Security Corner:

Password best practice

1

December 30, 2012  2:37 PM

What you can do about the 25 worst passwords of 2012



Posted by: Ken Harthun
Password best practice, passwords, Security

Every year, I take a look at the published list of worst passwords. I gave you this list back in October, but it occurred to me that there is something you can do about it if, heaven forbid, you are using any password on this list. Surprisingly, the list changes little from year to year, usually...

May 29, 2012  6:31 PM

Minimum password length redux



Posted by: Ken Harthun
Password best practice

About this time last year, I...


May 28, 2012  5:24 PM

Password patterns to avoid



Posted by: Ken Harthun
Password best practice, Password Haystacks, Worst passwords

Bookmark and Share     0 Comments     RSS Feed     Email a friend


April 27, 2012  12:54 AM

Crossword passwords



Posted by: Ken Harthun
Crossword Password, Password, Password best practice, Security

I love crossword...


February 29, 2012  11:04 PM

And finally…give them your security question answers



Posted by: Ken Harthun
Password best practice, password succession, Security best practice

[caption id="attachment_1421" align="alignleft" width="253" caption="Source: wpclipart.com"]

Bookmark and Share     0 Comments     RSS Feed     Email a friend


January 18, 2012  1:38 PM

Zappos security breach affects 24 million



Posted by: Ken Harthun
data breach, hackers, Password best practice, Password Paradigm

Bookmark and Share     0 Comments     RSS Feed     Email a friend


January 17, 2012  10:57 AM

What the heck is a password honeypot?



Posted by: Ken Harthun
hackers, honeypot, Malware, Password best practice

Has your Gmail, Yahoo, Hotmail or Skype account ever been hacked? If so, you either have an extremely guessable password, or you gave hackers your login credentials by putting them into a password honeypot. What the heck is a password honeypot? Good question. Let me give you a bit of...


January 16, 2012  10:47 PM

A simple password recycling method



Posted by: Ken Harthun
Password, Password best practice, Password Management

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 22, 2011  1:59 AM

Five essential steps to mitigating password attack threats



Posted by: Ken Harthun
Password best practice, Password Management, Threat mitigation

After a bit of a hiatus on my studies for various certifications, I have gotten back into the swing of things and found a bit of wisdom that I wanted to share. From a Network Admin perspective, here are five essential password policies that will help you mitigate the threat of password attacks on...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: