Remove create-strong-password
article thumbnail

10 Tips for Managing Your Digital Identity

Kraft Kennedy

The shift to passwordless environments is catching on, but for most, passwords still serve as the keys to their digital world. We’ve culled the advisory down to a list of 10 guidelines for securing your personal information and creating better passwords: Password Length: Encourage users to create longer passwords.

article thumbnail

Invisible Women as Part of Security Questions

Johanna Rothman

The good news is most sites realize we, the users, need nudges to create strong passwords. The bad news is too many of those nudges reject strong passwords from password managers. (I And stop asking me to change my freaking password every 90 days.) I use and am happy with 1Password.).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Law Firms Need IT Policies

Kraft Kennedy

Why Law Firms Need IT Policies Is it okay to store your password on a post it note on your computer monitor in your personal office? There are 25+ policies that should be kept current for a strong security posture, explore the list here. Is it acceptable to use your family computer to access your firm’s work product?

article thumbnail

It’s Time You Guard Your Email Accounts

Chad Barr

They can rather easily reset your passwords that are linked to your financial institutions, such as your banks and investment accounts as well as other online shopping platforms such as Amazon, iTunes or your social media accounts and others. They can then transfer funds, order products and create a security nightmare for you.

Banking 52
article thumbnail

How to Choose a Password Manager

Women in Consulting

Password security is more important than ever before. Password managers can help. A password manager is a software program that stores your online account usernames and passwords securely ( think: encrypted ), and can create difficult and secure passwords you don’t have to remember on your own.

article thumbnail

Cybersecurity 101: How to defend against cyber-attacks

Tom Spencer

It is because human-coded software is full of bugs, which create points of weakness that hackers can exploit. Phishing involves using emails to steal sensitive data like credit card numbers and passwords, or to install malware onto the victim’s device. So, why is data on devices prone to attack? What valuable information do you have?

How To 105
article thumbnail

How to Create a Strong Password

Women in Consulting

You need to change all your passwords, and they need to be different for every online account.”. Dealing with password security is kind of like going to the gym; you know you should, but it’s easier to sit on the couch and watch “House of Cards”. I don’t like changing my passwords any more than you do. Internet Security.

How To 107