The enterprise IT environment of today couldn’t be more different from that of a decade ago. From cloud computing and AI to automation and VR, a host of advanced technologies are changing the way we work and network. And it’s not just enterprises that are getting more sophisticated: so too are cybercriminals. Instances of cybercrime..
Earlier this week the Daily Mail published a story with the headline ‘How to create a password that will take a hacker 227 MILLION years to crack – and the UK’s top 10 can be deciphered in less than a second’. The list of vulnerable passwords offers no surprises, so how do you create an..
Every time a data breach hits the headlines it is accompanied with calls for organisations to find ways to better manage passwords, misguided advice on how to make them stronger, or suggestions for alternatives. The move away from password-based login credentials is for most (whether consumer or corporate) the goal, but there needs to be..
There is a roaring trade in paper password notebooks. A quick look on Amazon and you will find passwords journals, passwords keepers, Internet address and password log book and even and I Love My Password! book, amongst many others. Seemingly, these go against everything we are told by security professionals. Passwords are secrets and as..
You may not be familiar with Bill Burr, but chances are he has had an impact on your day today. His guidelines for password security are the reason that in all probability you are adding an exclamation mark to the end of your memorable (or in reality, not so memorable) ‘secret’. The crazy thing is..
Has the new password you are about to set already been Pwned? One way to find out is to download the 5.3GB database of 306 million passwords that are known to have been compromised (Pwned) in data breaches. If you don’t have time to trawl the list and who does? Then Troy Hunt at ‘Have..
With so much talk over the past 12 months regarding the personal liability of Directors of organisations that are found to be non-compliant with GDPR by next May, and cyberattacks such as WannaCry making the national news, it would be hard for any C-level executive to have not put two and two together and place..