could be that “thing” that gives your online persona that edge above the rest. The various stages of a cyber attack can be prevented early on with implementing this system. Using personal personas for professional reasons has its own set of drawbacks. Personal telephone numbers, or even addresses, now have the potential to be compromised. When considering this as an alternative, one should be aware of the line that needs to be drawn in order to protect one’s network security from anything outside of the boundary that has been created.

Using company email to register for online services is the smart route to take when considering the admin and general processes involved. We cannot ignore the good reasons to do so in certain cases. However, segmenting your data is an effective preventative measure to take against data breaches. Doing things differently, mixing it up and creating a system that works through trial and error is the ultimate goal. Implementing the basics and tuning your business’ specific needs is what all business owners should work towards.

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • cybersecurity
  • f-secure cyber security
  • password protection
  • passwords
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo