Guideline for setting secure Password

Guideline for setting secure Password. Choosing the right password

Choosing the right password is something that many people find difficult, there are so many things that require passwords these days that remembering them all can be a real problem. Perhaps because of this a lot of people choose their passwords very badly. The simple tips below are intended to assist you in choosing a good password.

1. Use at least eight characters, the more characters the better really, but most people will find anything more than about 15 characters difficult to remember.
2. Use a random mixture of characters, upper and lower case, numbers, punctuation, spaces and symbols.
3. Don't use a word found in a dictionary, English or foreign.
4. Never use the same password twice.

Things to avoid
1. Don't just add a single digit or symbol before or after a word. e.g. "Cybersecurity1"
2. Don't double up a single word. e.g. "securitysecurity"
3. Don't simply reverse a word. e.g. "ytiruces"
4. Don't just remove the vowels. e.g. "scurty"
5. Key sequences that can easily be repeated. e.g. "qwerty","asdf" etc.
6. Don't just garble letters, e.g. converting e to 3, L or i to 1, o to 0.

Tips
1. Choose a password that you can remember so that you don't need to keep looking it up, this reduces the chance of somebody discovering where you have written it down.
2. Choose a password that you can type quickly, this reduces the chance of somebody discovering your password by looking over your shoulder.




Ransomware and The Role of Cryptocurrency

Ransomware and The Role of Cryptocurrency

Suggested Cyber Resilience Activity Plan

Suggested Cyber Resilience Activity Plan

Comptia Security Plus ISO Model

Comptia Security Plus ISO Model, TCTIP Model, Hybird Model

Types of Cyber Security Threats

Types of Cyber Security Threats: Ransomware, Malware, Social engineering, Phishing

Comptia Security Plus | Network Traffic Analysis

Comptia Security Plus | Network Traffic Analysis

Cyber Security Structure Attacks | Unstructured Attacks

The cyber attacks can also be classified as structure attacks and unstructured attacks based on the level of maturity of the attacker

Kaseya Cyber Attack | Kaseya Ransomware Attack

About 200 US businesses have been hit by ransomware attack, according to a cyber-security firm.

How does ARP work? | ARP Commands

How does ARP work?, ARP Command

Understanding Ransomware | Defending Against Ransomware

Understanding Ransomware and Defending Against Ransomware

Guideline for setting secure Password

Guideline for setting secure Password. Choosing the right password