Best Password Security Tips – How Hackers Steal Your Passwords

By |2021-03-18T12:35:36-04:00March 18th, 2021|Cyber Security Awareness, Dark Web Monitoring, IT Support, Uncategorized|

Unless you live under a rock, most people have at least one password in use. In reality, it’s more like most people have 20+ different accounts online that require a username and password! But we all know how hard it is to have a different and unique password for all of our accounts, and that’s why most people cheat. In fact, about 80% of people use the same password or a variation for more than one account!

So what? What’s the big deal of using the same password? The real problem is cybercrime. To say it’s a problem is an understatement. Cybercrime is the most lucrative criminal activity in the world, passing illegal drugs in 2014. Hackers want your passwords, if they don’t have them already. Whether they’re stealing your passwords to sell on the dark web, to gain access to your system, or to blackmail you into paying a ransom, it’s a huge opportunity to gain money.

How do hackers steal your passwords?

There are so many ways, and I’ve highlighted a few of the most common ways.

  1. Buying them on the dark web.
    You might have heard of the world’s biggest data breaches, including Facebook, Twitter, Microsoft, Capitol One, and more. Anytime there is a major data breach, the information is bought and sold on dark web marketplaces.
  2. Brute Force Attacks
    These are automated guesses of billions of passwords a minute until the correct one is found.
  3. Key Logging
    A program is downloaded onto your computer where a hacker is watching all your keystrokes as you type them.
  4. Manual Guessing
    Personal information, such as name and date of birth can be used to guess common passwords.
  5. Social Engineering
    Attackers use social engineering techniques to trick people into revealing passwords.
  6. Stealing Passwords
    Insecurely stored passwords can be stolen – this includes handwritten passwords hidden close to the devices.
  7. Shoulder Surfing
    Observing someone typing in their passwords.
  8. Searching
    IT infrastructure can be searched for electronically stored password information.
  9. Interception
    Passwords can be intercepted as they are transmitted over a network
 Given all this information, what are the best password security tips?
  1. Have a different UNIQUE password for every account.
    Minimum 8 characters in length, with a combination of letters, numbers and symbols. Some of the worst passwords we still see today: Password123, letmein, testtest, basketball, qwerty.
  2. Keep passwords tough to guess, where even a family member couldn’t figure it out.
    Do not use something from your everyday life like your family member’s name, a favourite sports team, or your gym you visit. Through social engineering, a hacker knows what you do and where you go on a regular basis, and the first passwords they’ll try will be about those details in your life.
  3. Change your passwords every 3-6 months.
    With all the data breaches that occur everyday to the major companies we trust; your passwords are already out there on the dark web being sold. It’s important to change your passwords every 3-6 months because the old ones the hacker already has are no longer in use.
  4. Use a password manager app to help create and secure passwords (KeePass, LastPass).
    This is a safe way to keep all your passwords in one place and encrypted. Some password managers can even create strong passwords for you and automatically load them for you.
  5. Enable two-factor authentication (2FA) for an additional level of security.
    Wherever you can, enable 2FA so when you’re logging into an account, a code is sent to a separate device that you own. It’s important that the code is sent to a SEPARATE device because a hacker could have access to your device, and a security code to the device they have access to is rendered useless. If you’re logging in on your laptop, have the code sent your phone, for example.

Of course, the most educated internet users know that even having the best password security does not prevent you from cyber attacks. Do you need help with fighting cyber crime? Start with checking out our Ultimate Cyber Security Package and our Remote Worker Cyber Security Package!

The Basics of iMIS Database Tables – Part 1

By |2021-02-08T15:38:14-05:00February 8th, 2021|Hosting, iMIS, IT Support, Uncategorized|

When looking through your iMIS database you may see a lot of tables and not know what many of them are for. If you need to write custom SQL queries or do troubleshooting with some issues, it is quite useful to know what information is stored where. These are some of the basic tables to get you started:

Users Tables:
  • Users table shows you all the staff users that have been created.
  • UsersMain table shows you all the created users.
  • Name table contains the users and contacts and their personal information.
  • Aspnet table contains various system information about user accounts.
Transaction Tables:
  • Trans table holds all the transactions, and you can see the debit, credit description and for who the transaction was completed for.
System Tables:
  • System_Params table holds the parameters for iMIS settings.
  • System_Variable table holds the iMIS variables.
  • SystemConfig table holds the configurations for iMIS.
Other Tables:
  • Cart table holds the current carts of the users. You may sometimes need to delete all the carts to resolve some issues.
  • CommunicationLog table is one of the biggest tables which holds all the email information that have been sent through iMIS.
  • DocumentMain table is usually the biggest table and holds all the documents that have uploaded to iMIS in blobs.

For more information on iMIS database tables or general information on iMIS, feel free to contact us.

New Year, New Home Office Security Strategy!

By |2021-01-20T14:18:04-05:00January 20th, 2021|Business Continuity Solutions, Cyber Security Awareness, Uncategorized|

Make security your New Year’s resolution!

Home may feel like the safest place on the planet these days, but your personal network might not be. This year, step up your home office security strategy and dedicate 2021 to protecting yourself and your organization online. Get a head start on securing your home office with these 5 tips.

Can’t view the PDF? Download it here.

FEEL GOOD HOLIDAY STORY: Our client Mariann Home has reported ZERO COVID-19 cases this whole Pandemic!

By |2020-12-14T08:19:41-05:00December 14th, 2020|Business Continuity Solutions, Cyber Security Awareness, Uncategorized|

Earlier this month our client Mariann Home, a long-term care home located in Richmond Hill, Ontario, Canada logs ZERO cases of COVID-19 in first and second wave of pandemic! We are very proud to share this feel good holiday news with everyone! Congratulations to our client and keep up the good work in these trying times!

Check out the full story and video on CTV News!>

Title

Go to Top