Dark Web Monitoring

Best Password Security Tips – How Hackers Steal Your Passwords

By |2021-03-18T12:35:36-04:00March 18th, 2021|Cyber Security Awareness, Dark Web Monitoring, IT Support, Uncategorized|

Unless you live under a rock, most people have at least one password in use. In reality, it’s more like most people have 20+ different accounts online that require a username and password! But we all know how hard it is to have a different and unique password for all of our accounts, and that’s why most people cheat. In fact, about 80% of people use the same password or a variation for more than one account!

So what? What’s the big deal of using the same password? The real problem is cybercrime. To say it’s a problem is an understatement. Cybercrime is the most lucrative criminal activity in the world, passing illegal drugs in 2014. Hackers want your passwords, if they don’t have them already. Whether they’re stealing your passwords to sell on the dark web, to gain access to your system, or to blackmail you into paying a ransom, it’s a huge opportunity to gain money.

How do hackers steal your passwords?

There are so many ways, and I’ve highlighted a few of the most common ways.

  1. Buying them on the dark web.
    You might have heard of the world’s biggest data breaches, including Facebook, Twitter, Microsoft, Capitol One, and more. Anytime there is a major data breach, the information is bought and sold on dark web marketplaces.
  2. Brute Force Attacks
    These are automated guesses of billions of passwords a minute until the correct one is found.
  3. Key Logging
    A program is downloaded onto your computer where a hacker is watching all your keystrokes as you type them.
  4. Manual Guessing
    Personal information, such as name and date of birth can be used to guess common passwords.
  5. Social Engineering
    Attackers use social engineering techniques to trick people into revealing passwords.
  6. Stealing Passwords
    Insecurely stored passwords can be stolen – this includes handwritten passwords hidden close to the devices.
  7. Shoulder Surfing
    Observing someone typing in their passwords.
  8. Searching
    IT infrastructure can be searched for electronically stored password information.
  9. Interception
    Passwords can be intercepted as they are transmitted over a network
 Given all this information, what are the best password security tips?
  1. Have a different UNIQUE password for every account.
    Minimum 8 characters in length, with a combination of letters, numbers and symbols. Some of the worst passwords we still see today: Password123, letmein, testtest, basketball, qwerty.
  2. Keep passwords tough to guess, where even a family member couldn’t figure it out.
    Do not use something from your everyday life like your family member’s name, a favourite sports team, or your gym you visit. Through social engineering, a hacker knows what you do and where you go on a regular basis, and the first passwords they’ll try will be about those details in your life.
  3. Change your passwords every 3-6 months.
    With all the data breaches that occur everyday to the major companies we trust; your passwords are already out there on the dark web being sold. It’s important to change your passwords every 3-6 months because the old ones the hacker already has are no longer in use.
  4. Use a password manager app to help create and secure passwords (KeePass, LastPass).
    This is a safe way to keep all your passwords in one place and encrypted. Some password managers can even create strong passwords for you and automatically load them for you.
  5. Enable two-factor authentication (2FA) for an additional level of security.
    Wherever you can, enable 2FA so when you’re logging into an account, a code is sent to a separate device that you own. It’s important that the code is sent to a SEPARATE device because a hacker could have access to your device, and a security code to the device they have access to is rendered useless. If you’re logging in on your laptop, have the code sent your phone, for example.

Of course, the most educated internet users know that even having the best password security does not prevent you from cyber attacks. Do you need help with fighting cyber crime? Start with checking out our Ultimate Cyber Security Package and our Remote Worker Cyber Security Package!

Ian Evans, President of E Tech sits on the MSP Hot Seat with Kaseya’s Matt Solomon

By |2020-09-16T13:50:31-04:00September 16th, 2020|About Us, Dark Web Monitoring, Uncategorized|

Kaseya’s Matt Solomon, Vice President of Business Development sat down and interviewed Ian Evans, our President and CEO, as part of Kaseya’s MSP Hot Seat video series. Watch for Ian answering the questions:

  1. What was your first job and what was a lesson you learned that still helps you in your business today?
  2. Who in the business world has been a big influence over you? Why?
  3. What changes in your management style have you had to make since COVID? If any?
  4. Favorite technology tool you have?
  5. What have you learned about your customers during these times (COVID-19)?

Kaseya and E-Tech have partnered together to bring our clients Dark Web Monitoring and IP Address Monitoring for businesses and personal email addreses.

Our Dark Web Monitoring detects compromised credentials in real-time on the Dark Web and notifies you immediately when these critical assets are compromised, before they can be used for identity theft, data breaches, or other crime. Digital credentials such as usernames and passwords connect you and your employees to critical business applications, as well as online services. Unfortunately, criminals know this — and that’s why digital credentials are among the most valuable assets found on the Dark Web.

>

[WEBINAR RECORDING]: THE DARK WEB IS REAL: HOW TO PROTECT YOURSELF FROM DIGITAL RISK

By |2024-01-23T15:03:16-05:00September 14th, 2020|Cyber Security Awareness, Dark Web Monitoring, Uncategorized, Webinars, Website Security|

Date And Time: Thursday, September 10, 2020 @ 2PM-3PM EST

You may have heard of it before or wished upon a star for a place on the internet where you are untraceable – a place you can explore with complete anonymity. That virtual haven is known to its users as the Dark Web. Although complete anonymity is nearly impossible, surfing the Dark Web is the closest you can get to it. But what is it and how does it affect me? On September 10, 2020 from 2PM-3PM EST, we took a deep dive into the Dark Web and looked at your digital risk and how to protect your most important asset.

The reality is, once you’re exposed on the Dark Web, your information can never be completely removed or hidden. You can’t file a complaint or contact a support line to demand your data be removed.

Your company should immediately start taking appropriate steps and measures to correct or minimize the risks and potential damages associated with this exposed data. Identify, understand and learn from past mistakes or failures, and adopt a more proactive and preventative approach to your business’ cybersecurity strategies moving forward.

Talking Points:

  • The newest alarming data breaches and compromises happening in 2020
  • What are Phishing and Ransomware Attacks and how they are on the rise
  • Ways that your employees’ work credentials can lead to a breach
  • How to practice good email hygiene
  • Non-profit and Small Business weakness stats
  • What the difference is between the ‘Deep Web’ and the ‘Dark Web’
  • A look into the Dark Web and its virtual black markets
  • How your data goes for sale on the dark web
  • How credentials are compromised
  • How hackers use your credentials
  • Protecting against compromises and how to stay proactive
  • How the human factor is key
  • How Cyber Security Awareness Training is the #1 tool for employees
  • Dark Web Monitoring if your credentials have been exposed in a breach

Speakers:

Ian Evans
President and CEO

Corey Evans
Business Development Associate

Simmer Principio
Cyber Security Analyst

Title

Go to Top