(713) 682-4000 sales@westecservices.net

Misleading password meters could increase risk of data breach

Hack the Hackers with Password Security

Top Access Control Trends for 2019

The Benefits of Two-Factor Authentication

Tips and tricks for avoiding IoT threats

What’s the best way to verify user identity?

Change your Dropbox password

This small business was hacked. Are you next?

Location

Creative

speed

reliability

Posts Tagged ‘password’

Misleading password meters could increase risk of data breach - WesTec Services

Misleading password meters could increase risk of data breach

A Password meter is an indicator of the strength of a password entered by a user on a website. In most cases, meters estimate the amount of tries necessary for your password to be guessed by an attacker by factoring in password length and complexity. A University of Plymouth study tested 16 of the most encountered password meters on the internet to test their effectiveness. Based on the results, here are a few tips on how to keep your passwords secure, regardless of an “approval” given by the password meter:  

Do not always trust the password meter

  Just because a password meter says “strong password” does not mean it is. The meters can be helpful but are also extremely flawed, giving you a sense of false security. When deciding on a password, do not base it solely on the rating given by the website.   

Avoid using keyboard patterns

  On many password meters, passwords such as “querty”,  “abc123”, and “Password” sometimes cannot be detected as problematic. Common letter combinations, such as going down a row of the keyword or commonly used words, are easily guessed and not always flagged on the meters.   Misleading password meters could increase risk of data breach - WesTec Services

Make passwords complicated and personal

  The most secure passwords are those with a combination of uppercase, lowercase, numbers, and symbols. Choose combinations that seem difficult to guess by an outside person or computer. The more complicated and seemingly random the password, the stronger it will be.
  In addition to character variation, do not use the same password for all of your accounts. Change up your passwords so that if one is discovered, not all of your information is at risk. 
  Secure your valuable data with the protection it deserves. Do you part to protect your information with a strong password, WesTec is here to do the rest. WesTec Services is dedicated to providing the highest quality of IT consulting as well as backup disaster and recovery planning. Give WesTecCall a call today to discover more about our available services.   

Hack the Hackers with Password Security

hacker attempting to steal passwordsHave you ever been the victim of a cyber attack? Do you use the same password for all of your accounts? Follow our guide to outsmart the hackers with increased password security.

How Hackers Get Your Passwords

Before you can better protect your accounts, you must understand how cybercriminals access steal your information. Typically, a hacker will compromise your account in one of three ways. 
  • Personal attack: Hackers target your account specifically. They will typically guess your email password and use password recovery options to access other accounts.
  • Brute-Force attack: Hackers systematically check all possible passwords until the correct one is found.
  • Data Breach: Hackers attack large companies, resulting in millions of compromised accounts.  

What Makes a Good Password?

Ideally, your password should be at least 16 letters and contain a combination of numbers, symbols, uppercase and lowercase letters. Passwords should not include any repetition, dictionary words, usernames, pronouns or IDs. Make a strong password by thinking of a phrase and then use the initials of each word, as well as the numbers and symbols, to combat potential attacks. For example, if your phrase is “Do you think a hacker will guess my 16 character password for Facebook?!”, your password might be: Dytahwgm16cp4F?!

Enable Two-Step Authentication When Possible

If any sites or accounts offer two-factor authentication, take advantage of it. This system works to limit hacking attempts by making a user authenticate their identity with a second method of verification. Check out our recent blog post about two-factor authentication for more information.

Use a Password Manager

The best thing you can do for your accounts is have a different password for each one. However, if you follow this one cardinal rule of password security, keeping up with all passwords can be difficult. Using a password manager allows you to save all of your passwords in a secure spot with a strong master password.  WesTec offers consulting for any individuals or businesses wanting more information about password security, network installation, or managed IT services. Contact us for more information.
Top Access Control Trends for 2019

Top Access Control Trends for 2019

Access control systems continuously evolve with the newest technology trends. In fact, they must keep up with updates to protect companies, their employees and data from threats. With a rising number of security breaches, we can expect more companies to install access control systems. 

Access Control Reviews

Security breaches are encouraging companies to conduct full audits of access controls. Enterprises will review risks by user, role and business process to isolate and mitigate risks before they turn into high-profile breaches. By noting weak security measures, companies can make changes to better protect assets.

Individualized Access

In 2019, we saw to see a rising trend in individualized access. This ensures each person has their own username, password or identification code. Companies now have access to automated provisioning, which sets up user accounts and creates automated workflows based on job duties. 

Security Patching

Hackers will do anything to break into security systems. While this has been a problem for decades, hackers are now specifically targeting overlooked points of access. To combat external threats, we expect access control systems to begin patching vulnerabilities, even if it means temporarily disrupting productivity. 

Threat Identification

Next year, systems will continue and expand their use of data analytics to monitor and mitigate threats. Companies will use their dashboards to monitor access, but they will also run possible scenarios to reduce risk and conflict. 

man using access control systemCloud-based Systems

The need for analytics, automation and access will encourage more businesses to install  cloud-based control systems. As companies increase their technology and mobile tools, they will want to protect their system in an effective way.  As we prepare to enter a new year and decade, businesses shouldn’t ignore threats from potential breaches. Our expert IT professionals at WesTec Services can help you analyze your current strategies and install a system designed to deflect security breaches. Contact us to learn more about our access control systems.
two-factor authentication benefits

The Benefits of Two-Factor Authentication

As technology continues to advance, additional security measures become necessary. Until now, single-factor authentication has been the standard. Single-factor authentication requires a username and password to enter an account. Consumers need additional security measures as cybercriminals become smarter. This is where two-factor authentication helps protect sensitive information and log-in credentials.  Two-factor authentication (2FA) isn’t a new concept, but is a necessary additional layer of security. It usually works by requiring the submission of a username and password, then asks for something additional to prove you are who you say you are. For example, some businesses will send a pin number to your cell phone you must provide for entry into a site.

Improved Security

With a second form of identification needed for verification, two-factor authentication makes it harder for an attacker to impersonate a user. In the event a cybercriminal gains password access, they can’t produce the additional element required to authenticate.

Increased Productivity and Flexibility

Employees can work remotely when their employers implement a second factor of authentication. They can securely access important applications, data, documents and back-office systems from any device or location with little risk.

Lower Security Management Costs

Approximately 40% of all help desk calls are related to password resets. With secondary authentication, businesses can expect less of the budget to be spent on security needs. It provides a safe way for employees or consumers to reset their account password by using the additional element to prove their identity, meaning they can handle the issue without contacting an IT professional.

Reduce Fraud

Identity theft is a common goal of cybercriminals. With two-factor authentication, businesses add extra mobile protection for customers, the site and the transaction. Adding a second element in your authentication process builds a sure brand consumers trust.  Ready to add two-factor authentication to your website? Contact your Houston IT experts.

Mission: WesTec will be a “turn-key” solution for all of its clients’ business connectivity needs. It will offer efficient and effective solutions, directly and with strategic partners, that create tangible value for its clients at every point of contact. Westec will serve all people and entities with a servant’s heart.

Get in touch

2916 West TC Jester Blvd., Suite 104

Houston, TX 77018


(713) 682-4000

sales@westecservices.net

Quick Feedback