Many internet users simply hope that it won’t hit them. But what if it is? What if the password for Ebay was suddenly stolen, which may also be the key to PayPal, various online shops and your Facebook and email accounts? Then there is a risk that third parties will log in and place orders on the Internet with incorrect data – but the bills will go to you. Strangers can also sign contracts, send messages, change profiles and much more with your logins.
There are two main reasons why others can get hold of your passwords:
Millions of usernames and passwords end up in the hands of criminals due to data leaks at large online companies. The Hasso Plattner Institute (HPI) at the University of Potsdam has long assumed that billions of user accounts are affected. The stolen passwords and personal information of the owners circulate in long lists, often on the so-called dark web, and can theoretically be found by anyone on the web.
Anyone affected by this should urgently change their passwords. You can have the HPI check online whether your e-mail address has been affected .
Aside from such data leaks, a poorly chosen password is still the most exploited security hole on the Internet . Because hackers can find out quickly with the help of certain programs. These programs test different letter and number combinations, for example from dictionaries, in connection with number combinations in a matter of seconds.
In order to be safe online, it is therefore particularly important:
Also Read: Cyber Attacks Are Increasing
If at all, write down the password in a safe place – not on a piece of paper on the PC, not in your wallet or collected in your calendar. The same applies to computers and smartphones: Do not create unprotected files with passwords that strangers can easily open. If you want to save passwords on your PC or smartphone, you should use suitable password managers and secure access to them with a strong master password. Do not send passwords via email, text message or any other similar means.
Be careful about saving passwords in your software, e.g. in the email program, the browser, on the smartphone etc. If the programs save your data unencrypted and/or the device itself is not well protected, then others can use your PC or smartphone access to your user accounts.
Also Read: Security Of Personal Data On The Internet And Cybersecurity
In today's digital landscape, it is critical to develop marketing strategies that capture potential customers'…
Optimized server management: a smooth path to the cloud Managing servers can seem like a…
The “waterfall” image represents classic project management: a phase can only start when the previous…
In larger projects, new data is constantly being generated and as an assistant, effective information…
To maintain their competitive advantage, companies must not only keep pace in an era of…
Office organization is the most important core competence and activity of an assistant. Only if…