Hackers talk about how best to protect their passwords on the Internet

In fact, we should just start using a program

(Translated from Croatian using Google Translator)

Security on the Internet all the more important, no one would care that he hackers fall in mail, Facebook, Instagram ... Cyber expert Kevin Mitnick, author of the book "The Art of Invisibility," explains how to best and most effectively protect, and without having to put ultracomplicated codes that you can not remember. In fact, in this case need not have to remember all your passwords, writes Business Insider.

"A lot of people ask me how to choose a good password," says Mitnick. His solution is to use a password manager, and software for managing passwords. Examples are the last pass and Password. Access free him and he manages all your passwords.

You do not have to remember the password

What does that exactly mean? So that when you go to a page where you must enter the password every time you sign in, for example, in Gmail, Passsword manager automatically generates a secure password for you. And every time you go to a site it will always choose a password for you. These are unrelated words, letters, symbols, but it does not matter to you because the code does not have to remember not to enter.

Password Manager does it for you. And therefore it is very difficult for hackers to trace your passwords. But how to protect access to Password Manager? So you have a unique code that unlocks everything. It is about the longer passwords, between 20 and 25 characters. It would be best to select some songs verse, phrase, anything that will easily remember. And that's really all you need to know, and will ensure the highest level of security on the Internet.

Source: Telgram

Topics: Speaking Engagements, Global Ghost Team, Facebook, hackers, Instagram, internet, Password Management, password security, Kevin Mitnick Security Awareness Training, password manager, password unlocking code, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg