Talk show host and comedian John Oliver
traveled to Russia to interview former NSA contractor and classified
information leaker- Edward Snowden. The interview covered a barrage of
information including most interesting to me, a segment on password creation.
Snowden revealed that bad passwords are the easiest way to compromise a system.
More specifically on the subject of eight character passwords; Snowden
postulated that it can take a computer less than a second to figure it out.
His advice, we need to shift our thinking from passwords to passphrases.
I mean really, who hasn't struggled
trying to come up with a thirteen character password with specific amount of
numbers, capitals and symbols? How on Earth do you remember it? Most write them
down and store them in their desk. Also a security breach! So, wouldn't a
catchy phrase simply be easier?
Whether it’s your personal information
you want to protect or that of your business, your computer life has become
encrypted with codes and password protections to ward off security breaches. A
concentric fence, if you will, that surrounds your little piece of the cyber
world. But we treat password creation like it’s an extension of our
personalities. A reflection of our overall web identity. We want that password
quippy and memorable, a fun word or pet name, a birthday or an anniversaries,
and we want it short with the average password being between 4 and 6 letters.
Sure it’s easy but we never pause to consider the ramifications.
Most of us are cautious about who we give our information to, or what sites we trust using a credit card on, though we give little consideration the impact of using a weak password. We seem to minimize their importance when we chose ease over safeguarding. We treat them like an inconvenience designed only to keep out an intrusive roommate and not protection from the foreign hacker sitting some 3000 miles away using a supercomputer to uncover your credit card number.
Hacking is a hugely lucrative business.
You don’t need formal education. Just a computer, some interest and a little
know-how. International hacking groups are on the rise and nobody’s information
is safe.
How can you protect yourself? You
should use the best cell phone spyware on
the market. Surepoint Spy is trusted mobile monitoring that lets you view text
messages, call logs, emails, social media activity, chat conversations, and
more. This cell phone spy tracker also
lets you monitor from multiple devices, including your own cell phone, tablet
or desktop computer.
And if you’re looking to spy on cell
phone for free, please note that most apps that are advertised as free or offer
a free trial do not have the same outstanding features or real-time customer service
that Surepoint Spy offers. Keep in mind that some potential scam companies are
only trying to rip you off without offering anything in return.
No comments:
Post a Comment