Explore the Unknown

Explore the Unknown - Password Guide

Tips For Password Security

The guidelines and steps for creating strong and secure passwords.

  • Keep your passwords private – never share a password with anyone else
  • Do not write down your passwords, use a password manager instead
  • Use passwords of at least eight (8) characters or more (longer is better)
  • Use a combination of upper case letters, lower case letters, numbers, and special characters (for example: !, @, &, %, +) in all passwords
  • Avoid using people’s or pet’s names, or words found in the dictionary; it’s also best to avoid using key dates (birthdays, anniversaries, etc.)
  • Substituting look-alike characters for letters or numbers is no longer sufficient (for example, Password” and “P@ssw0rd”)
  • A strong password should look like a series of random characters

How To Create A Strong, Complex Password

Here’s a way to make a strong password that’s very hard to crack:

FOLLOW THESE STEPS

  • Think of a phrase or sentence with at least eight words. It should be something easy for you to remember but hard for someone who knows you to guess. It could be a line from a favorite poem, story, movie, song lyric, or quotation you like.

Example: 

          I Want To Put A Dent In The Universe

 

  • Remove all but the first letter of each word in your phrase.

   IWTPADITU

  • Replace several of the upper-case letters with lower case ones, at random.

  iWtpADitU

  • Now substitute a number for at least one of the letters. (Here, we’ve changed the capital “I” to the numeral 1).

   iWtpAD1tU

  • Finally, use special characters ( $, &, +, !, @) to replace a letter or two — preferably a letter that is repeated in the phrase. You can also add an extra character to the mix. (Here, we’ve replaced the “t” with “+”, and added an exclamation point at the end.)

  iW+pAD1tU!

Why This Is Important ?

Traditional passwords can be cracked by hackers in less than a minute! Follow this guide to create passwords that would take centuries to crack.

 

https://www.knowbe4.com/

https://newtech.mt/cybersecurity/

Explore the Unknown

Email Vigilance Checklist: Safeguarding Your Inbox

Email Vigilance Checklist: Safeguarding Your Inbox

In today’s digital age, email has become an indispensable tool for communication in both personal and professional spheres. However, with the convenience of email also comes the risk of cyber threats such as phishing, malware, and spoofing. To protect yourself and your organization from these dangers, it’s crucial to adopt robust email security practices. Here are some essential tips to help you safeguard your inbox:

Validate Sender Information:

Always scrutinize the ‘from’ field of an email to verify the sender’s identity. Keep in mind that malicious actors can easily spoof email addresses to deceive recipients. If an email seems suspicious or unexpected, double-check the sender’s details before taking any further action.

Exercise Caution with Attachments:

Be cautious when opening email attachments, particularly those with executable file extensions such as ‘.exe’. A general rule of thumb is to avoid opening attachments from unknown or untrusted sources. Additionally, be wary of files with double extensions (e.g., ‘safe.txt.exe’), as they could contain harmful malware.

Report Suspicious Activity:

If you receive an email that raises suspicions or appears to be a phishing attempt, report it immediately to your organization’s IT help desk or security team. Prompt reporting can help prevent potential security breaches and protect other users within your organization.

Verify Hyperlinks:

Before clicking on any hyperlinks embedded in an email, hover your mouse cursor over the link to preview the URL. Watch out for discrepancies between the displayed URL and the actual destination. Be especially cautious of hyperlinks that lead to unfamiliar or suspicious websites, as they could be phishing sites designed to steal your personal information.

Stay Vigilant Against Domain Spoofing:

Cybercriminals often use domain spoofing techniques to create fraudulent websites that mimic legitimate ones. Pay close attention to the domain name in email links and be wary of subtle variations or misspellings. For example, ‘www.bankofarnerica.com‘ may appear similar to the legitimate ‘www.bankofamerica.com‘, but it could lead to a malicious site.

By adhering to these email security best practices, you can significantly reduce the risk of falling victim to cyber threats and protect your sensitive information. Remember, maintaining a vigilant and cautious approach to email communication is key to safeguarding both your personal and professional digital assets.

If you have any further questions or concerns about email security, don’t hesitate to reach out to your organization’s IT support team for assistance. Stay safe, stay secure!

https://newtech.mt/cybersecurity/

https://www.knowbe4.com/


Contact Details

(+356) 2552 3000

Newtech Malta Limited
A4, Marsa Industrial Estate
Marsa, MRS3000, Malta.

ISO 9001:2015

Privacy Preference Center

Privacy Overview

Cookies are text files containing small amounts of information, which your computer or mobile device downloads when you visit a website. When you return to websites, or visit websites that use the same cookies, they recognise the cookies and therefore your browsing device.

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful. This information can then be directed top us in order to enhance your user experience, we also use these cookies to collect information such as (popular pages, conversion rates, viewing patterns, click - through and other information). Deletion of these cookies may result in limited functionality of our service.

 

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings. Cookies are text files containing small amounts of information, which your computer or mobile device downloads when you visit a website. When you return to websites, or visit websites that use the same cookies, they recognise the cookies and therefore your browsing device.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.