Have I been Pwned

The question is not IF you will be attacked, the main question is WHEN and How Fast.  The question is not IF you will be attacked, the main question is WHEN and How Fast.  
For a criminal, it could take anywhere from infinite time to a millennium to mere fractions of a millisecond to crack your password.  

Our first line of defense is our credentials, your Username, and Password. Criminals take advantage of weak credentials. So, if you do not have a secure username and password, chances are they are already visible for criminals to attack you. 

This video can help you strengthen your security by learning how to create strong credentials. If you have a question, put it on the comments below, and I will answer in the next video. 
The truth is that networks, systems, and the Internet are not safe. On top of that, cybercriminals are just getting smarter.  

Many applications like Facebook, Twitter, and Instagram have suffered a breach. In 2014, nearly half of Americans had their credentials exposed by hackers – and that does not even count the many companies that experienced breaches.  

The most popular attacks are Brute Force & Dictionary Attack. Brute force attack tries all possible password combinations starting with “0” and followed with “1”, “2”, …, all the way to “ZZZZZZZZZ” or whatever the last character or special symbol there is instead of the “Z” in the chosen character set. Since brute force is extremely inefficient for longer passwords, other types of attacks were invented to reduce the number of passwords to try. 

Dictionary attacks try using words from the dictionary of the English language (or the user’s native language) as possible passwords. This type of attack would commonly include phrases and mild mutations, such as “Password1979” or “LisaPassword1”.

A breach depends on many factors, but something is for sure, the cracking time is getting shorter and shorter. Do you know how secure is a typical password now – and how strong was it in the 1980s? Since our computers are getting faster over the years, it takes less time to crack passwords.  

If you want to know how fast your password can be compromised, I encourage you to visit the following website: www.haveibeenpwned.comHere you can determine if your password is visible and how many times have been compromised. Enter a word (not your current password) and drag the slider to select a year to find out how long it would take for someone to crack the term if it were your password. It could take anywhere from infinite time to a millennium to mere fractions of a millisecond. 

When it comes to passwords, one thing is certain: Size matters.Adding a single character to a password boosts its security exponentially.

Combining numbers and letters rather than sticking with one type of character will dramatically enhance your password security. A string of nine letters or numbers takes milliseconds to crack. Add a single letter, and your password may become cryptic enough to thwart password crackers for nearly four decades.
You can use the following methods:

1. A long-phrase

2. Combination of characters, numbers and special characters

When creating long-phrases, do not use common dictionary words. You can misspell words and interchange letters for special characters. 

Creating strong passwords and responsibly manage them is the only way to secure your information. Never write a list of passwords and leave them visible to anyone. Treat your passwords like a Toothbrush. Change them regularly and never share them. Reusing passwords can also be catastrophic.  

Remember that passwords are just 50% of your credentials. Usernames must also be created with a high sense of security. For example, admin, administrator, or master, can be the main reason your systems and applications can be hack since they are so common. 

To learn more about cybersecurity, subscribe to our channel, and follow us online. If you like this video, subscribe to my channel and click the bell so you can receive my updates. If you have a question, put it on the comments below, and I will answer in the next video.  

Contact Us

Call: (855) 653-5444

About Us

GIL & CAT

We are family own business servicing Texas integrating Information Technology and Security since 2016. In GILCATs, Security is our priority!  All our IT & Security Solutions are driven by our mission to see your business operations run smoother and achieve your goals with time to market.

Our combined technical staff is highly certified, with years of industry experience in IT operations, computer programming, data center technologies, networking, low voltage cabling, surveillance, access control, and audiovisual.