How to Choose and Use Strong Passwords
In 2007, the most popular password among the Internet users was the word ‘password’. Later, people have realized that strong passwords should include not only letters but also numbers. And in 2008 “password1” became the users’ favorite password. Despite all efforts of cyber security experts, who tried to explain to the average users, that predictable and frequently used passwords cannot be trustworthy,...
Hardware or Software Token – Which One to Choose?
Striving for maximum versatility and convenience is the main trend of our time. It triggers a general affection (which often borders on addiction) for smartphones. For a modern person, these small devices embody the principle “All that is mine, I carry with me”. A regular phone has now become a mini laptop computer, which also enables you to make calls (but it is no longer its leading feature). Since any computer should...
Why Everyone Should Care About Data Protection
There is an opinion that an average Internet user can not be a subject of interest for hackers and other thieves of confidential data. The head of the CIA or celebrity is a completely different story. But what can hacker expect from an ordinary person? No intriguing secrets, no big money. It seems like there is no need in data protection for common people. But everyone thinking this way is seriously mistaken. There are a lot of...
Identification, authentication, and authorization – what’s the difference
Identification, authentication, and authorization. We all face these three concepts every day, but not everyone knows the difference. Since these terms are essential in data protection, they deserve to be explained better. To begin, let’s take an example from everyday life. It will help you to understand the difference between authentication and identification in general. A new employee comes to work for the first time. At the...
Password Manager KeePass Is Vulnerable
It is not news that a fair amount of threats waits for the user in the vast global network. And it is clear that the best way out is to keep valuable information in encrypted form and protect it with a strong password. But the fact that it is possible to “pull” out in a form of a simple text file all the data from the password manager – the program which encrypts and generates passwords – became a surprise for...