Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
PR Newswire
WASHINGTON, Dec. 7, 2021
WASHINGTON, Dec. 7, 2021 /PRNewswire/ -- GoodFirms, the leading research, listing, and review platform, recently published its latest survey report- Top Password Strengths and Vulnerabilities: Threats, Preventive Measures, and Recoveries. This survey from GoodFirms outlines the current password behavior of online users, risk factors associated with password management, and the best measures, policies, and practices to safeguard passwords from attacks or breaches. 30% of surveyees reported password leaks and security breaches owing to poor password practices and weak password setups.
The research highlights a few common insecure password practices of users, such as sharing passwords with colleagues, family members, and friends; jotting down passwords on sticky notes, papers, planners, changing passwords only when prompted; or using the same passwords for multiple sites.
"As password authentication technology gets stronger and more foolproof, it is also the responsibility of the users to protect their passwords from cyber attackers by following the best practices," says GoodFirms.
The research reveals some of the most sophisticated password tricks deployed by cybersecurity experts to create unhackable passwords. Some of the best password protection practices suggested by experts surveyed by GoodFirms include using secure VPNs, 2-factor authentication, avoiding dictionary terms in passwords, using password management software, and creating unique passwords that are difficult to guess.
The research also elaborates on password techniques and security initiatives to secure RDP (remote desktop protocol) logins.
"Password stealing attempts are not always for money; sometimes, the purpose is stealing information, spying, sabotage, rivalry, revenge, etc. Therefore, strengthening RDPs is critical for employees and organizations.", says GoodFirms.
The research concludes with insights on how the world is heading towards a passwordless regime with progress in passwordless authentication methods such as biometrics, facial recognition, voice commands, etc.
Key Takeaways from the Research:
About the Survey:
This online survey from GoodFirms titled, "Top Password Strengths and Vulnerabilities: Threats, Preventive Measures, and Recoveries," was carried out between 16th October 2021 and 22nd October 2021. A total of 210 responses were collected from selected participants that comprised IT personnel, employees, and cybersecurity experts. Respondents were quizzed about their password management behavior, practices, and techniques.
The purpose of the research was to find out and analyze the best practices for password management and the relevancy, utility, and effectiveness of tools such as password managers for managing passwords. To view the full survey report, including additional insights and participant demographics, please visit:
https://www.goodfirms.co/resources/top-password-strengths-and-vulnerabilities.
To read and download more research articles by GoodFirms click here.
About GoodFirms:
GoodFirms is a globally recognized IT research and listing company. Widely regarded as the best software and service listing platform, GoodFirms has been practicing its flagship research methodology with utmost dedication, and the research insights provided by GoodFirms have been valuable in shaping the perceptions of buyers while making business decisions.
Rachael Ray
(360) 326-2243
rachael@goodfirms.co
View original content:https://www.prnewswire.com/news-releases/30-security-breaches-caused-by-weak-passwords-goodfirms-2021-research-301438687.html
SOURCE GoodFirms
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs