Thursday, 12 September 2013

WHY PASSWORD SECURITY ON MY DEVICE?


Device could be any electronic machine where information is contained /stored. Some good examples of device are Mobile phone, PCs, USB Flash drive, Hard disk drive (HDD) and the like. Password is what protects your file/document or device from being access by others either on a network or directly on the system. When choosing a password, make sure your choice is not what can be easily guessed by people that know you. It is advice that you do not use your name, surname and date of birth as password since any of these could be easily guessed by pals or relations. There are different levels of password, these ranges from simple level to complex level. A given password is considered simple if it alphabetical phrase only like AROME or arome or numerical only like 12345 or 54321. It is obvious that any of this can be guessed by people that are close to you. When choosing a password, choose a complex level password which is the combination of numerical symbols, numerical symbols and even special symbols like %#Arome23 or 32#abc2&wa. It takes special software like Horse to reveal a complex password like this. You are strongly advice in your own interest to have a diary where your password can be written should it escape your mind otherwise you will be at some experts mercies.
In the wake of a couple of massive security breaches, security experts have advised that we have a password on every of our device containing information that we considered vital either on the network or directly on the system. Device manufacturers are aware of this that is why almost all the device that can be purchased today comes with password capacity to prevent unauthorized access to devices. By now you have probably heard the time-worn guidelines for creating strong passwords: Don’t use your name or other common words. Use different passwords for different sites. Change them often. Choose security questions that don’t involve information that everyone knows about you, or stuff that crooks can easily find on your social network like Facebook, Twitter etc.

No comments: