123456 Is Not A Password

From banking to shopping and streaming to social media, people are spending more time than ever online. This means more opportunities for hackers to carry out cyber attacks. They often do this by targeting people and businesses using email and website scams as well as malware which can let  hackers inside your system

If hackers get into your device or accounts, they could access your money, your personal information, or information about your business. 

Whether it’s your Facebook, Amazon, or Netflix account, the explosion in popularity of online apps and services means more and more of us have to remember an increasingly long list of passwords.

Unfortunately, some of us cope with this challenge by resorting to practices that leave our data, devices and money at risk, by using the same password across multiple accounts, or by creating simple passwords that could easily be guessed by hackers. 

Bad password practice is more prevalent than you might think - Britain's National Cyber Security Centre carried out analysis of passwords leaked in data breaches and found that more than 23 million users worldwide used 123456 as a password. 

Here are some top tips that will make your life easier and your online accounts more secure:

 Create Memorable Passwords:   A good way to create strong, memorable passwords is by using 3 random words you can remember. But, don’t use words that can be guessed, like your pet’s name. You can include numbers and symbols.  For example, “RedPantsTree4!”

Save Passwords In Your Browser:   Saving your password in your browser means letting your web browser (such as Chrome, Safari or Edge) remember your password for you. This can help:

  • make sure you do not lose or forget your passwords
  • protect you against some cyber crime, such as fake websites

It is safer than using weak passwords, or using the same password in more than one place.

Use Email Account Passwords:   If a hacker gets into your email account, they could:

  • reset your other online account passwords
  • access personal information you have saved about yourself or your business

Your email password should be strong and different to all your other passwords. This will make it harder to crack or guess.

Action Fraud:       NCSC:        NCSC:  

You Might Also Read: 

Everything You Need To Know About Business Password Safety:

 

« Do People Lie More Often When Using Social Media?
Hackers Achieve Widespread Penetration Of Defense Contractors »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

Malomatia

Malomatia

Malomatia is a leading provider of technology services and solutions in Qatar including information security.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

SaferVPN

SaferVPN

SaferVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Garland Technology

Garland Technology

Garland Technology specializes in network access points (TAPs) for 100% visibility allowing you to see every bit, byte, and packet flowing through your network.

International Data Sanitization Consortium (IDSC)

International Data Sanitization Consortium (IDSC)

IDSC is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry.

YL Ventures

YL Ventures

YL Ventures funds and supports brilliant Israeli tech entrepreneurs from seed to lead.

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator invests in early stage disruptive companies in the security industry including, Cybersecurity, Internet of Things (IOT), Blockchain and AI.

Wiz

Wiz

Wiz - the first cloud visibility solution for enterprise security: A 360° view of security risks across clouds, containers and workloads.

Buchbinder Information Technology Solutions

Buchbinder Information Technology Solutions

Buchbinder Tunick & Company is a premier CPA and advisory firm offering a broad range of assurance, tax, business consulting and IT consulting services.

RocketCyber

RocketCyber

RocketCyber is a Managed SOC platform empowering Managed Service Providers (MSPs) to deliver security services to small and medium businesses.

Positka FSI Pte Ltd

Positka FSI Pte Ltd

Positka, being a Splunk Singapore partner, provides Splunk & Phantom Services, Cybersecurity & Risk Management, Analytics & Big Data, Lean Process Optimization, and Managed Security Services.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.