773-516-5658 | Se Habla Español

LOGO_COLOR_EXT_SMLLOGO_COLOR_EXT_SMLLOGO_COLOR_EXT_SMLLOGO_COLOR_EXT_SML
  • Home
  • SERVICES
    • In-store Services
      • Mobile Device Repair
      • Screen Repair
    • In-store Support
    • Remote Support
      • Why Remote Support?
    • Small Business Support
  • MEMBERS
    • Become a Member
    • Member Access
    • Pay Online
    • RESET USER PASSWORD
  • STORES
  • TECH BLOG
  • ABOUT US
    • FAQS
    • Videos & Testimonials
    • Partners and Certifications
  • CONTACT US

Google studies effects of leaked logins

November 21, 2017

Passwords are your first line of defense against hackers. But over the years, they have developed plenty of methods to steal them. To gain a deeper understanding of how cybercriminals operate, Google analyzed the causes of leaked login credentials. Here are the results.

The results
From March 2016 to March 2017, Google and UC Berkeley researchers examined three main ways hackers hijack accounts:

  • Keylogging software – a malicious program that records computer users’ keystrokes
  • Phishing emails – to lead people into dangerous websites
  • Stolen passwords – available to the highest bidder

In just one year, Google found 788,000 successful keylogging attacks, 12.4 million victims of phishing attacks, and 1.9 billion accounts exposed via login credentials sold on the black market.

Researchers suggest the reason so many accounts are hacked is because people tend to reuse their passwords, which means if one set of login credentials is exposed, other accounts could be compromised.

Phishing is also a big threat because it targets users — the weakest links in your cybersecurity. The strongest password or security system won’t mean anything if your employees constantly fall for online scams.

Protecting your accounts
There are several things you can do thwart account hijacking. For starters, you should set strong and unique passwords for each account to minimize data breaches.

While the general rule in the past was to set a complex password — a mix of letters, numbers, and symbols — recent studies suggest that longer, 20-character “passphrases” are much tougher to crack. If you find it difficult to remember several passwords, consider using a password manager, which not only stores all your passwords, but can generate strong passwords, too.

To deal with phishing attacks, you should activate multi-factor authentication on your accounts. This adds an extra layer of identity verification to your password (e.g., a fingerprint scan or a temporary security key sent to your phone), making your login details ‘unphishable.’

Security training is also crucial. This includes teaching your employees about what phishing attacks look like and instructing them on password protection best practices so they never fall victim to account hijacking.

The bottom line is not only that strong password security requires strong defense mechanisms; you and your employees must be vigilant, too.

Need more advice on keeping your business safe? Call us today! We provide critical security updates and comprehensive support services to help you stay well ahead of cybercriminals.

Published with permission from TechAdvisory.org. Source.

Related posts

November 23, 2019

What you need to know about Android malware


Read more
November 20, 2019

Simple tips to prevent Mac ransomware


Read more
November 7, 2019

Fix these enterprise security flaws now


Read more

Recent Posts

  • What you need to know about Android malware
  • Simple tips to prevent Mac ransomware
  • Save on electricity with these PC tips
  • The benefits of Google Tasks
  • Ways Office 365 migrations fail

Archives

  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015

Categories

  • Android
  • Android Phone
  • Android Tablet
  • Apple
  • Apple Mac OS
  • Business
  • Business Continuity
  • Business Value
  • Cloud-Google Apps
  • Cloud-Office 365
  • Google
  • Hardware
  • Healthcare
  • Internet Social Networking and Reputation Management
  • iPad
  • iPhone
  • Microsoft Office
  • Microsoft Windows News & Tips
  • Mobile
  • Mobile General
  • Motion
  • Office
  • Photography
  • Productivity
  • Security
  • Social Media
  • Uncategorized
  • Virtualization General
  • Web & Cloud
  • Windows
  • Windows Phone

South Holland Store

  • 516 E 162nd St
    South Holland, IL 60473
  • Phone: 708-333-2700

 

In-store hours

  • 11am – 6:30pm Mon – Sat

 

 

Remote Services

  • 9am – 6:30pm Mon-Fri
  • Phone: 773-516-5658

 

 

©2019 Chicago Computer Club All Rights Reserved.   Privacy Policy