What? Did you even remember that there is a Spam folder? If you’re anything like me, the answer is probably no, but that doesn’t mean that this update is not important. If nothing else, let this article serve as a reminder that your Spam folder is not to be ignored. Take a few minutes to review and test it out.
Posts Tagged ‘identity theft’
Over recent months, hackers have been busy exposing security flaws in some very well known organizations. In most cases, the information stolen from these high profile breaches was then immediately shared on the web. With log-in and personal information taken from sites like Sony, Fox, Nintendo, PBS, AOL and even the CIA (just to name a few) it is entirely possible that one or more of your passwords is now available to millions of people on the internet.
Scared? Hopefully a little bit. In addition to accessing the sites that you have created accounts on, criminals can use that personal information to open bank accounts and get credit cards, loans, state benefits and documents such as passports and driver’s licenses in your name. There are some steps you can take to check on your information and limit any potential issues, but you must act quickly, like now!
Passwords are a necessary evil that we cannot escape and, as we have pointed out again and again, you are responsible for creating and remembering/storing all of the passwords you use. As recently as March 31, in the article Online Security Begins or Ends With Your Choice of Password, we provided readers with some frightening data about “consumer password worst practices” and explained the idea of strong passwords. In that post, and several others before it, we provided some tips on creating strong passwords, but only skimmed the surface of possibilities.
Today, sparked by a recent article on Lifehacker.com, I will share with you a list of methods that you can use to create strong passwords. These methods are taken from sites all over the web and are merely suggestions on how you can protect yourself from crimes like identity theft. Before you jump down to the list, remember that EVERY password you use should follow these rules: