World Password Day - 6th May

Passwords have been around as long as people have been keeping secrets. However, most people think of them as what we put into the box that follows Username and Email on all those websites. But long before that, they served just as important a role, especially in espionage and secret societies. When you want to ensure that the person you were speaking to was the person sent by your organisation, why, you’d ask them for the password!

Secret societies like the Freemasons and other fraternal organisations often asked for these before letting you through their doors and nowadays, such things are of less concern, but digital protection has become absolutely vital to our day to day existence.

Sometimes it’s just protecting our identity on our favorite web forum, and almost everyone has a Facebook account to protect. The problem is, where before you might need just a password or two, most people these days have dozens. Even worse, the protocol for these is often different, some requiring certain characters (numbers, Capitals, Symbols) and others denying the use. It makes having a universal password difficult, and security experts say that doing so is a terrible idea anyway.

World Password Day came along to provide a warning to the world, and to spread awareness that taking care of your passwords is vital to protecting yourself against identity theft.

Data is very much the currency of the modern world. If malicious actors on the internet can get access to your account details, they can impersonate you, steal your data, and even take your money. Furthermore, they can often do all of this while effectively covering their tracks. Even if you wanted to go after them and get your money back, you couldn’t. There’s a terrifying statistic about the current state of our password security. Business Insider did research to determine just how vulnerable accounts were, and discovered that 10,000 of the most common passwords allow access to 98% of all accounts. In other words, most people are using the same passwords – and many for years at a time. Career hackers know this – and it is part of the reason why they’ve been so successful over the last few years. World Password Day, therefore, is an attempt to push back against this. 

The organisers of World Password Day want to educate the world on the importance of having a strong password. A password that resembles your date of birth or, heaven forbid, the word “password” itself, is a cardinal sin. Passwords should, in their view, be long, complex, and bear no resemblance to real words.  They are also pushing the idea of two-factor authentication. As a computer-literate person, you’ve probably already encountered this concept. The idea is to use two forms of security to increase the chances that it is you trying to access your account, and not somebody else. 

Two-factor authentication can take a variety of forms. Most commonly, it involves using a regular password and then sending an alert to your phone to confirm whether it is really you logging in. If it isn’t, then you can reject the request to sign in and change your password. 

We use our passwords to protect all of our digital information, from our social media profiles to our bank accounts. Passwords are fundamental to our security and privacy. Without them, we’re an open book.  Every Password Day, therefore, is an opportunity for people to find out what constitutes a robust password and how to store them. 

You Might Also Read: 

Two-Factor Authentication Matters More Than Ever:

 

« Risks Of Bias In ‘Emotional AI’
Dark Web Drug Dealers Jailed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Frazer-Nash Consultancy

Frazer-Nash Consultancy

Frazer-Nash is a leading engineering, systems and technology company. Areas of expertise include information security and cyber security.

Deutsche Cyber-Sicherheitsorganisation (DCSO)

Deutsche Cyber-Sicherheitsorganisation (DCSO)

DCSO was founded in 2015 with the aim of counteracting the threats posed by globally organized cybercrime and state-controlled industrial espionage.

ComCode

ComCode

ComCode provides consulting services and solutions in the area of digitization and cyber security for mid-sized and big businesses.

Cyber Seguridad (Cyberseg)

Cyber Seguridad (Cyberseg)

Cyberseg provides specialized Cybersecurity services, including managed services (SOC / CERTs) and solutions for the protection of critical infrastructures.

Prescient

Prescient

Prescient’s Cyber solutions supplement your firm’s existing data security infrastructure with specialized investigations that identify unconventional cyber risks.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

White & Black

White & Black

White & Black are specialist corporate & technology lawyers based in London & Oxford.

Blue Lance

Blue Lance

Blue Lance is a global provider of cybersecurity governance solutions. Our software solutions automatically collect and store the information necessary for investigations, audit and compliance.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

Sabat Group

Sabat Group

Sabat Group provide relationship-driven information security & cyber security recruiting services.

Prosperoware

Prosperoware

Prosperoware develop software for cybersecurity, privacy, and regulatory compliance for content systems, and financial matter management.

Code Intelligence

Code Intelligence

Code Intelligence offers a platform for automated software security testing to help developers make their software more robust and secure.

Opticks Security

Opticks Security

Opticks provides fraud detection and monitoring solutions for leading brands. agencies and networks. Our relentless mission is to deliver reliable and innovative software to beat digital fraud.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.